{"title":"An architecture for certification-aware service discovery","authors":"M. Bezzi, A. Sabetta, G. Spanoudakis","doi":"10.1109/IWSSCLOUD.2011.6049020","DOIUrl":"https://doi.org/10.1109/IWSSCLOUD.2011.6049020","url":null,"abstract":"Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust domain (e.g., a single organization) One of the main reasons for this is the trust gap that normally arises when software services, offered by previously unknown providers, are to be selected at run-time, without any human intervention. The idea of machine-readable security certificates (called asserts) paves the way to automated reasoning about security properties of services. Similarly to current security certification schemes, the assessment of the security properties of a service is delegated to an independent third party (certification authority), who issues a corresponding assert, bound to the service. Building on the assert concept, this paper describes our proposal for a modular architecture to realise a certification-aware service discovery framework. The architecture supports the discovery of single services based on certified security properties, as well as the dynamic synthesis of service compositions that satisfy the required security properties.","PeriodicalId":396741,"journal":{"name":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128333585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and trust in Cloud scenarios","authors":"M. Fugini, G. Hadjichristofi","doi":"10.1109/IWSSCLOUD.2011.6049021","DOIUrl":"https://doi.org/10.1109/IWSSCLOUD.2011.6049021","url":null,"abstract":"Nowadays Cloud computing has introduced a new paradigm in distributed services, enabling the provision of services or computational resources to remote entities with no need to have them in house. In this paper, we consider two real life scenarios; 1) risk management in work areas, and 2) the execution of scientific experiments in cooperation among various computation nodes. We investigate how we can leverage Cloud capabilities and extend the aforementioned scenarios to the Cloud. We define the role of the Cloud in these scenarios and identify new dynamics between the Cloud and the services. Through these extensions, we identify security issues and vulnerabilities that need to be addressed. We describe some preliminary directions for security on the Cloud.","PeriodicalId":396741,"journal":{"name":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","volume":"418 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120866892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pippal, Vishu Sharma, Shakti Mishra, D. S. Kushwaha
{"title":"Secure and efficient multitenant database for an ad hoc cloud","authors":"S. Pippal, Vishu Sharma, Shakti Mishra, D. S. Kushwaha","doi":"10.1109/IWSSCLOUD.2011.6049024","DOIUrl":"https://doi.org/10.1109/IWSSCLOUD.2011.6049024","url":null,"abstract":"Effectively utilizing, unlocking and harnessing the data is the key to the success of organizations in the time to come. Although the software development and delivery technologies are matured, yet people are forced to start from scratch, when they encounter a new project, thus inducing cost and delay. In the proposed solution Organizations can collaborate to create a Data-center, that doesn't harm their existence or profitability. At the same time, these organizations can compete by spreading to those locations where they carry certain edge over others. This is where an ad-hoc cloud helps to venture into remote areas. We propose multitenancy for database in ad hoc cloud that helps multiple organizations to collaborate and yet compete with each other. In our proposed approach, shared database shared schema approach has been proposed that offers larger number of tenants per database server. Authentication and authorization are prime requirements when dealing with multitenancy. Kerberos authentication protocol is used on the top of multitenant database for participating educational institution.","PeriodicalId":396741,"journal":{"name":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132405701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meiko Jensen, Christopher Meyer, Juraj Somorovsky, Jörg Schwenk
{"title":"On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks","authors":"Meiko Jensen, Christopher Meyer, Juraj Somorovsky, Jörg Schwenk","doi":"10.1109/IWSSCLOUD.2011.6049019","DOIUrl":"https://doi.org/10.1109/IWSSCLOUD.2011.6049019","url":null,"abstract":"In the context of security of Web Services, the XML Signature Wrapping attack technique has lately received increasing attention. Following a broad range of real-world exploits, general interest in applicable countermeasures rises. However, few approaches for countering these attacks have been investigated closely enough to make any claims about their effectiveness. In this paper, we analyze the effectiveness of the specific countermeasure of XML Schema validation in terms of fending Signature Wrapping attacks. We investigate the problems of XML Schema validation for Web Services messages, and discuss the approach of Schema Hardening, a technique for strengthening XML Schema declarations. We conclude that XML Schema validation with a hardened XML Schema is capable of fending XML Signature Wrapping attacks, but bears some pitfalls and disadvantages as well.","PeriodicalId":396741,"journal":{"name":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128138527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic security monitoring for Virtualized Environments in Cloud computing","authors":"A. Maña, A. Muñoz, Javier González","doi":"10.1109/IWSSCLOUD.2011.6049018","DOIUrl":"https://doi.org/10.1109/IWSSCLOUD.2011.6049018","url":null,"abstract":"An architecture for dynamic security monitoring and enforcement for client software running in Virtualized Environments for Cloud computing is presented. Monitoring mechanisms check a set of policy-defined conditions at runtime in order to detect threats or anomalous behaviour. Enforcement is achievable by using secure software execution methods that comply with the defined policies. The presented architecture allows for context adaptation of the defined policies by using a new event-sequence language. Such automatic policy runtime enforcement is crucial to achieve proper security in virtualized platforms for cloud computing.","PeriodicalId":396741,"journal":{"name":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using in-memory encrypted databases on the cloud","authors":"Francesco Pagano, Davide Pagano","doi":"10.1109/IWSSCLOUD.2011.6049022","DOIUrl":"https://doi.org/10.1109/IWSSCLOUD.2011.6049022","url":null,"abstract":"Storing data in the cloud poses a number of privacy issues. A way to handle them is supporting data replication and distribution on the cloud via a local, centrally synchronized storage. In this paper we propose to use an in-memory RDBMS with row-level data encryption for granting and revoking access rights to distributed data. This type of solution is rarely adopted in conventional RDBMSs because it requires several complex steps. In this paper we focus on implementation and benchmarking of a test system, which shows that our simple yet effective solution overcomes most of the problems.","PeriodicalId":396741,"journal":{"name":"2011 1st International Workshop on Securing Services on the Cloud (IWSSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128208169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}