SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 140 | P a g e
Security Based Service Oriented Architecture in Cloud
Environment
Asha N. Chaudhary, Prof. Hitesh A. Bheda
M.tech (CE) Researcher Scholar RK University, India.
Department of computer Engineering. RK University, India.
ABSTRACT
Service Oriented Architecture is appropriate model for distributed application development in the recent
explosion of Internet services and cloud computing.SOA introduces new security challenges which are not
present in the single hop client server architectures due to the involvement of multiple service providers in a
service request. The interaction of independent services in SOA could break service policies. User in SOA
system has no control what happens in the chain of service invocations. Even if the establishment of trust across
all involved partners is required as a precondition to ensure secure interactions, still a new end to end security
auditing mechanism is needed to verify the actual service invocation. We provide solution for end-to-end
security auditing in service oriented architecture. This security architecture introduces two new components
called taint analysis and trust broker. It also taking advantage of WS-security and WS-Trust standards. These
components maintain session auditing and dynamic trust among services. The solution of these services allows
auditing of inheritance services without modification. We also implemented model of the future approach. We
also established its efficiency in Amazon EC2 and multi tenancy cloud computing infrastructure.
Keywords: Service Oriented Architecture, Cloud Computing, Web Services, Security, Multi tenancy,
Performance.
I. INTRODUCTION
Cloud computing means is a way of using
computational resources such as storage, operating
systems etc. Which are located remotely and are
provided as a service over internet [1].The service
oriented architecture is an idea of received significant
attention and concern from the software design and
development [2].
In software engineering, service oriented
architecture is a new model in which is characterized
by loose Coupling among software components,
called services. SOA permit fast design of new
applications by composing smaller special purpose
and mixed services [3]. To ass mixed services
components in both project and military environment,
SOA can provides as the unifying layer [3]. Web
service is a proven manufacturing technology that
can be used to implement SOA application.
The basic necessities of SOA are: (1) the
user must be able to control between different clouds
as long as they are well-matched. An example would
be if a client running an OS on an IaaS cloud. They
should be capable in the direction of convey their
transformation to the new cloud provider they want
to control to [4]. (2) The user must be wanted to
create a group of resources. An instance would be
two cloud providers work jointly at providing their
mutual resources through the same source [4].
Due to a sequence of principles that have been
created based on standard extensible Markup
language, web services allow interoperability of
applications [2].We can say that the most important
advantage of using the model of SOA is
interoperability which is achieved by the use of
typical XML, which permit not only communication
of straight usage in the web, but communication
between devices ranging from small sensor to a
complicated family machine, marketable or
manufacturing [2].
To ensure security in this surroundings, new
security mechanism must be measured, such
as[5],(1)WS-security is a standard of Organization
for Advancement of Structured Information
Standards in order to SOAP messaging security and
providing honesty and confidentiality.(2)Security
Assertion Markup Language is another OASIS
standard based on XML for exchanging security
information.(3)Web Services Business Process
Execution Language is an XML based language that
is used to organize web service in single business
process.
The SOAP-Simple Object Access Protocol
is main important protocol which is used for web
service to connect and is transported over the HTTP-
Hyper Text Transfer Protocol [6]. Due to be short of
end to end authentication and authorization, security
is a demanding matter in service oriented
RESEARCH ARTICLE OPEN ACCESS
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 141 | P a g e
architecture. Attackers are not able to stop
unnecessary interception of messages. It is also not
possible to secure the unidentified third parties in
SOA because of the architecture’s open nature [3].
Present Service Oriented Architecture security
solution and web service security standards have the
following restriction :( 1) Web service principles are
concentrating on transaction between only two
communicating service end points. Web service
standards do not consider service composition. (2)
Outside services are not confirmed or validated
dynamically means uniformed assortment of services
by user. (3) User has no manage on outside service
invocation through a service in another service
domain. (4)Violation and malicious activities in a
trusted service domain remain hidden.
The remainder of this paper is organized as follows:
in section II we sketch out the proposed architecture
for SOA system. In section III, we explain our model
implementation. It also concludes a security and
performance evaluation of the model. In section IV,
we explain future work. In section V, we explain
related work and finally in section VI, we explain
conclusion of the paper.
II. PROPOSED ARCHITECTURE FOR
SOA SYSTEM
2.1 End-to-End SOA Structure
The end-to-end SOA architecture consists in
two steps: (1) client build request to the initial trusted
domain (2) that services can make a service call to
another service from trusted domain or an untrusted
public domain.
Taint analysis and trust broker are two new
components in current end-to-end security auditing
architecture. Trust broker maintain information about
trustworthiness of services and categorizes them.
Trust broker is also used for dynamic validation and
verification of services and keeps track of history of
service invocation. Taint analysis module intercepts
the communication.
Figure.1 End-to-End Service Oriented Architecture
In figure 1, the information sequence
depicted is as follows:
1) UDDI (Universal Description, Discovery and
integration) Registry request.
2) Forwarding the service list to Trust Broker and
receive a categorized list.
3) Invoking a selected service.
4) Second invocation by service in domain A.
5) Invoking a service in public service domain.
6) End points reply to user.
2.2 Integration of Web Service Standards
The advantage of Web Service standard in
our model which is used to achieve end-to-end
security in our system: WS-Security and WS-Trust.
2.2.1 WS-Security
WS Security model specifies how integrity
and confidentiality can be enforced on message, and
allow the communication of various security token
formats, such as SAML (Security Assertion Markup
Language) and X.509 [9].Its main focus is the use of
Extensible Markup Language (XML) signature and
Extensible Markup Language (XML) encryption to
provide end-to-end security.WS-Security incorporate
