• DocumentCode
    593689
  • Title

    Secure composition of cascaded Web services

  • Author

    Shafiq, Basit ; Soon Chun ; Vaidya, Jaideep ; Badar, N. ; Adam, Nico

  • Author_Institution
    Lahore Univ. of Manage. Sci., Lahore, Pakistan
  • fYear
    2012
  • fDate
    14-17 Oct. 2012
  • Firstpage
    137
  • Lastpage
    146
  • Abstract
    A business process can be developed as a composition of Web services provided by different service providers. These service providers may have their own policies and constraints for service provisioning and collaboration. In this paper, we focus on secure composition of services, specifically from the perspective of service enactment. Service enactment requires finding an execution plan for the service composition that conforms to the requirements and constraints of the service requester and all service providers. However, due to privacy and security concerns, participants may selectively expose their Web service operations and process details. We propose an approach for service enactment that does not require the participants to reveal their internal operations and constraints and that can still result in an execution plan which satisfies the requirements and constraints of all participants. The proposed approach uses Finite State Machines (FSM) to model component Web service operations, their interdependencies, as well security and access control policy constraints. Model checking is used to generate an appropriate Web service execution plan in an incremental manner. Commutative encryption based techniques are used to preserve privacy and security.
  • Keywords
    Web services; authorisation; cryptography; data privacy; finite state machines; formal specification; formal verification; FSM; Web service composition; access control policy constraint; business process development; cascaded Web services; collaboration; commutative encryption based technique; component Web service operation modeling; execution plan; finite state machine; model checking; privacy concern; privacy preservation; requirement satisfaction; secure composition; security concern; service enactment; service provider; service provisioning; service requester constraint; service requester requirements; Educational institutions; privacy; security; web service composition;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2012 8th International Conference on
  • Conference_Location
    Pittsburgh, PA
  • Print_ISBN
    978-1-4673-2740-4
  • Type

    conf

  • Filename
    6450901