Security Issues in Service Oriented Manufacturing Architectures with Distributed Intelligence

Author(s):  
Cristina Morariu ◽  
Octavian Morariu ◽  
Theodor Borangiu
Author(s):  
Rizwan Ur Rahman ◽  
Divya Rishi Sahu ◽  
Deepak Singh Tomar

Web services and Service oriented architecture are innovative phase of distributed computing, build on top of the distributed computing models. Web services are being used mostly for the integration business components. One of the key concerns in web services and service oriented architecture is implementation of adequate security. Security issues in SOA are still probing and in spite of an increase in web service research and development, many security challenges remain unanswered. This chapter introduces the vulnerabilities, threats associated with web services and addresses WS-Security standards and countermeasures. Web service protocol is designed to provide connectivity. Not any of these standards of web services contain any inbuilt security aspect of their own. Web Services are exposed to attack from common Internet protocols and in addition to new categories of attacks targeting Web Services in particular. Consequently, the aim of this chapter is to provide review of security mechanism in web services.


As with growing internet, the objects in the system need to implant with the external environment. Every object is resided in distinct place and works in an interoperable way. This process of Smart living which involves various smart devices – Smart phones, Sensors, Actuators, Radio Frequency Identification (RFID) tags, etc., evolving in this modern era is coined as Future Internet or Internet of Things (IOT). This IOT associated with distinguished services and visions through which it can be identified among various domains. A distributed intelligence needs to be employed to the application specific machine in order to serve the human perception for the sake of smart forensics. This paper explores and interprets the next generation internet, its components, standards and services along with their applications in diversified fields. Authors provide a systematic exploration of existing IoT products in the marketplace and highlights several possibly meaningful research objectives and drifts.


2021 ◽  
Vol 49 (1) ◽  
Author(s):  
Mohamed Ibrahim ◽  
◽  
Beer Mohamed ◽  
Mohd Fadzil Hassan ◽  
◽  
...  

Service oriented enterprise computing is an integration architectural style aimed to expose and consume coarse grained and fine grained modularization of business functionalities as services that are being deployed in the loosely coupled organizational environment. The web service is the implementation technology of service oriented architecture (SOA) where it is built on the existing networking and web interfacing standards as it has to use the web as a medium of communication and does not have any specialized in-built layer for security. The majority of the vendor security products in the market need specialized hardware/software components, eventually, they break the standards and principles of service oriented architecture. The traditional way of problem solving is not effective for developing security solutions for service oriented computing, as its boundaries keep expanding beyond a single organiza-tional environment due to the advent of communication and business technologies such as the Internet of Things (IoT), hyper-personalization, and edge computing. Hence, it is a mandatory entity in this digital age of enterprise computing to have a specialized authentication and authorization solution exclusively for addressing the existing security gaps in SOA in an adaptive way forward approach. In this paper, the security gaps in the existing Identity and Access Management (IDAM) solutions for service oriented enterprise computing are analyzed, and a novel intelligent security engine which is packed with extended authentication and authorization solution model for service consumption is presented. The authentication and authorization security requirements are considered as cross cutting concerns of SOA implementation and the solution is constructed as Aspect-Oriented Programming (AOP) advices, which enables the solution can be attached as a ‘plug & play’ component without changing the underlying source code of the service implementation. For Proof-of-Concept (PoC), the proposed authentication and authorization security model is tested in a large scale service oriented enterprise computing environment and the results have been analyzed statistically. It is evident from the results that the proposed security model addresses security issues comparatively better than existing security solutions.


2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Muhammad Aamir Nadeem

Cloud Computing is a recently emerged paradigm, for sure out of infancy but yet not matured, is aiming at provisioning of computing resources in most efficient and economical way. Virtualization is the key technique behind Cloud Computing. It adopts Service Oriented Architecture which enables its clients to transform their requirements problems into services thus benefited by the solution provided by the Cloud. Besides provisioning of computing and storage resources, it expanded the traditional threat environment. The vulnerabilities and threats to Cloud are the issues which if successfully overcome would make Cloud a digital fort for its users. This paper surveys the weaknesses in Cloud architecture, internet protocols, operating system and application software, and in crypto system. It also identifies the challenges related to Cloud security and counter measures to resolve those issues.


2020 ◽  
Vol 13 (1) ◽  
pp. 101
Author(s):  
Qian He ◽  
Hong He

Due to the increasing growth of technologies and the diversity of user needs in the field of information technology, the position of cloud computing is becoming more apparent. The development of computing infrastructure in any organization requires spending a lot of money, time, and manpower, which sometimes does not fit into the operational capacity of an organization. Therefore, organizations tend to use such technologies to advance their goals. A fully open and distributed structure in cloud computing and its services makes it an attractive target for attackers. This structure includes multiple service-oriented and distributed paradigms, multiple leases, multiple domains, and multi-user autonomous management structures that are more prone to security threats and vulnerabilities. In this paper, the basic concepts of the cloud computing and its applications have been investigated regarding to the importance of security issues. The proposed algorithm improves the level of security in the cloud computing platform through data mining and decision tree algorithm. Low computational burden and client numbers independency help to effectively implement the proposed algorithm in reality.


2013 ◽  
Vol 336-338 ◽  
pp. 2348-2353 ◽  
Author(s):  
Bo Yu ◽  
Lin Yang ◽  
Shu Hui Chen ◽  
Lin Ru Ma

Service computing facilitates resource sharing and business collaboration for cross-domain partiers by universal service description and discovery. The multi-domain nature of service oriented environments introduces challenging security issues, especially with regard to information flow control which controls the flow of privacy resources. This paper presents a state-of-the-art review of information flow control technology in service oriented environments. We review the research background and classifications of information flow control, and discuss architecture and existing technologies of both centralized and distributed information flow approach. We outline the features, advantages and limitations of existing information flow control approaches. The analysis results show that the research of collaboration and dynamic nature are important, but insufficient to secure information flow.


Author(s):  
Abdellah Touhafi ◽  
An Braeken ◽  
Gianluca Cornetta ◽  
Nele Mentens ◽  
Kris Steenhaut

The aim of this chapter is to give a thorough overview of secure remote reconfiguration technologies for wireless embedded systems, and of the communication standard commonly used in those systems. In particular, we focus on basic security mechanisms both at hardware and protocol level. We will discuss the possible threats and their corresponding impact level. Different countermeasures for avoiding these security issues are explained. Finally, we present a complete and compact solution for a service-oriented architecture enabling secure remote reconfiguration of wireless embedded systems, called the STRES system.


Sign in / Sign up

Export Citation Format

Share Document