security features in the header of a SOAP (Simple
Object Access Protocol message), specifying how to
sign and encrypt SOAP (Simple Object Access
Protocol) messages. There are two ways to handle the
record management by WS-Security. First it defines a
special element, Username Token, which pass the
username and password if the web service is using
custom authentication.WS-Security also provide
binary authentication tokens such as Kerberos
Tickets and X.509 certification: Binary Security
Token. Figure 2 explain the flow of WS-Securiy.
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 142 | P a g e
Figure.2 Message Flow of WS-Security.
The implementation of WS-Security uses
the Apache CXF framework leveragingWSS4J to
provide WS-Security functionalities.WSS4J security
is triggered through interceptors that are added to the
services and clients.
2.2.2 WS-Trust
It defines the concept of security token
request and response message as well as ways to
establish, assess the presence of, and broker trust
relationships between participants in a secure
message exchange.
Elements of WS-Trust
1) Security Token Service is a web service that
issues, cancels, renews and validates security
tokens as defined in the WS-Security
specification.2) Security token request and
response message format. And 3) Key-exchange
mechanism.
The implementation of WS-Trust within
web-service libraries which provided by vendors or
by open Source cooperative efforts.
2.3 Trust Broker Formation
Trust Broker is trusted third party
accountable for maintain end-to-end security in a
chain of service invocation based on request of a
client. It can also mediating security serious
interactions between clients and services. The most
important three function of Trust broker is as follows:
1) Trust Broker maintain list of licensed services.,2)
Trust Broker evaluates the trust level of given service
using formula which are integrate various parameter
like history of communication with that service. And
3) Trust Broker maintains an end-to-end session of
service invocation where the different services
invoked from the start to the end of that session are
logged by Trust Broker.
The Trust Broker was implemented as a web
service in the java 7.0 platform and deployed on
boston.cs.purdue.edu. Trust Broker which stores all
data concerning session and services in MySQL
database that is setup on same machine. The Trust
Broker web service offers the following public
method:
1) Get Trust Level (servicekey):-This method gives
the key of a service which is registered in UDDI
and returns the trust level which is calculated by
the trust evaluation module.
2) Create Session (trustclass, invokedservice):-This
method returns a single session identifier which
needs to be along from client to the invoked
service and from one service to other in the
whole chain of service invocation.
3) Get Session History (sessionID):-This method
returns the register of warnings which is used for
service invocation for session identified with
sessionId.
4) Remove Session (sessionID):-This method
removes the session identifier with session ID
from the trust Broker database.
5) Session Feedback:-This method is used to
connect taint analysis module with trust broker.
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 143 | P a g e
Figure 3. Trust broker structure and its interface with user.
2.3.1 Trust Broker Database
The trust broker database consists of two
tables: Services which are used to maintain the trust
levels and certification information of services. Client
Sessions which are used to maintain an end-to-end
session of service invocations for a client.
2.3.2 Trust Evaluation module
The trust evaluation module of the trust
broker which is used to calculate trust level of given
service that is based on three things:
1) History of earlier service runs.2) Feedback from
taint analysis module. And 3) WS-supports specified
in service level agreement.
TEM queries the UDDI for calculating trust value of
service which is used following equation:
Ts (t) =β * [α * Ts (t-1) + (1 - α) * F] + (1- β) * L,
Where α < 0.5,
Β is the constant which is weight for the
properties of the service. For the model system,the
values for these constants were chosen arbitrarily so
experiments should be performed to determine the
optimal values for them. The trust value Ts for a
service s, F is feedback parameter is service level
agreement trust value.
In this equation feedback parameter has
values in the interval [-1, 0) when the services in
question misbehaves and values in the interval (0, 1]
when the service behaves as promised. The result of
this equation in the interval [0,1].
2.4 Taint Analysis Module
The work of this module monitors the
activity of services at runtime. It also examines the
data replace between them to identify certain events.
2.4.1 Monitoring Runtime Services
One of the major design requirements of
taint analysis module is transparency to the user
means users are not required to change their
programs or deployment. If we want to achieve this
goal, program instrumentation and extra
instrumentation are automatically added service
implementation.
2.4.2 AOP Framework
Aspect Oriented Programming [7] model
define some specific PCD (point cut designator)
which are included in program execution. The
fundamental point cut designators are chosen
somewhat practically, they must be really helpful to
an aspect programmer, but they must also be
comparatively useful to implement in the AOP
system.
2.4.3 Features of JBoss AOP
JBoss Aspect Oriented Programming [8] is
used to operate an event framework.
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 144 | P a g e
JBoss Aspect Oriented Programming also
used to provide dynamic AOP and hot deployment.
JBoss Aspect Oriented Programming
framework used to support both compile time and
runtime class instrumentation.
2.4.4 Implementation of Taint Analysis
Implementation of Taint Analysis, we
selected JBoss AOP framework. When we use JBoss
AOP, we can almost all classes and methods in the
JBoss AS/ESB servers. This mechanism is very
efficient by using granular point cut. We implement
communication methods inside an action pipeline.
Figure.4 Using Taint Analysis to detect Service Invocations
As shown in the figure 4, all external service
invocation are monitored and reported to the trust
broker. Monitoring services are done for two
activities. First is to check the compliance of those
domains to their registered SLA agreement as
advertised in the public UDDI registry. Second is the
utilization of their data into the trusted service
domain. The function of reporting to the TB is
accomplished by web service invocation to the TB
server. Trust Broker invokes the sessionFeedback()
method.
Figure.5 The interface of taint analysis with trust broker.
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 145 | P a g e
Following method are used when we want to
realize the connection between trust brokers and taint
analysis. This method is also used the API of TB was
extend.
Session Feedback (sessionID, invoker
Service, invokedService):-This method are used for
the taint analysis module for service reports to trust
broker an invocation of invoked service by invoker
