Applying Spring Security Framework with KeyCloak-based OAuth2 to Protect Microservice Architecture APIs for a Health eCoach System: A Proof-of-Concept Study (Preprint)

2021 ◽  
Author(s):  
Ayan Chatterjee ◽  
Andreas Prinz

UNSTRUCTURED The Internet of Medical Things (IoMT) combines medical devices and applications connected to healthcare information technology systems using network technologies. With the flourishing adaptation rate of Internet-enabled medical devices in healthcare applications, we need to guarantee the security and privacy of electronic health records (EHRs) and communications among these IoMT devices, exposed web services, and the underlying infrastructure. This research is a proof-of-concept (PoC) study for implementing an integrated security solution with Spring Security and KeyCloak open-access platform (SSK) to safeguard microservice architecture application programming interfaces (APIs). Subsequently, we extended the security solution with a virtual private network (VPN), Bcrypt hash, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure following the Norwegian data protection policies and General Data Protection Regulation (GDPR). In this study, we have not proposed any new security solution; however, we have focused on accomplishing a hybrid security solution based on the established frameworks (e.g., Spring Security) and open-access software product (e.g., Keycloak) to protect microservice APIs for a health eCoach system as a PoC study. This study describes the methodological, technical, and practical considerations to protect REST interfaces only and ensuring the privacy of data in the system. We validate our SSK security implementation by theoretical evaluation and experimental testing. In addition, we compare the test results with related studies qualitatively to determine the effectiveness of the hybrid security solution (SSK).

Author(s):  
Yesha Bhatt ◽  
Dr. Priyanka Sharma ◽  
Jatin Patel

In the present advanced time, innovation plays a vital part inside the improvement of business, E-commerce, and Finance. In present days Network security become a significant thought. Internet gives a great facility to everyone like internet banking, Online shopping, Communications, organizations or associations. Therefore, the online exchange of cash requires the most extreme security of secret information put away or move over the Internet. The security of these exchanges has made it more important because of the high impact of Cybercrimes on a Digital Money. Because of the high-speed advancement of computerized devices and their appearance to the Internet made insecure client’s information. Now a days, security and privacy threats has become increasingly more complex which enhance the necessity for a modernized ensured medium to get the significant information into the internet. In this paper, presented Virtual Private Network (VPN) is an excellent method to secure devices and data from the hackers. VPN is a private network which works over a public network transit the encrypted data so that hackers are not able to use it. The reason for VPN is to give the different security model like Authenticity, Confidentiality and Integrity of data that is the reason these are getting trendy, low in budget and simple to utilize. VPN services are accessible for smart phones, PCs and tablets. It is a rising innovation which assumes a significant part in WLAN by giving secure information transmission over Internet.


2020 ◽  
Vol 3 (1) ◽  
pp. 31-57
Author(s):  
Shahad A. Alashi ◽  
Hanaa A. Aldahawi

By using the research process, this study addresses the attitudes of the members of Saudi society towards using Virtual Private Network (VPN) applications and the former’s perceptions of the latter’s concept, security, and privacy, in addition to monitoring their risks to cybersecurity. The main objective of the study is to present a proposed framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia to strengthen cybersecurity management. To achieve the objectives of the study, the researchers used two methods: the social survey method and the content analysis method. The researchers also relied on the questionnaire tool to collect information from the 455 individuals in the study sample. The study yielded a set of findings, the most important of which are as follows: The use of free VPN applications represents 91% of the sample of the study. Also, the study revealed confusion in perceptions of the actual concept of VPN applications, which may be common among users, and showed a diversity of attitudes and motives for using VPN applications, most of which are related to entertainment. Moreover, the study showed that the study sample individuals had some knowledge about the risks of VPN applications to cybersecurity, although most of them did not use cyber protection means. The study recommended the need to organize and manage the use of VPN applications, conduct an evaluation of VPN applications available on Saudi smartphone stores, and prohibit those which contain security vulnerabilities and malware. The study proposed a framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia, which comprised three dimensions: legal, organizational and awareness-based dimensions.


