Title :
Security-Aware Service Composition with Fine-Grained Information Flow Control
Author :
Wei She ; I-Ling Yen ; Thuraisingham, Bhavani ; Bertino, Elisa
Author_Institution :
Comput. Sci. Dept., Univ. of Texas at Dallas, Richardson, TX, USA
Abstract :
Enforcing access control in composite services is essential in distributed multidomain environment. Many advanced access control models have been developed to secure web services at execution time. However, they do not consider access control validation at composition time, resulting in high execution-time failure rate of composite services due to access control violations. Performing composition-time access control validation is not straightforward. First, many candidate compositions need to be considered and validating them can be costly. Second, some service composers may not be trusted to access protected policies and validation has to be done remotely. Another major issue with existing models is that they do not consider information flow control in composite services, which may result in undesirable information leakage. To resolve all these problems, we develop a novel three-phase composition protocol integrating information flow control. To reduce the policy evaluation cost, we use historical information to efficiently evaluate and prune candidate compositions and perform local/remote policy evaluation only on top candidates. To achieve effective and efficient information flow control, we introduce the novel concept of transformation factor to model the computation effect of intermediate services. Experimental studies show significant performance benefit of the proposed mechanism.
Keywords :
Web services; authorisation; Web service security; access control violation; composite service; composition-time access control validation; distributed multidomain environment; execution time; execution-time failure rate; fine-grained information flow control; historical information; information leakage; local policy evaluation; policy evaluation cost reduction; protected policy access; remote policy evaluation; security-aware service composition; three-phase composition protocol; transformation factor; Access control; Concrete; Medical diagnostic imaging; Protocols; Web services; Secure service composition; access control; information flow control;
Journal_Title :
Services Computing, IEEE Transactions on