Title :
How to Trust a Web Service Monitor Deployed in an Untrusted Environment?
Author :
Hosamani, Mahantesh ; Narayanappa, Harish ; Rajan, Hridesh
Abstract :
In a service oriented architecture, certain requirements can be tested by observing the interface of the service whereas other requirements such as data privacy, confidentiality and integrity cannot be tested in this way. After deployment, a requirements monitor is used to analyze the conformance of a web service to such requirements. The integrity of the reported conformance results is as good as of the integrity of the monitor especially when the requirements monitor is executing in an untrustworthy environment. In this paper, we propose a hardware-based dynamic attestation mechanism to validate the integrity of the requirements monitor. To evaluate our approach, we have conducted a case study using a commercial requirements monitor and a collection of web service implementations available with Apache Axis. Our case study demonstrates the feasibility of verifying the conformance of a web service executing in an untrustworthy environment.
Keywords :
Computer science; Computerized monitoring; Credit cards; Data privacy; Proposals; Semiconductor optical amplifiers; Service oriented architecture; Testing; Web services;
Conference_Titel :
Next Generation Web Services Practices, 2007. NWeSP 2007. Third International Conference on
Conference_Location :
Seoul
Print_ISBN :
978-0-7695-3022-2
DOI :
10.1109/NWESP.2007.25