skip to main content
10.1145/2513534.2513539acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnordicloudConference Proceedingsconference-collections
research-article

A secure OSGi environment for untrusted web applications

Published:02 September 2013Publication History

ABSTRACT

For some time it has been a growing trend to move applications from the desktop to the web and especially to cloud environment. Very often the web application solutions are based on the Java language. In this case, the OSGi specification is arguably the number one choice for running multiple applications on a single Java virtual machine. Unfortunately, OSGi does not solve all the security vulnerabilities that emerge in such an environment. For instance, computer resource usage is only marginally controlled. In this paper, we discuss the security of the OSGi environment. In particular, we introduce a solution to running untrusted OSGi applications. In our case, controlling the permissions of the applications is fairly simple. A more challenging task is to manage the computer resource usage. We present a moderately straightforward solution that still grants a reasonable level of security. Unlike other similar OSGi resource managers and monitors, our solution does not need any modifications to the web applications or OSGi components. Moreover, we distinguish each web session of an application while competing methods only monitor complete applications as single entities.

References

  1. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. Communications of the ACM, 53(4):50--58, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Y. Chen, V. Paxson, and R. H. Katz. What's new about cloud computing security? Technical Report UCB/EECS-2010-5, University of California, Berkeley, CA, 2010.Google ScholarGoogle Scholar
  3. N. Geoffray, G. Thomas, G. Muller, P. Parrend, S. Frénot, and B. Folliot. I-JVM: a Java virtual machine for component isolation in OSGi. In International Conference on Dependable Systems and Networks (DSN 2009), Los Alamitos, CA, 2009. IEEE Computer Society.Google ScholarGoogle ScholarCross RefCross Ref
  4. M. Grönroos. Book of Vaadin. Vaadin Ltd., Turku, Finland, 7th edition, 2013.Google ScholarGoogle Scholar
  5. R. Hall, K. Pauls, S. McCulloch, and D. Savage. OSGi in action: Creating modular applications in Java. Manning Publications, Greenwich, CT, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Java Community Process. Java specification request 121: Application isolation API specification, 2006. Version 2.7, final.Google ScholarGoogle Scholar
  7. Java Community Process. Java specification request 284: Resource consumption management API, 2009. Version 2.6, final.Google ScholarGoogle Scholar
  8. Java Community Process. Java specification request 315: Java servlet 3.0 specification, 2009. Version 3.0, final.Google ScholarGoogle Scholar
  9. H. Lin, C. You, M. Zhou, and H. Mei. Proxy centric approach for component resource monitoring on OSGi platform. Journal of Frontiers of Computer Science and Technology, 5(1):23--31, 2011. In Chinese with English abstract.Google ScholarGoogle Scholar
  10. S. Microsystems. Java 2 security architecture, 2002. Version 1.2.Google ScholarGoogle Scholar
  11. T. Miettinen. Resource monitoring and visualization of OSGi-based software components. Technical Report 685, VTT, Espoo, Finland, 2008.Google ScholarGoogle Scholar
  12. Oracle. Java native interface specification, 2006. Version 6.0.Google ScholarGoogle Scholar
  13. Oracle. JVM tool interface, 2006. Version 1.2.1.Google ScholarGoogle Scholar
  14. P. Parrend. Software Security Models for Service-Oriented Programming (SOP) Platforms. PhD thesis, Institut National des Sciences Appliquées de Lyon, Lyon, France, 2008.Google ScholarGoogle Scholar
  15. P. Parrend and S. Frénot. Java components vulnerabilities: An experimental classification targeted at the OSGi platform. Technical Report 6231, Institut National de Recherche en Informatique et en Automatique, Le Chesnay Cedex, France, 2007.Google ScholarGoogle Scholar
  16. R. Schwammberger. Performance isolation for component systems. Master's thesis, Swiss Federal Institute of Technology Zurich, Zurich, Germany, 2009.Google ScholarGoogle Scholar
  17. D. Simon, C. Cifuentes, D. Cleal, J. Daniels, and D. White. Java on the bare metal of wireless sensor devices: The Squawk Java virtual machine. In Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE 06), pages 78--88, New York, NY, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Soman, L. Daynès, and C. Krintz. Task-aware garbage collection in a multi-tasking virtual machine. In Proceedings of the 5th International Symposium on Memory Management (ISMM 06), pages 64--73, New York, NY, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. The OSGi Alliance. OSGi service platform: Core specification, 2009. Release 4, version 4.2.Google ScholarGoogle Scholar

Index Terms

  1. A secure OSGi environment for untrusted web applications

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        NordiCloud '13: Proceedings of the Second Nordic Symposium on Cloud Computing & Internet Technologies
        September 2013
        88 pages
        ISBN:9781450323079
        DOI:10.1145/2513534

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 September 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        NordiCloud '13 Paper Acceptance Rate9of15submissions,60%Overall Acceptance Rate9of15submissions,60%
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader