skip to main content
research-article

Incorporating Security Features in Service-Oriented Architecture using Security Patterns

Published: 06 February 2015 Publication History

Abstract

Service-Oriented Architecture is an architectural style where different heterogeneous components share information with each other by using special types of messages based on the protocol known as Simple Object Access Protocol. Various technologies, such as Common Object Request Broker Architecture, Java 2 Platform, Enterprise Edition, Java Message Service etc. are applied to realize Service-Oriented Architecture for different applications. Besides these approaches, two other techniques, REpresentational State Transfer, and web services are applied for the realization of Service-Oriented Architecture. Web services provide a platform independent communication scheme between applications. The security preservation among the composition of services is an important task for Service-Oriented Architecture. In this study, an attempt is made to incorporate security features in Service- Oriented Architecture with the help of software security patterns. This scheme is described by developing an architectural model integrated with security goals and security patterns. The structural and behavioral aspects of composition of web services incorporated with security features are presented using a Unified Modeling Language class diagram and a sequence diagram respectively. At the end of this study, an evaluation is performed between identified security patterns and critical security properties along with Service-Oriented Architecture design principles. A case study of an online banking system is considered to explain the use of security patterns.

References

[1]
Schahram Dustdar and Wolfgang Schreiner. A survey on web services composition. International journal of web and grid services, 1(1):1--30, 2005.
[2]
Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1995.
[3]
Deepak Alur, Dan Malks, John Crupi, Grady Booch, and Martin Fowler. Core J2EE Patterns (Core Design Series): Best Practices and Design Strategies. Prentice Hall, 2nd edition, 2003.
[4]
Martin Fowler. Patterns of enterprise application architecture. Addison-Wesley, Boston, USA, 2002.
[5]
Frank Buschmann, Kelvin Henney, and Douglas Schimdt. Pattern-Oriented Software Architecture: On Patterns and Pattern Language, volume 4. John Wiley & Sons Ltd., West Sussex, England, 2007.
[6]
Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, and Peter Sommerlad. Security Patterns: Integrating security and systems engineering. John Wiley & Sons, West Sussex, England, 2005.
[7]
Christopher Steel, Ramesh Nagappan, and Ray Lai. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Prentice Hall PTR, 2005.
[8]
Jörg Niere, Wilhelm Schäfer, Jörg P Wadsack, Lothar Wendehals, and Jim Welsh. Towards pattern-based design recovery. In Proceedings of the 24th international conference on Software engineering, pages 338--348. ACM, 2002.
[9]
Joseph Yoder and Jeffrey Barcalow. Architectural patterns for enabling application security. In In proceeding of the 4th Conference on Patterns Language of Programming (PLoP'97), 1997.
[10]
Robert Hanmer. Patterns for fault tolerant software. John Wiley & Sons, 2007.
[11]
Jay DiMare and Richard S. Ma. Service-oriented architecture revolutionizing today's banking systems. Technical report, IBM Global Business Services, 2008.
[12]
Ajay Tipnis and Ivan Lomelli. Security Ů a major imperative for an service-oriented architecture : HP SOA.

Cited By

View all
  • (2023)Authentication and Authorization Management in SOA with the Focus on RESTful ServicesInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819402350032833:08(1293-1326)Online publication date: 21-Jul-2023
  • (2020)Patterns Related to Microservice Architecture: a Multivocal Literature ReviewProgramming and Computing Software10.1134/S036176882008025346:8(594-608)Online publication date: 1-Dec-2020
  • (2019)Quality attributes in patterns related to microservice architecture: a Systematic Literature Review2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT)10.1109/CONISOFT.2019.00034(181-190)Online publication date: Oct-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 40, Issue 1
January 2015
237 pages
ISSN:0163-5948
DOI:10.1145/2693208
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 February 2015
Published in SIGSOFT Volume 40, Issue 1

Check for updates

Author Tags

  1. SOA
  2. Security Patterns
  3. Service Composition
  4. Web Services

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Authentication and Authorization Management in SOA with the Focus on RESTful ServicesInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819402350032833:08(1293-1326)Online publication date: 21-Jul-2023
  • (2020)Patterns Related to Microservice Architecture: a Multivocal Literature ReviewProgramming and Computing Software10.1134/S036176882008025346:8(594-608)Online publication date: 1-Dec-2020
  • (2019)Quality attributes in patterns related to microservice architecture: a Systematic Literature Review2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT)10.1109/CONISOFT.2019.00034(181-190)Online publication date: Oct-2019
  • (2018)Applying Reverse Engineering Techniques to Analyze Design Patterns in Source Code2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)10.1109/ICACCI.2018.8554519(1398-1404)Online publication date: Sep-2018
  • (2018)Security framework for dynamic service-oriented IT systemsJournal of Information and Telecommunication10.1080/24751839.2018.14799262:4(428-448)Online publication date: 4-Jun-2018
  • (2018)Software design pattern mining using classification-based techniquesFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-017-6424-y12:5(908-922)Online publication date: 1-Oct-2018
  • (2017)Penetration Testing as a Test Phase in Web Service Testing a Black Box Pen Testing ApproachSmart Computing and Informatics10.1007/978-981-10-5547-8_64(623-635)Online publication date: 29-Oct-2017
  • (2016)Applying software metrics for the mining of design pattern2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON)10.1109/UPCON.2016.7894692(426-431)Online publication date: 2016
  • (2016)Software design pattern recognition using machine learning techniques2016 IEEE Region 10 Conference (TENCON)10.1109/TENCON.2016.7847994(222-227)Online publication date: Nov-2016
  • (2016)An ontology based approach for formal modeling of structural design patterns2016 Ninth International Conference on Contemporary Computing (IC3)10.1109/IC3.2016.7880260(1-6)Online publication date: Aug-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media