CFP last date
20 January 2025
Reseach Article

A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature

by Srinath K.s, Mallamma C G, Shankar Rana, Vijay Kumar F G
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 2
Year of Publication: 2014
Authors: Srinath K.s, Mallamma C G, Shankar Rana, Vijay Kumar F G
10.5120/18050-8956

Srinath K.s, Mallamma C G, Shankar Rana, Vijay Kumar F G . A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature. International Journal of Computer Applications. 103, 2 ( October 2014), 46-51. DOI=10.5120/18050-8956

@article{ 10.5120/18050-8956,
author = { Srinath K.s, Mallamma C G, Shankar Rana, Vijay Kumar F G },
title = { A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 2 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 46-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number2/18050-8956/ },
doi = { 10.5120/18050-8956 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:33.762584+05:30
%A Srinath K.s
%A Mallamma C G
%A Shankar Rana
%A Vijay Kumar F G
%T A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 2
%P 46-51
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Web service security is essential for SOA-based applications; it has explorative set of technologies such as Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL) and Universal Description, Discovery and Integration (UDDI), and Electronic Business XML (ebXML). These promote an environment for organizations to communicate in Internet. The inevitable challenge that organizations face today is to implement adequate Web Service Security as the Web Service transactions are done mainly through plain text formats, making them easy to get hacked. This paper proposes the XML signature and encryption as the core of Service Oriented Architecture (SOA) for web service security, and describes how to create and verify XML signature, and how to encrypt and decrypt XML data. This application provides security based on the parameters such as confidentiality, integrity, authentication and authorization.

References
  1. Jensen, M. , Gruschka, N. , Herkenh¨oner, R. , and Luttenberger, N. , (2007), "SOA and Web Services: New Technologies, New Standards – New Attacks" Fifth European Conference on Web Services, 0-7695-3044-3/07, 2007.
  2. Gu Yue-sheng, Ye Meng-tao, Gan Yong, "Web Services Security Based on XML Signature and XML Encryption" Journal of Networks, Vol. 5, No. 9, 2010.
  3. James McGovern, Sameer Tyagi, Michael E. Stevens and Sunil Mathew, Java Web Services Architecture, Morgan Kaufmann, 2003.
  4. Esmiralda Moradianvand Anne Håkansson, Possible attacks on XML Web Services, IJCSNS International Journal of Computer Science and 154 Network Security, VOL. 6 No. 1B, January 2006, pp 154-170.
  5. Ethan Cerami, Web Services Essentials, O'Reilly, First Edition, February 2002.
  6. Alonso, G. Casati, F. Kuno, H. Machiraju, V. "Web Services: Concepts, Architectures and Applications", Springer, 2004.
  7. T. Erl, Service-Oriented Architecture: Concepts, Technology, and Design, Prentice Hall, 2005.
  8. Alvarez, G. Petrovic, S. "A new taxonomy of Web attacks suitable for efficient encoding. Computer & Security", Vol. 22 (5), 2003, p435-449.
  9. RA. K. Saravanaguru, George Abraham, Krishnakumar Venkatasubramanian, Kiransinh Borasia (2011) "Securing Web Services Using XML Signature and XML Encryption.
  10. Takeshi Imamura, Andy Clark, Hiroshi Maruyama "A Stream-based Implementation of XML Encryption", pp 11-17.
  11. J. Hanson (2005) "Managing XML Encryption with Java", Devx Website -http://www. devx. com/xml/Article/28701/1763.
  12. T. Imamura, A. Clark, and H. Maruyama, "A Stream-Based Implementation of XML Encryption," Proc. ACM Workshop XML Security (XMLSEC '02), pp. 11-17, 2002.
  13. "XML Digital Signatures (Cover Pages hosted by OASIS) (Technology Reports)" -http://xml. coverpages. org/xmlSig. html.
  14. "XML Security: Signature, Encryption and Key Management (W3C note)" -http://www. w3. org/2004/Talks/0520-hhxmlsec/
Index Terms

Computer Science
Information Sciences

Keywords

Web Services Service Oriented Architecture (SOA) Simple Object Access Protocol (SOAP) Web Services Description Language (WSDL) Encryption XML Signature.