Skip to main content

Abstract

Far from being a hype, cybersecurity is one of the most important aspects of our daily lives. Gaining trust in a cyber system is not an easy task, as problems and security hazards can be willingly or unwillingly introduced in it. This paper describes a security-centric architecture of the communication bus in loosely coupled heterogeneous systems. The concept is modular and designed having in mind the fulfillment of the principles of Service Oriented Architecture as well as the common functional and non-functional requirements regarding such communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akhunzada, A., Ahmed, E., Gani, A., Khan, M.K., Imran, M., Guizani, S.: Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53(4), 36–44 (2015)

    Article  Google Scholar 

  2. Alho, P., Mattila, J.: Software fault detection and recovery in critical real-time systems: an approach based on loose coupling. Fusion Eng. Des. 89(9–10), 2272–2277 (2014)

    Article  Google Scholar 

  3. Baggen, R., Correia, J.P., Schill, K., Visser, J.: Standardized code quality benchmarking for improving software maintainability. Softw. Qual. J. 20(2), 287–307 (2012)

    Article  Google Scholar 

  4. Bettoni, M., Bernhard, W., Borter, F., Dönnges, G.: The yellow tool–making yellow pages more social and visible. In: Proceedings of the 8th European Conference on Knowledge Management (ECKM 2007). Academic Publishing, Reading Ma, pp. 118–124 (2007)

    Google Scholar 

  5. Buecker, A., et al.: Understanding SOA Security Design and Implementation. IBM Redbooks (2008)

    Google Scholar 

  6. Cunningham, H.C.: Multiparadigm programming with python 3 (2018)

    Google Scholar 

  7. Epstein, J., Matsumoto, S., McGraw, G.: Software security and soa: danger, will robinson! IEEE Secur. Priv. 4(1), 80–83 (2006)

    Article  Google Scholar 

  8. Fernandez, E.B., Yoshioka, N.: Two patterns for distributed systems: enterprise service bus (ESB) and distributed publish/subscribe. In: Proceedings of the 18th Conference on Pattern Languages of Programs, pp. 1–10 (2011)

    Google Scholar 

  9. Fiege, L., Mezini, M., Mühl, G., Buchmann, A.P.: Engineering event-based systems with scopes. In: Magnusson, B. (ed.) ECOOP 2002. LNCS, vol. 2374, pp. 309–333. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-47993-7_14

    Chapter  Google Scholar 

  10. Gretsch, S., Mandl, H., Schätz, R.: Implementation process of a knowledge management initiative: yellow pages. New Res. Knowl. Manag. Models Methods 14(1), 311–332 (2012)

    Google Scholar 

  11. Hasan, S.: Loose Coupling in Heterogeneous Event-Based Systems via Approximate Semantic Matching and Dynamic Enrichment. National University of Ireland, Galway (2016)

    Google Scholar 

  12. Hofmeister, C., Nord, R., Soni, D.: Applied Software Architecture. Addison-Wesley Professional, Boston (2000)

    Google Scholar 

  13. Hou, Z., Huang, Y., Zheng, S., Dong, X., Wang, B.: Design and implementation of heartbeat in multi-machine environment. In: 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003, pp. 583–586. IEEE (2003)

    Google Scholar 

  14. Huhns, M.N., Singh, M.P.: Service-oriented computing: key concepts and principles. IEEE Internet Comput. 9(1), 75–81 (2005)

    Article  Google Scholar 

  15. Kazman, R., Bass, L., Abowd, G., Webb, M.: Saam: a method for analyzing the properties of software architectures. In: Proceedings of 16th International Conference on Software Engineering, pp. 81–90. IEEE (1994)

    Google Scholar 

  16. Matei, O., Anton, C., Bozga, A., Pop, P.: Multi-layered architecture for soil moisture prediction in agriculture 4.0. In: Proceedings of the International Conference on Computers and Industrial Engineering, CIE, vol. 2, pp. 39–48 (2017)

    Google Scholar 

  17. Matei, O., Anton, C., Scholze, S., Cenedese, C.: Multi-layered data mining architecture in the context of internet of things. In: 2017 IEEE 15th International Conference on Industrial Informatics (INDIN), pp. 1193–1198. IEEE (2017)

