Test-Based Security Certification of Composite Services

被引:17
作者
Anisetti, Marco [1 ]
Ardagna, Claudio [1 ]
Damiani, Ernesto [1 ,2 ]
Polegri, Gianluca [3 ]
机构
[1] Univ Milan, Dipartimento Informat Giovanni Antonio, Via Celoria 18, I-20133 Milan, MI, Italy
[2] Khalifa Univ, Ctr Cyber Phys Syst, Abu Dhabi, U Arab Emirates
[3] Engn Ingn Informat SpA, Via S Martino Battaglia 56, I-00185 Rome, RM, Italy
关键词
Cloud; model-based testing; service-oriented architecture; security certification; service composition; software-as-a-service; web services; WEB SERVICES; COMPOSITION ALGORITHM; TRUST; TIME;
D O I
10.1145/3267468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The diffusion of service-based and cloud-based systems has created a scenario where software is often made available as services, offered as commodities over corporate networks or the global net. This scenario supports the definition of business processes as composite services, which are implemented via either static or runtime composition of offerings provided by different suppliers. Fast and accurate evaluation of service's security properties becomes then a fundamental requirement and is nowadays part of the software development process. In this article, we show how the verification of security properties of composite services can be handled by test-based security certification and built to be effective and efficient in dynamic composition scenarios. Our approach builds on existing security certification schemes for monolithic services and extends them towards service compositions. It virtually certifies composite services, starting from certificates awarded to the component services. We describe three heuristic algorithms for generating runtime test-based evidence of the composite service holding the properties. These algorithms are compared with the corresponding exhaustive algorithm to evaluate their quality and performance. We also evaluate the proposed approach in a real-world industrial scenario, which considers ENGpay online payment system of Engineering Ingegneria Informatica S.p.A. The proposed industrial evaluation presents the utility and generality of the proposed approach by showing how certification results can be used as a basis to establish compliance to Payment Card Industry Data Security Standard.
引用
收藏
页数:43
相关论文
共 97 条
[1]   Automated Certification for Compliant Cloud-based Business Processes [J].
Accorsl, Rafael ;
Lowis, Lutz ;
Sato, Yoshinori .
BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2011, 3 (03) :145-154
[2]  
AGGARWAL R, 2004, P 2004 IEEE INT C SE
[3]   A Hybrid Approach for Efficient Web Service Composition with End-to-End QoS Constraints [J].
Alrifai, Mohammad ;
Risse, Thomas ;
Nejdl, Wolfgang .
ACM TRANSACTIONS ON THE WEB, 2012, 6 (02)
[4]  
Alves A., 2007, Web Services Business Process Execution Language Version 2.0
[5]   Using mutation analysis for assessing and comparing testing coverage criteria [J].
Andrews, James H. ;
Briand, Lionel C. ;
Labiche, Yvan ;
Namin, Akbar Siami .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2006, 32 (08) :608-624
[6]   Modeling time, probability, and configuration constraints for continuous cloud service certification [J].
Anisetti, M. ;
Ardagna, C. A. ;
Damiani, E. ;
El Ioini, N. ;
Gaudenzi, F. .
COMPUTERS & SECURITY, 2018, 72 :234-254
[7]  
Anisetti M., 2017, IEEE T SERV COMPUT
[8]  
Anisetti M., 2016, P ACM S APPL COMP SA
[9]  
Anisetti M., 2013, P 20 IEEE INT C WEB
[10]  
Anisetti M., 2011, P IEEE INT C SERV CO