Service for the session identified with session ID.
III. RESULTS AND DISCUSSION
This section provides the details of
prototype evaluation and measurements.
3.1 Security Evaluation
SOAP messages are prone to attacks that
can guide to several consequences such as
unauthorized access, disclosure of information which
is based on an on-the-fly modification of SOAP
messages, referred as XML rewriting attacks [10].
The Denial of Service attack technology has
continued to evolve and continues to be used to
attack and impact internet infrastructure. The
implemented model was evaluated in terms of its
effectiveness in justifying XML rewriting
attacks[11][12].Generally, Service Oriented
Architecture systems are susceptible to in transit
sniffing or spoofing.XML rewriting attack refers to
the class of attacks, which involve modifying the
SOAP messages.
We focused in three scenarios and did
different types of XML rewriting attacks.
1) We generated a basic XML replay attack in
which the new message was entirely replaced by
the old message captured by our attack tool.
2) Performing a XML message replay attack when
there are security headers present in the web
service messages.
3) Performing XML message redirect attack when
there are security headers present in the web
service message.
Figure 6. Attack Scenario Setting.
3.2 Performance Measurement in Multi Tenant
Cloud Server
Multitenancy was used to study the impact
of migration of the proposed end to end security
solution to the cloud. In order to ensure that different
services were deployed on different physical
machines,large machine object were launched in
different availability zones of multi tenancy in the
East region as seen in the figures below.[2 figure]
Figure below reports the average response times for
the first 400 request to the Evacuation Timer Service
for the baseline and taint analysis cases. As seen in
the graph.
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 146 | P a g e
Figure.7 Baseline Experiment Setup in the Multi tenant Cloud Server
Figure 8. Taint Analysis Experiment Setup in the Multi tenant Cloud Server
Figure 9 reports the average response times
for the first 400 request to the Evacuation Timer
Service for the baseline and taint analysis cases. In
this graph the response time are still very close up to
4 requests. The overhead is larger but acceptable for
8 and 16 requests.
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 147 | P a g e
Figure 9. Average response time for the first 400 requests in multi-tenant cloud server.
We also conducted experiments to calculate
the performance of the trust broker under growing
loads for the session feedback method. A large
machine instance in the Multi-tenant cloud server
East region was used to host the trust broker for these
experiments. In Figure 10, we shows that the rate of
requests was kept fixed by setting the delay between
consecutive requests by a single thread to 100
milliseconds and increasing the delay proportional to
the number of simultaneous threads. The results for
these experiments show that the Trust Broker is able
to handle 64 simultaneous requests in around 150
milliseconds and 128 requests in around 200
milliseconds.
Figure 10. Average Response Time for Fixed Rate Session Feedback Requests
In the second set of experiments, bursts of
requests were sent at increasing rates, i.e. the delay
between the consecutive requests of all client threads
was set to 100 milliseconds. The results of these
experiments show that the increase in the rate of
requests causes a small overhead in the response time
up to 64 client threads; however there is a big jump in
the overhead after 128 client threads, at which point
load balancing should be considered.
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 148 | P a g e
Figure.11 Average Response Time for Fixed Rate Session Feedback Requests
IV. DISSCUSSION AND FUTURE
WORK
4.1 Security procedure Enforcement:
The main goal of this paper has been to
design a security auditing architecture. So it takes a
retroactive approach for external service calls and
only reports the external invocation events back to
the TB. However, it can easily be converted into a
proactive mechanism to enforce client’s policy. This
could be realized by adding a policy engine XACMl
[14] to TB and employing TA module proactively.
Another variation could be sending the upcoming
service invocation to the TB and requiring services in
an invocation chain to get a confirmation for the next
service they will invoke.
Extension of Cloud Computing: The proposed
architecture partly mitigates the threats posed by
multi-tenancy too, as in the case of a certified service
being under attack, the TA module deployed on the
server will report malicious behavior to the TB. Even
in the case of a TA module under attack, it will be
possible to detect that attack with a slight
modification in the architecture. For that, the TB
would need to wait on feedback from the TA module
of every certified service, which is known to be
invoked by a previous service and update the session
history for that service call with a warning after a
time out period during which no feedback is received.
Investigating new threats for SOA-based systems in
cloud computing environments: Deploying services
in the Cloud brings up the question of potential
security threats due to multi-tenancy. In future work,
we will investigate the possible effects of multi-
tenancy on the proper functioning of the proposed
solution with session history parameter. Experiments
will be performed with multi-tenant Cloud servers,
where attacks will be targeted from one virtual
machine to another to disrupt the functioning of the
TA component and solutions to the problems will be
investigated.
V. RELATED WORK
Many researchers has been studied security
of service oriented architectures. We address the
security issues in SOA by focusing on web service
standards[13][14].We identify the complexity of
certifying SOA services due to the difficulty in
representation of security controls in web services
standards specifications in a constant manner for
verification. In [15] and [16] the identification of
trusted services and dynamic trust assessment in SOA
are studied. We introduce a framework called
RATEWeb for trust-based service selection and work
based on peer feedback. It is based on a set of
decentralized techniques for evaluating reputation-
based trust with ratings from peers. However they do
not take into account initial service invocations and
the secondary services in compositions.
Approaches like [15] and [16] are not
suitable for SOAs with a lot of services because the
monitoring system would need to collect demanding
information from a lot of peers and consumers, which
would make it very expensive. Generally, taint
analysis has been a low level mechanism which has
been used for binary program analysis [19]. But, on
the other hand, low level taint analysis mechanisms
lead to a considerable overhead which is not suitable
for real world services. Moreover, they are dependent
on specific hardware architectures which are not
suitable for real world deployment.DIFC
(Decentralized Information Flow Control) has been
an active area of research in the past few years.
