Intelligent security and access control framework for service-oriented architecture

被引:10
|
作者
El Yamany, Hany F. [2 ]
Capretz, Miriam A. M. [1 ]
Allison, David S. [1 ]
机构
[1] Univ Western Ontario, Fac Engn, Dept Elect & Comp Engn, London, ON N6A 5B9, Canada
[2] Suez Canal Univ, Fac Comp & Informat, Dept Comp Sci, Ismailia, Egypt
关键词
SOA; Web Services; Intelligent security; Web; 2.0; Data mining;
D O I
10.1016/j.infsof.2009.10.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most significant difficulties with developing Service-Oriented Architecture (SOA) involves meeting its security challenges, since the responsibilities of SOA security are based on both the service providers and the consumers. In recent years, many solutions to these challenges have been implemented, such as the Web Services Security Standards, including WS-Security and WS-Policy. However, those standards are insufficient for the new generation of Web technologies, including Web 2.0 applications. In this research, we propose an intelligent SOA security framework by introducing its two most promising services: the Authentication and Security Service (NSS), and the Authorization Service (AS). The suggested autonomic and reusable services are constructed as an extension of WS- security standards, with the addition of intelligent mining techniques, in order to improve performance and effectiveness. In this research, we apply three different mining techniques: the Association Rules, which helps to predict attacks, the Online Analytical Processing (OLAP) Cube, for authorization, and clustering mining algorithms, which facilitate access control rights representation and automation. Furthermore, a case study is explored to depict the behavior of the proposed services inside an SOA business environment. We believe that this work is a significant step towards achieving dynamic SOA security that automatically controls the access to new versions of Web applications, including analyzing and dropping suspicious SOAP messages and automatically managing authorization roles. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:220 / 236
页数:17
相关论文
共 50 条
  • [1] Privacy Preserving Access Control in Service-Oriented Architecture
    Ranchal, Rohit
    Bhargava, Bharat
    Fernando, Ruchith
    Lei, Hui
    Jin, Zhongjun
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2016, : 412 - 419
  • [2] Exploration of access control mechanisms for service-oriented network architecture
    Rudra, Bhawana
    Vyas, O. P.
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2015, 9 (01) : 1 - 11
  • [3] A Framework and Language Support for Dynamic Security Policy in Service-Oriented Architecture
    Chi Wu-Lee
    Hwang, Gwan-Hwan
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (06) : 1887 - 1903
  • [4] A modeling framework for service-oriented architecture
    Zhang, Tao
    Ying, Shi
    Cao, Sheng
    Jia, Xiangyang
    [J]. QSIC 2006: SIXTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2006, : 219 - +
  • [5] A framework and language support for dynamic security policy in service-oriented architecture
    Department of Computer Science and Information Engineering, National Taiwan Normal University, Taipei
    106, Taiwan
    [J]. Hwang, Gwan-Hwan, 1887, Institute of Information Science (30):
  • [6] An Intelligent Service-Oriented Cloud Computing Architecture
    Zhou, Ding
    Zhang, Jian
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 562 - 568
  • [7] Applying Security within a Service-Oriented Architecture
    Primost, Stephen
    [J]. INFORMATION SECURITY JOURNAL, 2008, 17 (01): : 26 - 32
  • [8] A Framework for Intelligent Tutoring in Collaborative Learning Systems Using Service-Oriented Architecture
    Chua, Fang-Fang
    Lee, Chien-Sing
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT V, 2011, 6786 : 471 - 484
  • [9] Security requirements for a semantic service-oriented architecture
    Duerbeck, Stefan
    Schillinger, Rolf
    Kolter, Jan
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 366 - +
  • [10] Developing a Security Robot in Service-Oriented Architecture
    Chen, Yinong
    Abhyankar, S.
    Xu, L.
    Tsai, W. T.
    Garcia-Acosta, Marcos
    [J]. 12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2008, : 106 - +