Privacy Protection for Role-Based Access Control in Service Oriented Architecture

Author(s):  
Helen Cheung ◽  
Celia Li ◽  
Ye Yu ◽  
Cungang Yang
Author(s):  
Khurrum Mustafa Abbasi ◽  
Irfan ul Haq ◽  
Ahmad Kamran Malik ◽  
Basit Raza ◽  
Adeel Anjum

Service-Oriented Architecture (SOA) has introduced a phenomena of system's interaction with maximum users. With the development of high speed Internet services, the use of remote devices and software has rapidly increased. It has opened new gateways for renting out resources. The Cloud Service Chain is a process of ownership transfer of a service at different levels by different service providers. The concept of service chain poses novel challenges related to security, trust and privacy of data. In this chapter, we are introducing a mechanism of access control for Cloud service chains. We have discussed the realization of Role-Based Access Control (RBAC) to services of Federated-Cloud. When services are purchased in bundle, separate SLA is signed for each. We are also going to introduce a dynamic Role-Level Agreement (RLA) for such type of access control to services. The RLA will be an aggregated SLA for different services in a role. This will be helpful for service providers and the customers to sign a single document for a bundle rather than having separate one for every service.


2021 ◽  
Author(s):  
Ye Yu

Service Oriented Architecture (SOA) changes the way of conducting business by opening their services/information to the larger business world over the networks. However, properties of "open" and "interoperable" of SOA make privacy security a sensitive issue since this architecture combines unknown individuals and individuals systems together. In SOA, service providers limit the permission of access to specific authorized individuals only, so they have to verify these individuals' identity information to decide if permission should be granted or not. On the other hand, access requestors are not willing to disclose their privacy in an open system to unknown parties. In this thesis, we present cryptography-based protocols to solve this issue of conflict. Our protocols are proposed for Role-Based Access Control (RBAC), which is a most popular access control methodology, in SOA environment. In addition, our protocols are compatible with current SOA standards and technologies such as XACML and SOAP.


2021 ◽  
Author(s):  
Ye Yu

Service Oriented Architecture (SOA) changes the way of conducting business by opening their services/information to the larger business world over the networks. However, properties of "open" and "interoperable" of SOA make privacy security a sensitive issue since this architecture combines unknown individuals and individuals systems together. In SOA, service providers limit the permission of access to specific authorized individuals only, so they have to verify these individuals' identity information to decide if permission should be granted or not. On the other hand, access requestors are not willing to disclose their privacy in an open system to unknown parties. In this thesis, we present cryptography-based protocols to solve this issue of conflict. Our protocols are proposed for Role-Based Access Control (RBAC), which is a most popular access control methodology, in SOA environment. In addition, our protocols are compatible with current SOA standards and technologies such as XACML and SOAP.


2012 ◽  
Vol 263-266 ◽  
pp. 1527-1535
Author(s):  
Ming Xiang He ◽  
Qing Ye Sun ◽  
Feng Shan ◽  
Xin Ming Lu

A maximum-meet user’s individual needs integration model was presented in this paper, which integrated information integration thinking, Web3.0 with open platform. The model embedded Service-Oriented Architecture (SOA) framework realized the information integration. Then combined the OpenID ,OAuth, and role-based access control (RBAC) achieved single sign-on and authorization system; finally, based on Maps API Mashup applications realized the interaction between the LAN Web information and maps. The model has the advantage of friendly interface, strong replicability, and high security.


Sign in / Sign up

Export Citation Format

Share Document