Researchers in [18] [19] [20] have proposed different
labeling mechanisms to secure applications from
untrusted codes. Their approach needs a complete
redesign of the OS which is not practical in the
federated SOA settings. To overcome this problem,
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 149 | P a g e
we [21] propose a language level solution for
information flow control which assigns labels to
every program object that incurs a substantial
overhead. In both mechanisms, we have to change
the source codes of the services. Therefore, we lose
transparency which is a key factor in implementation
of a technology by industry.
VI. CONCLUSION
In this project we proposed an end-to-end
security solution for SOA, which is based on the
introduction of two new security components, i.e. the
“Taint Analysis” module and the “Trust Broker”
service. By providing the ability to track external
service invocations in the completion of a service
request and maintaining dynamic trust values for
services, the proposed architecture allows clients to
be informed about the full chain of service
invocations in a request and possible misbehavior by
services involved in the request. This architecture
both makes it possible to judge the quality of the
response received by the client and increase the
chances of selecting trustworthy services using the
reputation based system. Although the security
architecture described above seems to take more of a
retroactive approach for external service calls, it can
easily be converted into a proactive one by either the
prevention of external service calls to untrusted
services by the TA or by requiring services in an
invocation chain to contact the TB to get
confirmation for the next service they will invoke.
The latter approach will introduce additional delays
in the response for the clients, but may be preferred
for preventive security.
The proposed end-to-end security
architecture is fully compatible with common Web
services standards, as the services and data
communication protocol are not affected by the
security related modifications in the general SOA
structure. The minimal set of web service standards
basic to overcome the security challenges along with
the proposed security components TA and TB were
identified as WS-Security to ensure client and service
authenticity as well as message level security through
encryption and signing; and WS-Trust for the
generation of security tokens required for
authentication. By securing the communication
between the taint analysis modules and the trust
broker using Web Service-Security, the proposed
system ensures authenticity of session feedbacks,
hence preventing unfair increase/decrease of trust
values of services due to targeted feedback from
malicious parties.
Experiments performed in the multi tenant
cloud server suggest that the proposed solution
causes small overhead in terms of the service
response time up to a certain load on the server, at
which point load distribution should be considered.
The same argument holds for the Trust Broker
service as well; i.e. to avoid being a single point of
failure prone to denial of service attacks, the TB
should distribute its load over multiple servers. This
makes the Cloud the best option for hosting the TB
service. With elastic load balancing achieved by on-
the-fly allocation of resources and creation of virtual
machines, a TB service in the Cloud will be able to
meet the demands for different service request loads
and prevent waste of resources in the case of
decreased service traffic.
REFERENCES
[1] Sun Microsystems, Inc.”Introduction to
cloud computing architecture “White Paper
1st
Editor, June 2009.
[2] Douglas Rodrigues, J.C.Estrella, R.L
Kalinka. J.C.Branco, “Analysis of security
and Performance aspects in service oriented
architecture”,International Journal of
security and its application,vol. 5,No
.1,January 2011.
[3] Mehdi Azarmi,Bharat Bhargava,Pelin
Angin,Rohit Ranchal,Normed
Ahmed,Xiangyu Zhang,Asher Sinclair,Mark
Lindermany, Lotfi Ben Othmanez, “An End-
to-End Security Auditing Approach for
Service Oriented Architectures”,Air force
research laboratory Rome,2012.
[4] Asher J.Vitek,”Service Oriented Cloud
Computing Architecture”, UMM CSci
Senior Seminar Conference Morris, MN.
[5] E. Ort. “Service-Oriented Architecture and
Web Services: Concepts, Technologies,and
Tools”,2005.
[6] J. Hutchinson, G. Kotonya, J. Walkerdine,
P. Sawyer, G. Dobson, and V. Onditi,
“Evolving existing systems to service
oriented architectures:Perspective and
challenges,” in IEEE International
Conference on Web Services (ICWS’07),
pp. 896–903.
[7] G. Kiczales, J. Lamping, A. Mendhekar, C.
Maeda, C. Lopes, J. Loingtier, and J. Irwin,
“Aspect-oriented programming,” European
Conference on Object-Oriented
Programming (ECOOP’97), pp. 220–
242,1997.
[8] “JBoss AOP framework,”
http://www.jboss.org/jbossaop, [Online;
Accessed Apr. 2012.].
[9] “Web Service Specifications,”
http://en.wikipedia.org/wiki/List of web
service specifications, [Online; Accessed
Apr. 2012.].
Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150
www.ijera.com 150 | P a g e
[10] A. Ouda, D. Allison, and M. Capretz,
“Security protocols in service oriented
architecture,” in 6th World Congress on
Services, 2010, pp. 185–186.
[11] M. Rahaman and A. Schaad, “Soap-based
secure conversation and collaboration,” in
IEEE International Conference on Web
Services (ICWS’07), 2007, pp. 471–480.
[12] A. Benameur, F. Kadir, and S. Fenet, “Xml
rewriting attacks: Existing solutions and
their limitations,” Arxiv preprint
arXiv:0812.4181, 2008.
[13] R. Baird and R. Gamble, “Developing a
security meta-language framework,”in
Hawaii International Conference on System
Sciences (HICSS 2011), pp. 1–10.
[14] R. Baird and R. F. Gamble, “Security
controls applied to web service
architectures,”in 19th International
Conference on Software Engineering and
Data Engineering, 2010.
[15] Z. Malik, “Rateweb: Reputation assessment
for trust establishment among web services,”
VLDB, vol. 18, no. 4, pp. 885–911, 2009.
[16] G. Spanoudakis and S. LoPresti, “Web
service trust: Towards a dynamic assessment
framework,” in IEEE International
Conference on Availability, Reliability and
Security (ARES 2009), 2009, pp. 33–40.
[17] J. Newsome and D. Song, “Dynamic taint
analysis for automatic detection, analysis,
and signature generation of exploits on
commodity software,” 2005.
[18] N. Zeldovich, S. Boyd-Wickizer, E. Kohler,
and D. Mazi`eres, “Making information
flow explicit in histar,” in Proceedings of the
7th USENIX Symposium on Operating
Systems Design and Implementation, 2006,
pp. 19–19.
[19] P. Efstathopoulos, M. Krohn, S.
VanDeBogart, C. Frey, D. Ziegler,E.
Kohler, D. Mazieres, F. Kaashoek, and R.
Morris, “Labels and event processes in the
asbestos operating system,” ACM SIGOPS
Operating Systems Review, vol. 39, no. 5,
pp. 17–30, 2005.
[20] M. Krohn, A. Yip, M. Brodsky, N. Cliffer,
M. Kaashoek, E. Kohler, and R. Morris,
“Information flow control for standard os
abstractions,” in ACM SIGOPS Operating
Systems Review, vol. 41, no. 6. ACM,
2007,pp. 321–334.
[21] A. Sabelfeld and A. Myers, “Language-
based information-flow security,” Selected
Areas in Communications, IEEE Journal on,
vol. 21, no. 1, pp. 5–19, 2003.

