SlideShare une entreprise Scribd logo
1  sur  10
SECURITY MECHANISM FOR WEBSERVICE USING
SECURITY TOKEN SERVICE(STS)
K.M.MANOJ KUMAR,P.SHYAM SUNDAR
B.TECH IT(IIIYR).,
KONGUNADU COLLEGE OF ENGINEERING ANDTECHNOLOGY,
TRICHY
ABSTRACT:
• Web Service has been widely used in the field of distributed
application system
• But the security issue of theWeb Service has often been
considered as a crucial barrier to its application in many fields
that transfers sensitive information
• We introduce the SecurityToken Service (STS) intoWeb Service
and then present a STS-based security architecture for Web
Services
Introduction:
• AWeb service is a software system designed
to support interoperable machine-to-machine
interaction over a network
• Common protocols are,
• Extensible Markup Language (XML), which
include the Simple Object Access Protocol
(SOAP)
• TheWeb Services Description Language
(WSDL)
• Universal Description, Discovery, and
Integration (UDDI)
Need for security:
• A group ofWeb services interacting together in this manner defines a
particularWeb service application in a Service-Oriented Architecture (SOA)
• Web Service is applied in system that transfers sensitive information, such
as E-commerce
• Needs to include features that can deal with security risks, including
falsification and eavesdropping
Transport Layer Security(TLS):
• Transport Layer Security (TLS) is a widely used method for performing
secure transactions for the Web security
• But it is aimed to authenticate the server hosting the Web Service
• There is no means to authenticate a single service or sets of services running
on the same machine
• Problems:
• TLS only provides point-to-point security
• TLS provides security in the transport layer rather than in the message level
• No mechanism for keeping the authenticity and non-repudiation of the transmitting
message
• Couldn’t provide flexibility for message transmitting
STS-WS Architecture Overview:
• CA-To manage and centrally issue
certificates to the entities
• STS - authentication server in
service layer, used to issue, renew,
cancel, and validate security
tokens for the WSR in a transaction
• WSR – System requests data
• WSP – System Provides data
• TRUST DOMAIN:
• All the individuals in the domain complied with the same rules with a common trust
anchor
• It makes the assumption that the second entity will behave exactly as the first entity
expects
• STS-based authentication Models:
The mechanism for STS is,
• Registering to the trusted domain
• The Services find to bind
• WSR Obtains Security token
• The security services access
STS-based authentication Models:
1. WSR must register into the trusted domain
firstly
2. WSR queries UDDI to find aWSP and then gets
theWSDL file of the WSP.The credential is
validated by the UDDI to verify that it is issued
by a trusted CA
3. To obtain theT-ST, theWSR sends an
authentication request to the STS.
BinarySecurityToken issued by STS.WSR
sends a RequestSecurityToken message to the
STS.
4. Receiving theWSDL file of theWSP andT-ST,
theWSR request Web Service.
Conclusion:
•The existing security specifications forWeb Services are
developed to meet the security in a particular aspect
•However, there isn’t a complete architecture for theWeb
service security
•Our architecture can provide higher security and higher
performance services
REFERENCE:
• OASISWeb Services Security: SOAP Message Security 1.1, OASIS standard specification
• National Institute of Standards andTechnology, Guide to SecureWeb Services
• XML Encryption Syntax and Processing.Technical report, W3C,December 2002.
http://www.w3.org/TR/xmlenc-core/.
• National Institute of Standards andTechnology. Role-based access control-draft 4.
http://csrc.nist.gov/rbac/rbac-std-ncits.pdf
• Ming-Guang Zhang, Wei Qi. E-commerce security system explored.
• Gerald Brose.A gateway to web services security-securing SOAP with proxies. ICWS-Europe, 2003,
2853:101-108
• ZhangWeiyan, Zhi-JieWu, XiaTao. Web Services messages in Communication Research. Computer
Engineering and Design, 2005, 26 (10):2621-2623

Contenu connexe

Tendances

Secure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer SecuritySecure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer SecurityAl Mamun
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
GSoC Mideterm-OAuth2 Module
GSoC Mideterm-OAuth2 ModuleGSoC Mideterm-OAuth2 Module
GSoC Mideterm-OAuth2 ModuleMayank Sharma
 
Final year presentation
Final year presentationFinal year presentation
Final year presentationAbhishek Jain
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshellFrank Kelly
 
Configuring Site-to-Site VPN's on ASA Firewalls
Configuring Site-to-Site VPN's on ASA FirewallsConfiguring Site-to-Site VPN's on ASA Firewalls
Configuring Site-to-Site VPN's on ASA FirewallsKelvin Charles
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSocketsIhor Bliumental - WebSockets
Ihor Bliumental - WebSocketsOWASP Kyiv
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsIEEEFINALYEARPROJECTS
 