2020 ◽  
Vol 8 (6) ◽  
pp. 2236-2339

Network security becomes a major consideration of the current era. Internet provides an enormous ease in almost all the regions like online banking, online shopping, communications, businesses or organisations. Thus, the communication network requires the security of the confidential data stored or transfer over the internet. Due to the quick development of computerized gadgets and their entrance to the internet caused insecurity to user data. Now a days, security and privacy threats has become more and more complicated which amplify the requirement for a modernized protected medium to secure the valuable data into the internet. In this paper, introduced Virtual Private Network (VPN) is a great way to protect devices and information from the hackers. VPN is a private network which operates over a public network transit the encrypted information so that attackers are not able to use it. The purpose of VPN is to provide the different security elements such as authenticity, confidentiality and data integrity that’s why these are becoming trendy, low-priced and easy to use. VPN services are available for smart phones, computers and tablets. This paper also concerns about the development, protocols, tunnelling and security of VPN. It is a rising technology which plays a major role in WLAN by providing secure data transmission over Internet.


Author(s):  
I Wayan Eka Putra Darmawan

VoIP (Voice over Internet) dikenal juga dengan sebutan IP (Internet Protocol) Telephony saat ini semakin banyak digunakan karena memiliki beberapa keunggulan, salah satu diantaranya yaitu tarif yang jauh lebih murah daripada tarif telepon tradisional sehinggapengguna telepon dapat memilih layanan tersebut sesuai dengan kebutuhannya. VoIP dapat mereduksi biaya percakapan sampai 70%. Selain memiliki beberapa keunggulan di atas,VoIP juga memiliki kelemahan yang sangat vital yaitu dari segi keamanan transfer suarakarena berbasis IP, sehingga siapapun bisa melakukan penyadapan dan perekaman terhadap data VoIP. Ganguan yang terjadi pada sistem VoIP ada berbagai macam diantaranya, transferdata yang lewat pada suatu jaringan seperti misalnya dapat disalahgunakan (abuse), dapatdibajak isi data tersebut (sniffing), dan tidak dapat mengakses server dikarenakan server yang kelebihan muatan (Denial of Services).Ada beberapa cara untuk mengamankan komunikasi data VoIP, antara lain, dengan mengamankan jalur yang digunakan pengguna untuk melakukan komunikasi VoIP denganmenggunakan metode VPN (Virtual Private Network) dan juga dapat dilakukan suatu metode kriptografi pada aplikasi VoIP tersebut sehingga data yang dikirimkan dapat dilindungidengan baik. VPN adalah teknik pengaman jaringan yang bekerja dengan cara membuat suatu tunnel sehingga jaringan yang dipercaya dapat menghubungkan jaringan yang ada diluar melalui internet. Titik akhir dari VPN adalah tersambungnya Virtual Channels (VCs)dengan cara pemisahan. Kenyataannya koneksi sebuah end-to-end VPN tergantung dari sebuah nilai dari hubungan daripada titik-titiknya. VPN mempunyai dua metode dalampengamanan yakni IPSec dan Crypto IP Encapsulation (CIPE). Selain itu dapat dipergunakan teknik Kriptografi (cryptography) yang merupakan ilmu dan seni penyimpanan pesan, data,atau informasi secara aman.Sistem VoIP menggunakan VPN ini diharapkan dapat memberikan keamanan transfer data pada jaringan internet maupun intranet.


2019 ◽  
Vol 7 (2) ◽  
pp. 129
Author(s):  
Firmansyah Firmansyah ◽  
Mochamad Wahyudi ◽  
Rachmat Adi Purnama

