Privacy Preserving Access Control in Service-Oriented Architecture

被引:7
作者
Ranchal, Rohit [1 ]
Bhargava, Bharat [2 ]
Fernando, Ruchith [2 ]
Lei, Hui [1 ]
Jin, Zhongjun [3 ]
机构
[1] IBM Corp, Watson Hlth Cloud, Cambridge, MA 02142 USA
[2] Purdue Univ, Comp Sci, W Lafayette, IN USA
[3] Univ Michigan, Comp Sci & Engn, Ann Arbor, MI USA
来源
2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS) | 2016年
关键词
service-oriented architecture; composite services; policy enforcement; active bundle; privacy; access control; WEB SERVICES;
D O I
10.1109/ICWS.2016.60
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Service-oriented Architecture (SOA) comprises a number of loosely-coupled independent services, which collaborate, interact and share data to accomplish incoming requests. A service invocation can involve multiple services, where each service accesses, processes and shares the client's data. These interactions may share data with unauthorized services and violate client's privacy. The client has no means of identifying if a violation occurred because it has no control over the service invocations beyond its trust domain. Such interactions introduce new security challenges which are not present in traditional systems. This paper proposes a data-centric approach for privacy preserving access control in SOA. Benefits of the proposed approach include the ability to dynamically define access polices by the clients and control data access at the time of each service interaction. A realistic healthcare scenario is used to evaluate the implementation of the proposed solution which validates its viability.
引用
收藏
页码:412 / 419
页数:8
相关论文
共 19 条
[1]  
[Anonymous], The OAuth 2.0 Authorization Framework, DOI DOI 10.17487/RFC6749
[2]  
[Anonymous], 2005, P IEEE INT C WEB SER
[3]  
[Anonymous], 2003, Proceedings of the 2003 ACM workshop on XML security
[4]   An End-to-End Security Auditing Approach for Service Oriented Architectures [J].
Azarmi, Mehdi ;
Bhargava, Bharat ;
Angin, Pelin ;
Ranchal, Rohit ;
Ahmed, Norman ;
Sinclair, Asher ;
Linderman, Mark ;
Ben Othmane, Lotfi .
2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, :279-284
[5]  
Ben Othmane Lotfi, 2009, Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business. CONGRESS 2009, P202, DOI 10.1109/CONGRESS.2009.30
[6]  
Cantor S., 2005, Protocols and Profiles, V10, P16
[7]   Self Protecting Data Sharing using Generic Policies [J].
Chen, Shiping ;
Thilakanathan, Danan ;
Xu, Donna ;
Nepal, Surya ;
Calvo, Rafael A. .
2015 15TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING, 2015, :1197-1200
[8]  
Cockcroft A., Netflix cloud architecture
[9]  
Fernando R., 2016, P IEEE C CLOUD COMP
[10]   Building scalable, secure, multi-tenant cloud services on IBM Bluemix [J].
Kim, M. ;
Mohindra, A. ;
Muthusamy, V. ;
Ranchal, R. ;
Salapura, V. ;
Slominski, A. ;
Khalaf, R. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2016, 60 (2-3)