Más contenido relacionado

La actualidad más candente

Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
eSAT Journals
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
Kamal Spring
 

La actualidad más candente (14)

SOA Security - So What?
SOA Security - So What?SOA Security - So What?
SOA Security - So What?
 
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing   An Approach For Testing Security Aspects Of Soa Based ApplicationSoa Testing   An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Introducing CAS 3.0 Protocol: Security and Performance
Introducing CAS 3.0 Protocol: Security and PerformanceIntroducing CAS 3.0 Protocol: Security and Performance
Introducing CAS 3.0 Protocol: Security and Performance
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Shmat ccs12
Shmat ccs12Shmat ccs12
Shmat ccs12
 
ASDF WSS 2014 Paper 003
ASDF WSS 2014 Paper 003ASDF WSS 2014 Paper 003
ASDF WSS 2014 Paper 003
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
 
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 

Destacado (7)

Hacia un marketing ágil. Revista Marketing + Ventas 11/2014
Hacia un marketing ágil.   Revista Marketing + Ventas 11/2014Hacia un marketing ágil.   Revista Marketing + Ventas 11/2014
Hacia un marketing ágil. Revista Marketing + Ventas 11/2014
 
朋友之歌
朋友之歌朋友之歌
朋友之歌
 
Ne islam message sheha
Ne islam message shehaNe islam message sheha
Ne islam message sheha
 
Youcatespaol 130812121417-phpapp01
Youcatespaol 130812121417-phpapp01Youcatespaol 130812121417-phpapp01
Youcatespaol 130812121417-phpapp01
 
AgroCentral
AgroCentralAgroCentral
AgroCentral
 
Memoria intro-091017140306-phpapp02
Memoria intro-091017140306-phpapp02Memoria intro-091017140306-phpapp02
Memoria intro-091017140306-phpapp02
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar a W4502140150

Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 

Similar a W4502140150 (20)

F017353539
F017353539F017353539
F017353539
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applications
 
A017310105
A017310105A017310105
A017310105
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service Discovery
 
Uunit 5-xml&web security
Uunit 5-xml&web securityUunit 5-xml&web security
Uunit 5-xml&web security
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Control
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Control
 
Web Services Security - Short Report
Web Services Security - Short ReportWeb Services Security - Short Report
Web Services Security - Short Report
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web Services
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Web Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris WhitepaperWeb Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris Whitepaper
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdf
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