2019 ◽  
Author(s):  
Amarudin ◽  
Sampurna Dadi Riskiono

Akhir-akhir ini sudah mulai banyak perusahaan yang memanfaatkan protokol Virtual Private Network (VPN) sebagai media akses/komunikasi antar jaringan interlokal. VPN adalah sebuah protokol keamanan jaringan yang dapat digunakan sebagai salah satu cara untuk meningkatkan keamanan jaringan dari sisi transmisi data. Dengan pemanfaatan VPN, koneksi antar jaringan dapat terbentuk secara virtual walaupun tidak terbentuk secara fisik. Selain itu, dengan memanfaatkan protokol VPN, user (client) dapat mengkases Server secara private melalui jaringan public. Dengan demikian komunikasi antara Client dan Server terjaga dari Sniffing (penyadapan) dari pihak yang tidak bertanggung jawab. Akan tetap tingkat keamanan yang dihasilkan dari penerapan VPN ini perlu dilakukan pengkajian yang lebih dalam. Sehingga tingkat keamanannya dapat diketahui apakah sudah termasuk dalam kategori aman ataukah masih ada peluang bug yang membahayakan dari penetrasi. Dalam penelitian ini dilakukan pengujian Scanning dan Sniffing pada penerapan VPN menggunakan toos hacking yaitu Nmap dan Wireshark. Sedangkan pengujian performansi service pada VPN Server, dilakukan pengujian Denial of Service (DoS) menggunakan tools hacking yaitu LOIC. Adapun objek penelitian ini adalah perangkat Mikrotik RouterOS yang digunakan pada Universitas Teknokrat Indonesia. Hasil penelitian yang didapatkan bahwa komunikasi data antar jaringan (antara VPN Server dan VPN Client) dapat terenkripsi dengan baik. Akan tetapi dari segi konektifitas antar jaringan sangat dipengaruhi oleh performansi bandwidth yang digunakan oleh sistem jaringan tersebut. Selain itu berdasarkan hasil pengujian performansi service pada VPN Server didapatkan hasil bahwa service pada VPN Server dapat dimatikan pada request (ping) sebesar 1.899.276 request. Hal ini dipengaruhi oleh spesifikasi perangkat Mikrotik RouterOS yang digunakan. Adapun untuk penelitian selanjutnya perlu dilakukan pengujian performansi konektifitas menggunakan bandwith yang lebih besar dan untuk menguji performansi service VPN Server menggunakan spesifikasi perangkat Mikrotik yang lebih baik.


2002 ◽  
Author(s):  
Ranga S. Ramanujan ◽  
Doug Harper ◽  
Maher Kaddoura ◽  
David Baca ◽  
John Wu ◽  
...  

Author(s):  
S. Phani Praveen ◽  
T. Bala Murali Krishna ◽  
Sunil K. Chawla ◽  
CH Anuradha

Background: Every organization generally uses a VPN service individually to leather the actual communication. Such communication is actually not allowed by organization monitoring network. But these institutes are not in a position to spend huge amount of funds on secure sockets layer to monitor traffic over their computer networks. Objective: Our work suggests simple technique to block or detect annoying VPN clients inside the network activities. This method does not requires the network to decrypt or even decode any network communication. Method: The proposed solution selects two machine learning techniques Feature Tree and K-means as classifiction techniques which work on time related features. First, the DNS mapping with the ordinary characteristic of the transmission control protocol / internet protocol computer network stack is identified and it is not to be considered as a normal traiffic flow if the domain name information is not available. The process also examines non-standard utilization of hyper text transfer protocol security and also conceal such communication from hyper text transfer protocol security dependent filters in firewall to detect as anomaly in largely. Results: we define the trafic flow as normal trafic flow and VPN traffic flow. These two flows are characterized by taking two machine learning techniques Feature Tree and K-means. We have executed each experment 4 times. As a result, eight types of regular traffics and eight types of VPN traffics were represented. Conclusion: Once trafic flow is identified, it is classified and studied by machine learning techniques. Using time related features, the traffic flow is defined as normal flow or VPN traffic flow.


2021 ◽  
Vol 1 ◽  
pp. 3199-3208
Author(s):  
Emanuel Balzan ◽  
Pierre Vella ◽  
Philip Farrugia ◽  
Edward Abela ◽  
Glenn Cassar ◽  
...  

AbstractResearch funded projects are often concerned with the development of proof-of-concept products. Consequently, activities related to verification and validation testing (VVT) are often not considered in depth, even though various design iterations are carried out to refine an idea. Furthermore, the introduction of additive manufacturing (AM) has facilitated, in particular, the development of bespoke medical products. End bespoke products, which will be used by relevant stakeholders (e.g. patients and clinicians) are fabricated with the same manufacturing technologies used during prototyping. As a result, the detailed design stage of products fabricated by AM is much shorter. Therefore, to improve the market-readiness of bespoke medical devices, testing must be integrated within the development from an early stage, allowing better planning of resources. To address these issues, in this paper, a comprehensive VVT framework is proposed for research projects, which lack a VVT infrastructure. The framework builds up on previous studies and methods utilised in industry to enable project key experts to capture risks as early as the concept design stage.


Sign in / Sign up

Export Citation Format

Share Document