020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPS020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPSJackio Kwok
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAnkit Raj
 
Collaborative network security in multi tenant data center for cloud computing
Collaborative network security in multi tenant data center for cloud computingCollaborative network security in multi tenant data center for cloud computing
Collaborative network security in multi tenant data center for cloud computingieeepondy
 
Privacy Preserving Searchable Encryption with Fine-grained Access Control
Privacy Preserving Searchable Encryption with Fine-grained Access ControlPrivacy Preserving Searchable Encryption with Fine-grained Access Control
Privacy Preserving Searchable Encryption with Fine-grained Access ControlJAYAPRAKASH JPINFOTECH
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureBrian Ritchie
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSLSagar Mali
 

Tendances (20)

Secure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer SecuritySecure Sockets Layer and Transport Layer Security
Secure Sockets Layer and Transport Layer Security
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
GSoC Mideterm-OAuth2 Module
GSoC Mideterm-OAuth2 ModuleGSoC Mideterm-OAuth2 Module
GSoC Mideterm-OAuth2 Module
 
Final year presentation
Final year presentationFinal year presentation
Final year presentation
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Configuring Site-to-Site VPN's on ASA Firewalls
Configuring Site-to-Site VPN's on ASA FirewallsConfiguring Site-to-Site VPN's on ASA Firewalls
Configuring Site-to-Site VPN's on ASA Firewalls
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSocketsIhor Bliumental - WebSockets
Ihor Bliumental - WebSockets
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
Proxy server
Proxy serverProxy server
Proxy server
 
Ssl https
Ssl httpsSsl https
Ssl https
 
020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPS020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPS
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
 
12
1212
12
 
Collaborative network security in multi tenant data center for cloud computing
Collaborative network security in multi tenant data center for cloud computingCollaborative network security in multi tenant data center for cloud computing
Collaborative network security in multi tenant data center for cloud computing
 
Privacy Preserving Searchable Encryption with Fine-grained Access Control
Privacy Preserving Searchable Encryption with Fine-grained Access ControlPrivacy Preserving Searchable Encryption with Fine-grained Access Control
Privacy Preserving Searchable Encryption with Fine-grained Access Control
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
 

En vedette

Security Audit and Mechanism of Protecting e-Learning System at the Faculty o...
Security Audit and Mechanism of Protecting e-Learning System at the Faculty o...Security Audit and Mechanism of Protecting e-Learning System at the Faculty o...
Security Audit and Mechanism of Protecting e-Learning System at the Faculty o...Sberbank d.d.
 
Amazon Webservice & Cloud Computing
Amazon Webservice & Cloud ComputingAmazon Webservice & Cloud Computing
Amazon Webservice & Cloud ComputingJack Smith
 
Web Service Presentation
Web Service PresentationWeb Service Presentation
Web Service Presentationguest0df6b0
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 

En vedette (10)

Security Audit and Mechanism of Protecting e-Learning System at the Faculty o...
Security Audit and Mechanism of Protecting e-Learning System at the Faculty o...Security Audit and Mechanism of Protecting e-Learning System at the Faculty o...
Security Audit and Mechanism of Protecting e-Learning System at the Faculty o...
 
Amazon Webservice & Cloud Computing
Amazon Webservice & Cloud ComputingAmazon Webservice & Cloud Computing
Amazon Webservice & Cloud Computing
 
Web service
Web serviceWeb service
Web service
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Web Service Presentation
Web Service PresentationWeb Service Presentation
Web Service Presentation
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 

Similaire à SECURITY MECHANISM FOR WEBSERVICE USING SECURITY TOKEN SERVICE(STS

Microservices Security landscape
Microservices Security landscapeMicroservices Security landscape
Microservices Security landscapeSagara Gunathunga
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsIRJET Journal
 
Balancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsBalancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsPapitha Velumani
 
Security on Windows Azure
Security on Windows AzureSecurity on Windows Azure
Security on Windows AzureHaddy El-Haggan
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...RahulJain989779
 
Service Mesh 101 - Digging into your service
Service Mesh 101 - Digging into your service Service Mesh 101 - Digging into your service
Service Mesh 101 - Digging into your service Huynh Thai Bao
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case studyMayuri Patil
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarDr. Shivashankar
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHansFarroCastillo1
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resourcejayaramb
 
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security &  Fo...The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security &  Fo...
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...Sharique Rizvi
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - OverviewSai Kesavamatham
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol Smriti Agrawal
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfAngelicaPantaleon3
 

Similaire à SECURITY MECHANISM FOR WEBSERVICE USING SECURITY TOKEN SERVICE(STS (20)

Microservices Security landscape
Microservices Security landscapeMicroservices Security landscape
Microservices Security landscape
 
