Security policy monitoring of BPMN-based service compositions

被引:27
作者
Asim, Muhammad [1 ]
Yautsiukhin, Artsiom [2 ]
Brucker, Achim D. [3 ]
Baker, Thar [4 ]
Shi, Qi [4 ]
Lempereur, Brett [4 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Comp Sci, Islamabad, Pakistan
[2] IIT CNR, Pisa, Italy
[3] Univ Sheffield, Dept Comp Sci, Sheffield, S Yorkshire, England
[4] Liverpool John Moores Univ, Dept Comp Sci, Liverpool, Merseyside, England
关键词
business process compliance; compliance monitoring; composite services; security; service-oriented computing;
D O I
10.1002/smr.1944
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Service composition is a key concept of Service-Oriented Architecture that allows for combining loosely coupled services that are offered and operated by different service providers. Such environments are expected to dynamically respond to changes that may occur at runtime, including changes in the environment and individual services themselves. Therefore, it is crucial to monitor these loosely coupled services throughout their lifetime. In this paper, we present a novel framework for monitoring services at runtime and ensuring that services behave as they have promised. In particular, we focus on monitoring non-functional properties that are specified within an agreed security contract. The novelty of our work is based on the way in which monitoring information can be combined from multiple dynamic services to automate the monitoring of business processes and proactively report compliance violations. The framework enables monitoring of both atomic and composite services and provides a user friendly interface for specifying the monitoring policy. We provide an information service case study using a real composite service to demonstrate how we achieve compliance monitoring. The transformation of security policy into monitoring rules, which is done automatically, makes our framework more flexible and accurate than existing techniques.
引用
收藏
页数:17
相关论文
共 42 条
[1]   Cloud monitoring: A survey [J].
Aceto, Giuseppe ;
Botta, Alessio ;
de Donato, Walter ;
Pescape, Antonio .
COMPUTER NETWORKS, 2013, 57 (09) :2093-2115
[2]   ConSpec - A formal language for policy specification [J].
Aktug, Irem ;
Naliuka, Katsiaryna .
SCIENCE OF COMPUTER PROGRAMMING, 2008, 74 (1-2) :2-12
[3]   An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art [J].
Alhamazani, Khalid ;
Ranjan, Rajiv ;
Mitra, Karan ;
Rabhi, Fethi ;
Jayaraman, Prem Prakash ;
Khan, Samee Ullah ;
Guabtni, Adnene ;
Bhatnagar, Vasudha .
COMPUTING, 2015, 97 (04) :357-377
[4]  
[Anonymous], TEST ANAL WEB SERVIC
[5]  
[Anonymous], 2016, PROC 8 IFIP INT C NE
[6]  
[Anonymous], P 31 ANN ACM S APPL
[7]  
Asim M, 2015, 5 INT C ADV COLL NET
[8]   Security policy monitoring of composite services [J].
Asim, Muhammad (m.asim@ljmu.ac.uk), 1600, Springer Verlag (8900) :192-202
[9]   Event Driven Monitoring of Composite Services [J].
Asim, Muhammad ;
Llewellyn-Jones, David ;
Lempereur, Brett ;
Zhou, Bo ;
Shi, Qi ;
Merabti, Madjid .
2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, :550-557
[10]   Security-Oriented Cloud Platform for SOA-Based SCADA [J].
Baker, T. ;
Mackay, M. ;
Shaheed, A. ;
Aldawsari, B. .
2015 15TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING, 2015, :961-970