W4502140150

  • 1. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 140 | P a g e Security Based Service Oriented Architecture in Cloud Environment Asha N. Chaudhary, Prof. Hitesh A. Bheda M.tech (CE) Researcher Scholar RK University, India. Department of computer Engineering. RK University, India. ABSTRACT Service Oriented Architecture is appropriate model for distributed application development in the recent explosion of Internet services and cloud computing.SOA introduces new security challenges which are not present in the single hop client server architectures due to the involvement of multiple service providers in a service request. The interaction of independent services in SOA could break service policies. User in SOA system has no control what happens in the chain of service invocations. Even if the establishment of trust across all involved partners is required as a precondition to ensure secure interactions, still a new end to end security auditing mechanism is needed to verify the actual service invocation. We provide solution for end-to-end security auditing in service oriented architecture. This security architecture introduces two new components called taint analysis and trust broker. It also taking advantage of WS-security and WS-Trust standards. These components maintain session auditing and dynamic trust among services. The solution of these services allows auditing of inheritance services without modification. We also implemented model of the future approach. We also established its efficiency in Amazon EC2 and multi tenancy cloud computing infrastructure. Keywords: Service Oriented Architecture, Cloud Computing, Web Services, Security, Multi tenancy, Performance. I. INTRODUCTION Cloud computing means is a way of using computational resources such as storage, operating systems etc. Which are located remotely and are provided as a service over internet [1].The service oriented architecture is an idea of received significant attention and concern from the software design and development [2]. In software engineering, service oriented architecture is a new model in which is characterized by loose Coupling among software components, called services. SOA permit fast design of new applications by composing smaller special purpose and mixed services [3]. To ass mixed services components in both project and military environment, SOA can provides as the unifying layer [3]. Web service is a proven manufacturing technology that can be used to implement SOA application. The basic necessities of SOA are: (1) the user must be able to control between different clouds as long as they are well-matched. An example would be if a client running an OS on an IaaS cloud. They should be capable in the direction of convey their transformation to the new cloud provider they want to control to [4]. (2) The user must be wanted to create a group of resources. An instance would be two cloud providers work jointly at providing their mutual resources through the same source [4]. Due to a sequence of principles that have been created based on standard extensible Markup language, web services allow interoperability of applications [2].We can say that the most important advantage of using the model of SOA is interoperability which is achieved by the use of typical XML, which permit not only communication of straight usage in the web, but communication between devices ranging from small sensor to a complicated family machine, marketable or manufacturing [2]. To ensure security in this surroundings, new security mechanism must be measured, such as[5],(1)WS-security is a standard of Organization for Advancement of Structured Information Standards in order to SOAP messaging security and providing honesty and confidentiality.(2)Security Assertion Markup Language is another OASIS standard based on XML for exchanging security information.(3)Web Services Business Process Execution Language is an XML based language that is used to organize web service in single business process. The SOAP-Simple Object Access Protocol is main important protocol which is used for web service to connect and is transported over the HTTP- Hyper Text Transfer Protocol [6]. Due to be short of end to end authentication and authorization, security is a demanding matter in service oriented RESEARCH ARTICLE OPEN ACCESS
  • 2. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 141 | P a g e architecture. Attackers are not able to stop unnecessary interception of messages. It is also not possible to secure the unidentified third parties in SOA because of the architecture’s open nature [3]. Present Service Oriented Architecture security solution and web service security standards have the following restriction :( 1) Web service principles are concentrating on transaction between only two communicating service end points. Web service standards do not consider service composition. (2) Outside services are not confirmed or validated dynamically means uniformed assortment of services by user. (3) User has no manage on outside service invocation through a service in another service domain. (4)Violation and malicious activities in a trusted service domain remain hidden. The remainder of this paper is organized as follows: in section II we sketch out the proposed architecture for SOA system. In section III, we explain our model implementation. It also concludes a security and performance evaluation of the model. In section IV, we explain future work. In section V, we explain related work and finally in section VI, we explain conclusion of the paper. II. PROPOSED ARCHITECTURE FOR SOA SYSTEM 2.1 End-to-End SOA Structure The end-to-end SOA architecture consists in two steps: (1) client build request to the initial trusted domain (2) that services can make a service call to another service from trusted domain or an untrusted public domain. Taint analysis and trust broker are two new components in current end-to-end security auditing architecture. Trust broker maintain information about trustworthiness of services and categorizes them. Trust broker is also used for dynamic validation and verification of services and keeps track of history of service invocation. Taint analysis module intercepts the communication. Figure.1 End-to-End Service Oriented Architecture In figure 1, the information sequence depicted is as follows: 1) UDDI (Universal Description, Discovery and integration) Registry request. 2) Forwarding the service list to Trust Broker and receive a categorized list. 3) Invoking a selected service. 4) Second invocation by service in domain A. 5) Invoking a service in public service domain. 6) End points reply to user. 2.2 Integration of Web Service Standards The advantage of Web Service standard in our model which is used to achieve end-to-end security in our system: WS-Security and WS-Trust. 2.2.1 WS-Security WS Security model specifies how integrity and confidentiality can be enforced on message, and allow the communication of various security token formats, such as SAML (Security Assertion Markup Language) and X.509 [9].Its main focus is the use of Extensible Markup Language (XML) signature and Extensible Markup Language (XML) encryption to provide end-to-end security.WS-Security incorporate security features in the header of a SOAP (Simple Object Access Protocol message), specifying how to sign and encrypt SOAP (Simple Object Access Protocol) messages. There are two ways to handle the record management by WS-Security. First it defines a special element, Username Token, which pass the username and password if the web service is using custom authentication.WS-Security also provide binary authentication tokens such as Kerberos Tickets and X.509 certification: Binary Security Token. Figure 2 explain the flow of WS-Securiy.
  • 3. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 142 | P a g e Figure.2 Message Flow of WS-Security. The implementation of WS-Security uses the Apache CXF framework leveragingWSS4J to provide WS-Security functionalities.WSS4J security is triggered through interceptors that are added to the services and clients. 2.2.2 WS-Trust It defines the concept of security token request and response message as well as ways to establish, assess the presence of, and broker trust relationships between participants in a secure message exchange. Elements of WS-Trust 1) Security Token Service is a web service that issues, cancels, renews and validates security tokens as defined in the WS-Security specification.2) Security token request and response message format. And 3) Key-exchange mechanism. The implementation of WS-Trust within web-service libraries which provided by vendors or by open Source cooperative efforts. 2.3 Trust Broker Formation Trust Broker is trusted third party accountable for maintain end-to-end security in a chain of service invocation based on request of a client. It can also mediating security serious interactions between clients and services. The most important three function of Trust broker is as follows: 1) Trust Broker maintain list of licensed services.,2) Trust Broker evaluates the trust level of given service using formula which are integrate various parameter like history of communication with that service. And 3) Trust Broker maintains an end-to-end session of service invocation where the different services invoked from the start to the end of that session are logged by Trust Broker. The Trust Broker was implemented as a web service in the java 7.0 platform and deployed on boston.cs.purdue.edu. Trust Broker which stores all data concerning session and services in MySQL database that is setup on same machine. The Trust Broker web service offers the following public method: 1) Get Trust Level (servicekey):-This method gives the key of a service which is registered in UDDI and returns the trust level which is calculated by the trust evaluation module. 2) Create Session (trustclass, invokedservice):-This method returns a single session identifier which needs to be along from client to the invoked service and from one service to other in the whole chain of service invocation. 3) Get Session History (sessionID):-This method returns the register of warnings which is used for service invocation for session identified with sessionId. 4) Remove Session (sessionID):-This method removes the session identifier with session ID from the trust Broker database. 5) Session Feedback:-This method is used to connect taint analysis module with trust broker.
