Abstract
One way to ensure reliable and secure composite web service delivery is by making them autonomous (i.e., become self-managing services, where they can be self-organizing, self-healing, self-optimizing, and self-protecting). The CRESCENT framework was previously proposed towards achieving such vision. It managed to satisfy the first three properties, but did not handle the self-protection property. To overcome such limitation, this paper extends CRESCENT and proposes CRESCENT+; a self-protecting framework for reliable composite web service delivery. This is done by performing vulnerability analysis to identify CRESCENT weaknesses, then performing a STRIDE-based threat analysis to identify possible attacks on CRESCENT, and finally proposing different solutions and countermeasures to be integrated into CRESCENT to overcome such problems. Experimental results show that CRESCENT+ increased the reliability of the CRESCENT framework trading off the overall throughput. However, we argue that such loss in the overall throughput is still acceptable as a price for having autonomous composite web services; especially, the obtained overall throughput is still higher than existing industrial standards.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
SecurITree - attack tree-based modeling software. Amenaza Technologies Limited [Online]. http://www.amenaza.com/. Accessed 5 Sep 2014
The STRIDE Threat Model, Microsoft [Online]. http://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx. Accessed: 20 Sep 2014
Amir, Y., Coan, B., Kirsch, J., Lane, J.: Customizable fault tolerance for wide-area replication. In: Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (2007)
Bertino, E., Martino, L., Paci, F., Squicciarini, A.: Web services threats, vulnerabilities, and countermeasures. In: Security for Web Services and Service-Oriented Architectures, pp. 25–44. Springer, Berlin (2010)
Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distrib. Parallel Databases. 18(1), 83–105 (2005)
Biskup, J., Carminati, B., Ferrari, E., Muller, F., Wortmann, S.: Towards secure execution orders for compositeweb services. In: Web Services, 2007. ICWS 2007. IEEE International Conference on IEEE, pp. 489–496 (2007)
Carminati, B., Ferrari, E., Hung, P.C.: Web service composition: a security perspective. In: Web Information Retrieval and Integration, 2005. WIRI’05. Proceedings. International Workshop on Challenges in IEEE, pp. 248–253 (2005)
Carminati, B., Ferrari, E., Hung, P.C.: Security conscious web service composition. In: Web Services, 2006. ICWS’06. International Conference on IEEE, pp. 489–496 (2006)
Charfi, A., Mezini, M.: Using aspects for security engineering of web service compositions. In: Web Services, 2005. ICWS 2005. Proceedings. 2005 IEEE International Conference on IEEE, pp. 59–66 (2005)
Elgedawy, I.: CRESCENT: a reliable framework for durable composite web services management. Comput. J. 58(2), 280–299 (2015)
Elgedawy, I.: USTA: an aspect-oriented knowledge management framework for reusable assets discovery. Arab. J. Sci. Eng. 40(2), 451–474 (2015)
Elgedawy, I.: GEMINI: a hybrid byzantine fault tolerant protocol for reliable composite web services orchestrated delivery. Int. J. Comput. Theory Eng. (IJCTE) 8(5), 355–361 (2016)
Elgedawy, I.: JAMEJAM: a framework for automating the service discovery process. J. Softw. (JSW) 11(7), 646–655 (2016)
Elgedawy, I.: Wsla extensions for managing composite semantic web services. In: Proceedings of the first IEEE International Conference on Knowledge Engineering and Applications (ICKEA). Singapore (2016)
Elgedawy, I.: DISCO: a dynamic self-configuring discovery service for semantic web services. In: Proceedings of the 7th International Conference on Cloud Computing and Service Science (CLOSER). Porto, Portugal (2017)
Ghosh, R., Naik, V.: Biting off safely more than you can chew: Predictive analytics for resource over-commit in iaas cloud. In: IEEE 5th International Conference on Cloud Computing (2012)
Goettelmann, E., Fdhila, W., Godart, C.: Partitioning and cloud deployment of composite web services under security constraints. In: Cloud Engineering (IC2E), 2013 IEEE International Conference on IEEE, pp. 193–200 (2013)
Hutter, D., Volkamer, M.: Information flow control to secure dynamic web service composition. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol. 3934, pp. 196–210. Springer, Berlin (2006)
Kakogiannis, D.: M/M/1 Simulator. https://www.mathworks.com/matlabcentral/fileexchange/6743-mm1-simulator (2005). Accessed: 12 July 2017
Karimi, S., Babamir, S.: Efficient intelligent secure for web service composition. In: International Conference on Communication Engineering (2010)
Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41–50 (2003)
Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. pp. 167–186 (2004). https://doi.org/10.1016/j.peva.2003.07.008
Mao, Y., Junqueira, F.P., Marzullo, K.: Mencius: building efficient replicated state machines for wans. In: Proceedings of the 8th USENIX Conference on Operating systems Design and Implementation, OSDI’08, pp. 369–384 (2008)
OASIS Committe: Security assertion markup language (saml). http://www.oasis-open.org/committees/security (2013). Accessed 12 July 2017
OASIS Committee Specification 1: eXtensible Access Control Markup Language (XACML) version 3.0. (oasis 2010). http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf (2010). Accessed 12 July 2017
Papazoglou, M.P., van den Heuvel, W.J.: Web services management: a survey 58–64 (2005)
Sathiaseelan, J.: Architectural framework for secure composite web services. Citeseer (2013)
Satoh, F., Tokuda, T.: Security policy composition for composite web services. Serv. Comput. IEEE Trans. 4(4), 314–327 (2011). https://doi.org/10.1109/TSC.2010.40
She, W., Yen, I.L., Thuraisingham, B.: Enhancing security modeling for web services using delegation and pass-on. In: Web Services, 2008. ICWS’08. IEEE International Conference on IEEE, pp. 545–552 (2008)
Souza, A.R.R., Silva, B.L. B., Lins, F.A.A., Damasceno J.C., Rosa N.S., Maciel, P.R.M., Medeiros, R.W.A., Stephenson, B., Motahari-Nezhad, H.R., Li, J., Northfleet, C.: Incorporating security requirements into service composition: from modelling to execution. In: Baresi L., Chi CH., Suzuki J. (eds) Service-Oriented Computing. Lecture Notes in Computer Science, vol. 5900, pp. 373–388. Springer, Berlin (2009)
Yan, D., Tian, Y., Huang, J., Yang, F.: Privacy-aware RBAC model for web services composition. J. China Univ. Posts Telecommun. 20(1), 30–34 (2013)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Elgedawy, I., Khurshid, S., Masood, R. et al. CRESCENT+: a self-protecting framework for reliable composite web service delivery. Iran J Comput Sci 1, 65–87 (2018). https://doi.org/10.1007/s42044-018-0008-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42044-018-0008-3