    Google Scholar 

  18. Molli, P., Skaf-Molli, H., Oster, G., Jourdain, S.: Sams: synchronous, asynchronous, multi-synchronous environments. In: The 7th International Conference on Computer Supported Cooperative Work in Design, pp. 80–84. IEEE (2002)

    Google Scholar 

  19. Mosshammer, R., Kupzog, F., Faschang, M., Stifter, M.: Loose coupling architecture for co-simulation of heterogeneous components. In: IECON 2013-39th Annual Conference of the IEEE Industrial Electronics Society, pp. 7570–7575. IEEE (2013)

    Google Scholar 

  20. Namiot, D., Sneps-Sneppe, M.: On micro-services architecture. Int. J. Open Inf. Technol. 2(9), 24–27 (2014)

    Google Scholar 

  21. Papazoglou, M.P., Traverso, P., Dustdar, S., Leymann, F.: Service-oriented computing: state of the art and research challenges. Computer 40(11), 38–45 (2007)

    Article  Google Scholar 

  22. Pautasso, C., Wilde, E.: Why is the web loosely coupled? A multi-faceted metric for service design. In: Proceedings of the 18th International Conference on World Wide Web, pp. 911–920 (2009)

    Google Scholar 

  23. Riedl, M., Zipper, H., Meier, M., Diedrich, C.: Cyber-physical systems alter automation architectures. Annu. Rev. Control. 38(1), 123–133 (2014)

    Article  Google Scholar 

  24. Rodrigues, F., et al.: Coupling virtual reality open source software using message oriented middleware. In: SEARIS Worksphop 2009 (2009)

    Google Scholar 

  25. Schmidt, M.T., Hutchison, B., Lambros, P., Phippen, R.: The enterprise service bus: making service-oriented architecture real. IBM Syst. J. 44(4), 781–797 (2005)

    Article  Google Scholar 

  26. Tan, V., et al.: Security issues in a SOA-based provenance system. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol. 4145, pp. 203–211. Springer, Heidelberg (2006). https://doi.org/10.1007/11890850_21

    Chapter  Google Scholar 

  27. Tausch, S., Nußberger, F., Hußmann, H.: Supporting the disney method with an interactive feedback system. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, pp. 1013–1018 (2015)

    Google Scholar 

  28. Valipour, M.H., AmirZafari, B., Maleki, K.N., Daneshpour, N.: A brief survey of software architecture concepts and service oriented architecture. In: 2009 2nd IEEE International Conference on Computer Science and Information Technology, pp. 34–38. IEEE (2009)

    Google Scholar 

  29. Vogel-Heuser, B., Diedrich, C., Pantförder, D., Göhner, P.: Coupling heterogeneous production systems by a multi-agent based cyber-physical production system. In: 2014 12th IEEE International Conference on Industrial Informatics (INDIN), pp. 713–719. IEEE (2014)

    Google Scholar 

  30. Wei, X.: Communications solutions for heterogeneous systems based on SOA. Phys. Procedia 25, 1738–1742 (2012)

    Article  Google Scholar 

  31. Yarygina, T., Bagge, A.H.: Overcoming security challenges in microservice architectures. In: 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 11–20. IEEE (2018)

    Google Scholar 

  32. Yildiz, M., Abawajy, J., Ercan, T., Bernoth, A.: A layered security approach for cloud computing infrastructure. In: 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks, pp. 763–767. IEEE (2009)

    Google Scholar 

  33. Zhang, H., Kishore, R., Sharman, R., Ramesh, R.: Agile integration modeling language (AIML): a conceptual modeling grammar for agile integrative business information systems. Decis. Support Syst. 44(1), 266–284 (2007)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the project BIECO (https://www.bieco.org/) that received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 952702.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rudolf Erdei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Matei, O., Erdei, R., Delinschi, D., Andreica, L. (2022). Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture. In: Gude Prego, J.J., de la Puerta, J.G., García Bringas, P., Quintián, H., Corchado, E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-87872-6_21

Download citation

Publish with us

Policies and ethics