  • 4. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 143 | P a g e Figure 3. Trust broker structure and its interface with user. 2.3.1 Trust Broker Database The trust broker database consists of two tables: Services which are used to maintain the trust levels and certification information of services. Client Sessions which are used to maintain an end-to-end session of service invocations for a client. 2.3.2 Trust Evaluation module The trust evaluation module of the trust broker which is used to calculate trust level of given service that is based on three things: 1) History of earlier service runs.2) Feedback from taint analysis module. And 3) WS-supports specified in service level agreement. TEM queries the UDDI for calculating trust value of service which is used following equation: Ts (t) =β * [α * Ts (t-1) + (1 - α) * F] + (1- β) * L, Where α < 0.5, Β is the constant which is weight for the properties of the service. For the model system,the values for these constants were chosen arbitrarily so experiments should be performed to determine the optimal values for them. The trust value Ts for a service s, F is feedback parameter is service level agreement trust value. In this equation feedback parameter has values in the interval [-1, 0) when the services in question misbehaves and values in the interval (0, 1] when the service behaves as promised. The result of this equation in the interval [0,1]. 2.4 Taint Analysis Module The work of this module monitors the activity of services at runtime. It also examines the data replace between them to identify certain events. 2.4.1 Monitoring Runtime Services One of the major design requirements of taint analysis module is transparency to the user means users are not required to change their programs or deployment. If we want to achieve this goal, program instrumentation and extra instrumentation are automatically added service implementation. 2.4.2 AOP Framework Aspect Oriented Programming [7] model define some specific PCD (point cut designator) which are included in program execution. The fundamental point cut designators are chosen somewhat practically, they must be really helpful to an aspect programmer, but they must also be comparatively useful to implement in the AOP system. 2.4.3 Features of JBoss AOP JBoss Aspect Oriented Programming [8] is used to operate an event framework.
  • 5. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 144 | P a g e JBoss Aspect Oriented Programming also used to provide dynamic AOP and hot deployment. JBoss Aspect Oriented Programming framework used to support both compile time and runtime class instrumentation. 2.4.4 Implementation of Taint Analysis Implementation of Taint Analysis, we selected JBoss AOP framework. When we use JBoss AOP, we can almost all classes and methods in the JBoss AS/ESB servers. This mechanism is very efficient by using granular point cut. We implement communication methods inside an action pipeline. Figure.4 Using Taint Analysis to detect Service Invocations As shown in the figure 4, all external service invocation are monitored and reported to the trust broker. Monitoring services are done for two activities. First is to check the compliance of those domains to their registered SLA agreement as advertised in the public UDDI registry. Second is the utilization of their data into the trusted service domain. The function of reporting to the TB is accomplished by web service invocation to the TB server. Trust Broker invokes the sessionFeedback() method. Figure.5 The interface of taint analysis with trust broker.
  • 6. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 145 | P a g e Following method are used when we want to realize the connection between trust brokers and taint analysis. This method is also used the API of TB was extend. Session Feedback (sessionID, invoker Service, invokedService):-This method are used for the taint analysis module for service reports to trust broker an invocation of invoked service by invoker Service for the session identified with session ID. III. RESULTS AND DISCUSSION This section provides the details of prototype evaluation and measurements. 3.1 Security Evaluation SOAP messages are prone to attacks that can guide to several consequences such as unauthorized access, disclosure of information which is based on an on-the-fly modification of SOAP messages, referred as XML rewriting attacks [10]. The Denial of Service attack technology has continued to evolve and continues to be used to attack and impact internet infrastructure. The implemented model was evaluated in terms of its effectiveness in justifying XML rewriting attacks[11][12].Generally, Service Oriented Architecture systems are susceptible to in transit sniffing or spoofing.XML rewriting attack refers to the class of attacks, which involve modifying the SOAP messages. We focused in three scenarios and did different types of XML rewriting attacks. 1) We generated a basic XML replay attack in which the new message was entirely replaced by the old message captured by our attack tool. 2) Performing a XML message replay attack when there are security headers present in the web service messages. 3) Performing XML message redirect attack when there are security headers present in the web service message. Figure 6. Attack Scenario Setting. 3.2 Performance Measurement in Multi Tenant Cloud Server Multitenancy was used to study the impact of migration of the proposed end to end security solution to the cloud. In order to ensure that different services were deployed on different physical machines,large machine object were launched in different availability zones of multi tenancy in the East region as seen in the figures below.[2 figure] Figure below reports the average response times for the first 400 request to the Evacuation Timer Service for the baseline and taint analysis cases. As seen in the graph.
  • 7. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 146 | P a g e Figure.7 Baseline Experiment Setup in the Multi tenant Cloud Server Figure 8. Taint Analysis Experiment Setup in the Multi tenant Cloud Server Figure 9 reports the average response times for the first 400 request to the Evacuation Timer Service for the baseline and taint analysis cases. In this graph the response time are still very close up to 4 requests. The overhead is larger but acceptable for 8 and 16 requests.
  • 8. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 147 | P a g e Figure 9. Average response time for the first 400 requests in multi-tenant cloud server. We also conducted experiments to calculate the performance of the trust broker under growing loads for the session feedback method. A large machine instance in the Multi-tenant cloud server East region was used to host the trust broker for these experiments. In Figure 10, we shows that the rate of requests was kept fixed by setting the delay between consecutive requests by a single thread to 100 milliseconds and increasing the delay proportional to the number of simultaneous threads. The results for these experiments show that the Trust Broker is able to handle 64 simultaneous requests in around 150 milliseconds and 128 requests in around 200 milliseconds. Figure 10. Average Response Time for Fixed Rate Session Feedback Requests In the second set of experiments, bursts of requests were sent at increasing rates, i.e. the delay between the consecutive requests of all client threads was set to 100 milliseconds. The results of these experiments show that the increase in the rate of requests causes a small overhead in the response time up to 64 client threads; however there is a big jump in the overhead after 128 client threads, at which point load balancing should be considered.