Unit 5
Unit 5Unit 5
Unit 5
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed Systems
 
Balancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsBalancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactions
 
W4502140150
W4502140150W4502140150
W4502140150
 
Unit08
Unit08Unit08
Unit08
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
Security on Windows Azure
Security on Windows AzureSecurity on Windows Azure
Security on Windows Azure
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Web security
Web securityWeb security
Web security
 
Web services security_in_wse_3_ppt
Web services security_in_wse_3_pptWeb services security_in_wse_3_ppt
Web services security_in_wse_3_ppt
 
Service Mesh 101 - Digging into your service
Service Mesh 101 - Digging into your service Service Mesh 101 - Digging into your service
Service Mesh 101 - Digging into your service
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
 
Service operator aware trust scheme for resource
Service operator aware trust scheme for resourceService operator aware trust scheme for resource
Service operator aware trust scheme for resource
 
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security &  Fo...The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security &  Fo...
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdf
 

SECURITY MECHANISM FOR WEBSERVICE USING SECURITY TOKEN SERVICE(STS

  • 1. SECURITY MECHANISM FOR WEBSERVICE USING SECURITY TOKEN SERVICE(STS) K.M.MANOJ KUMAR,P.SHYAM SUNDAR B.TECH IT(IIIYR)., KONGUNADU COLLEGE OF ENGINEERING ANDTECHNOLOGY, TRICHY
  • 2. ABSTRACT: • Web Service has been widely used in the field of distributed application system • But the security issue of theWeb Service has often been considered as a crucial barrier to its application in many fields that transfers sensitive information • We introduce the SecurityToken Service (STS) intoWeb Service and then present a STS-based security architecture for Web Services
  • 3. Introduction: • AWeb service is a software system designed to support interoperable machine-to-machine interaction over a network • Common protocols are, • Extensible Markup Language (XML), which include the Simple Object Access Protocol (SOAP) • TheWeb Services Description Language (WSDL) • Universal Description, Discovery, and Integration (UDDI)
  • 4. Need for security: • A group ofWeb services interacting together in this manner defines a particularWeb service application in a Service-Oriented Architecture (SOA) • Web Service is applied in system that transfers sensitive information, such as E-commerce • Needs to include features that can deal with security risks, including falsification and eavesdropping
  • 5. Transport Layer Security(TLS): • Transport Layer Security (TLS) is a widely used method for performing secure transactions for the Web security • But it is aimed to authenticate the server hosting the Web Service • There is no means to authenticate a single service or sets of services running on the same machine • Problems: • TLS only provides point-to-point security • TLS provides security in the transport layer rather than in the message level • No mechanism for keeping the authenticity and non-repudiation of the transmitting message • Couldn’t provide flexibility for message transmitting
  • 6. STS-WS Architecture Overview: • CA-To manage and centrally issue certificates to the entities • STS - authentication server in service layer, used to issue, renew, cancel, and validate security tokens for the WSR in a transaction • WSR – System requests data • WSP – System Provides data
  • 7. • TRUST DOMAIN: • All the individuals in the domain complied with the same rules with a common trust anchor • It makes the assumption that the second entity will behave exactly as the first entity expects • STS-based authentication Models: The mechanism for STS is, • Registering to the trusted domain • The Services find to bind • WSR Obtains Security token • The security services access
  • 8. STS-based authentication Models: 1. WSR must register into the trusted domain firstly 2. WSR queries UDDI to find aWSP and then gets theWSDL file of the WSP.The credential is validated by the UDDI to verify that it is issued by a trusted CA 3. To obtain theT-ST, theWSR sends an authentication request to the STS. BinarySecurityToken issued by STS.WSR sends a RequestSecurityToken message to the STS. 4. Receiving theWSDL file of theWSP andT-ST, theWSR request Web Service.
  • 9. Conclusion: •The existing security specifications forWeb Services are developed to meet the security in a particular aspect •However, there isn’t a complete architecture for theWeb service security •Our architecture can provide higher security and higher performance services
  • 10. REFERENCE: • OASISWeb Services Security: SOAP Message Security 1.1, OASIS standard specification • National Institute of Standards andTechnology, Guide to SecureWeb Services • XML Encryption Syntax and Processing.Technical report, W3C,December 2002. http://www.w3.org/TR/xmlenc-core/. • National Institute of Standards andTechnology. Role-based access control-draft 4. http://csrc.nist.gov/rbac/rbac-std-ncits.pdf • Ming-Guang Zhang, Wei Qi. E-commerce security system explored. • Gerald Brose.A gateway to web services security-securing SOAP with proxies. ICWS-Europe, 2003, 2853:101-108 • ZhangWeiyan, Zhi-JieWu, XiaTao. Web Services messages in Communication Research. Computer Engineering and Design, 2005, 26 (10):2621-2623