  • 9. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 148 | P a g e Figure.11 Average Response Time for Fixed Rate Session Feedback Requests IV. DISSCUSSION AND FUTURE WORK 4.1 Security procedure Enforcement: The main goal of this paper has been to design a security auditing architecture. So it takes a retroactive approach for external service calls and only reports the external invocation events back to the TB. However, it can easily be converted into a proactive mechanism to enforce client’s policy. This could be realized by adding a policy engine XACMl [14] to TB and employing TA module proactively. Another variation could be sending the upcoming service invocation to the TB and requiring services in an invocation chain to get a confirmation for the next service they will invoke. Extension of Cloud Computing: The proposed architecture partly mitigates the threats posed by multi-tenancy too, as in the case of a certified service being under attack, the TA module deployed on the server will report malicious behavior to the TB. Even in the case of a TA module under attack, it will be possible to detect that attack with a slight modification in the architecture. For that, the TB would need to wait on feedback from the TA module of every certified service, which is known to be invoked by a previous service and update the session history for that service call with a warning after a time out period during which no feedback is received. Investigating new threats for SOA-based systems in cloud computing environments: Deploying services in the Cloud brings up the question of potential security threats due to multi-tenancy. In future work, we will investigate the possible effects of multi- tenancy on the proper functioning of the proposed solution with session history parameter. Experiments will be performed with multi-tenant Cloud servers, where attacks will be targeted from one virtual machine to another to disrupt the functioning of the TA component and solutions to the problems will be investigated. V. RELATED WORK Many researchers has been studied security of service oriented architectures. We address the security issues in SOA by focusing on web service standards[13][14].We identify the complexity of certifying SOA services due to the difficulty in representation of security controls in web services standards specifications in a constant manner for verification. In [15] and [16] the identification of trusted services and dynamic trust assessment in SOA are studied. We introduce a framework called RATEWeb for trust-based service selection and work based on peer feedback. It is based on a set of decentralized techniques for evaluating reputation- based trust with ratings from peers. However they do not take into account initial service invocations and the secondary services in compositions. Approaches like [15] and [16] are not suitable for SOAs with a lot of services because the monitoring system would need to collect demanding information from a lot of peers and consumers, which would make it very expensive. Generally, taint analysis has been a low level mechanism which has been used for binary program analysis [19]. But, on the other hand, low level taint analysis mechanisms lead to a considerable overhead which is not suitable for real world services. Moreover, they are dependent on specific hardware architectures which are not suitable for real world deployment.DIFC (Decentralized Information Flow Control) has been an active area of research in the past few years. Researchers in [18] [19] [20] have proposed different labeling mechanisms to secure applications from untrusted codes. Their approach needs a complete redesign of the OS which is not practical in the federated SOA settings. To overcome this problem,
  • 10. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 149 | P a g e we [21] propose a language level solution for information flow control which assigns labels to every program object that incurs a substantial overhead. In both mechanisms, we have to change the source codes of the services. Therefore, we lose transparency which is a key factor in implementation of a technology by industry. VI. CONCLUSION In this project we proposed an end-to-end security solution for SOA, which is based on the introduction of two new security components, i.e. the “Taint Analysis” module and the “Trust Broker” service. By providing the ability to track external service invocations in the completion of a service request and maintaining dynamic trust values for services, the proposed architecture allows clients to be informed about the full chain of service invocations in a request and possible misbehavior by services involved in the request. This architecture both makes it possible to judge the quality of the response received by the client and increase the chances of selecting trustworthy services using the reputation based system. Although the security architecture described above seems to take more of a retroactive approach for external service calls, it can easily be converted into a proactive one by either the prevention of external service calls to untrusted services by the TA or by requiring services in an invocation chain to contact the TB to get confirmation for the next service they will invoke. The latter approach will introduce additional delays in the response for the clients, but may be preferred for preventive security. The proposed end-to-end security architecture is fully compatible with common Web services standards, as the services and data communication protocol are not affected by the security related modifications in the general SOA structure. The minimal set of web service standards basic to overcome the security challenges along with the proposed security components TA and TB were identified as WS-Security to ensure client and service authenticity as well as message level security through encryption and signing; and WS-Trust for the generation of security tokens required for authentication. By securing the communication between the taint analysis modules and the trust broker using Web Service-Security, the proposed system ensures authenticity of session feedbacks, hence preventing unfair increase/decrease of trust values of services due to targeted feedback from malicious parties. Experiments performed in the multi tenant cloud server suggest that the proposed solution causes small overhead in terms of the service response time up to a certain load on the server, at which point load distribution should be considered. The same argument holds for the Trust Broker service as well; i.e. to avoid being a single point of failure prone to denial of service attacks, the TB should distribute its load over multiple servers. This makes the Cloud the best option for hosting the TB service. With elastic load balancing achieved by on- the-fly allocation of resources and creation of virtual machines, a TB service in the Cloud will be able to meet the demands for different service request loads and prevent waste of resources in the case of decreased service traffic. REFERENCES [1] Sun Microsystems, Inc.”Introduction to cloud computing architecture “White Paper 1st Editor, June 2009. [2] Douglas Rodrigues, J.C.Estrella, R.L Kalinka. J.C.Branco, “Analysis of security and Performance aspects in service oriented architecture”,International Journal of security and its application,vol. 5,No .1,January 2011. [3] Mehdi Azarmi,Bharat Bhargava,Pelin Angin,Rohit Ranchal,Normed Ahmed,Xiangyu Zhang,Asher Sinclair,Mark Lindermany, Lotfi Ben Othmanez, “An End- to-End Security Auditing Approach for Service Oriented Architectures”,Air force research laboratory Rome,2012. [4] Asher J.Vitek,”Service Oriented Cloud Computing Architecture”, UMM CSci Senior Seminar Conference Morris, MN. [5] E. Ort. “Service-Oriented Architecture and Web Services: Concepts, Technologies,and Tools”,2005. [6] J. Hutchinson, G. Kotonya, J. Walkerdine, P. Sawyer, G. Dobson, and V. Onditi, “Evolving existing systems to service oriented architectures:Perspective and challenges,” in IEEE International Conference on Web Services (ICWS’07), pp. 896–903. [7] G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J. Loingtier, and J. Irwin, “Aspect-oriented programming,” European Conference on Object-Oriented Programming (ECOOP’97), pp. 220– 242,1997. [8] “JBoss AOP framework,” http://www.jboss.org/jbossaop, [Online; Accessed Apr. 2012.]. [9] “Web Service Specifications,” http://en.wikipedia.org/wiki/List of web service specifications, [Online; Accessed Apr. 2012.].
  • 11. Asha N. Chaudhary et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 2), May 2014, pp.140-150 www.ijera.com 150 | P a g e [10] A. Ouda, D. Allison, and M. Capretz, “Security protocols in service oriented architecture,” in 6th World Congress on Services, 2010, pp. 185–186. [11] M. Rahaman and A. Schaad, “Soap-based secure conversation and collaboration,” in IEEE International Conference on Web Services (ICWS’07), 2007, pp. 471–480. [12] A. Benameur, F. Kadir, and S. Fenet, “Xml rewriting attacks: Existing solutions and their limitations,” Arxiv preprint arXiv:0812.4181, 2008. [13] R. Baird and R. Gamble, “Developing a security meta-language framework,”in Hawaii International Conference on System Sciences (HICSS 2011), pp. 1–10. [14] R. Baird and R. F. Gamble, “Security controls applied to web service architectures,”in 19th International Conference on Software Engineering and Data Engineering, 2010. [15] Z. Malik, “Rateweb: Reputation assessment for trust establishment among web services,” VLDB, vol. 18, no. 4, pp. 885–911, 2009. [16] G. Spanoudakis and S. LoPresti, “Web service trust: Towards a dynamic assessment framework,” in IEEE International Conference on Availability, Reliability and Security (ARES 2009), 2009, pp. 33–40. [17] J. Newsome and D. Song, “Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software,” 2005. [18] N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazi`eres, “Making information flow explicit in histar,” in Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, 2006, pp. 19–19. [19] P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler,E. Kohler, D. Mazieres, F. Kaashoek, and R. Morris, “Labels and event processes in the asbestos operating system,” ACM SIGOPS Operating Systems Review, vol. 39, no. 5, pp. 17–30, 2005. [20] M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. Kaashoek, E. Kohler, and R. Morris, “Information flow control for standard os abstractions,” in ACM SIGOPS Operating Systems Review, vol. 41, no. 6. ACM, 2007,pp. 321–334. [21] A. Sabelfeld and A. Myers, “Language- based information-flow security,” Selected Areas in Communications, IEEE Journal on, vol. 21, no. 1, pp. 5–19, 2003.