SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
IESS 1.1 Geneva 2011




 Profile-based Security
Assurances for Service
        Software
             Khaled Khan
   Computer Science and Engineering
           Qatar University
                Qatar
Overview


•  Context
•  Stakeholders of services
•  Research problems
•  Motivating Example
•  Proposed framework
•  Conclusion
Software Service, Composition and Security



•  An increasing interest in deploying software applications as services
   over the open communication channels
•  A software offering a service exists independently - developed,
   managed by third party service provider
•  These services are aimed for direct integration with any application
   system dynamically at run-time
•  A service may be secure in one application system, but the same
   service may not be secure in a different application due to different
   security requirements
•  The term `secure' is over-used and somehow misleading because it
   does not state the specific type of security achieved
Research Problems
•    End users with limited resources could compose application based on services which
     are consistent with their security requirements.

•    Services are normally associated with security features that are designed to withstand
     certain security threats

•    The representation of security properties for an end-user is quite different from those for
      –  a security expert, or
      –  a software engineer, or
      –  a different service consumer (end-user).

•    The current practice may lead the service consumer to select a service that does not tell
     much about its security assurances.

•    The way the security features are implemented, embedded and presented is often too
     complex for the service consumer to understand and use.

•    Services most often use the notion of “one-size-fits-all’ security assurances.

•    Consequently,
      –  Either service consumers do not use the services of which security properties are
         not well understood, or

      –  The security properties remain unused or wrongly configured in the application
         because these do not conform with the users security requirements.
Problems with Service Consumers
•  Difficult for the service consumer to verify the conformity
   of security properties between their security requirements
   and the assurances of third party services.

•  There are two explanations for this:
   –  Security properties are not specified in a form easily
      comprehensible by the service consumer who perhaps has
      limited knowledge of formal security technologies,

   –  A lack of a suitable framework with which they could select and
      compose their application based on security profiles of services
      and their security requirements.

•  Service consumers may not have enough background
   with formal education in computer science or security.
Research Issues

•    How can a service consumer know that the
     level of security assurances provided by the
     selected service software would meet her
     requirements?

                         and

•    How can the consumer verify immediately that
     the ensured security properties of the service
     are consistent with her security requirements?
A Motivating Example

•    Carol, a consumer, likes to book an item such as a hotel room, a car, or a
     flight.
•    The normal sequence of steps in a service-based application includes:
      –  Carol searches (a service) for her preferred reservation item, and selects
         the item;
      –  Then she provides her details (another service to make the reservation);
      –  Makes online payment (a service too), and
      –  Finally receives a bar-coded digital receipt (a service) of reservation.


•    In this journey of moving from one service to another in an integrated system
     environment (composed of multiple services), Carol may have different security
     requirements for each service she uses:
Security Requirements of Carol
      a)  For example, she wants her search parameters should not be used by anyone to
          link with her identity (a security property called non-linkability).
      b)  She also prefers her name, phone number, email and home address kept
          confidential (confidentiality).
      c)  She does not care if her suburb and street names are disclosed provided that
          none could identify her or her home address with these two pieces of
          information (non-deducability).
      d)  She also likes to have a guarantee that her credit card number is kept secret
          (confidentiality), and on one should be able to alter the amount she paid
          (integrity).
      e)  Carol also wants that no unauthorized entities are able to see (privacy) and make
          a copy of her receipt (authorization).
      f)  Finally, she needs an assurance that none could observe her activities in the
          Internet (non-observability).
•    We can see that Carol has very specific security requirements in this scenario.
•    Likewise, another consumer John, may have different requirements from Carol
     of the same reservation software system.
•    How do we handle these types of diverse security requirements?
Research Objectives and Approaches

•    Our work attempts to address the following research challenges project:
      –  How to make security assurances of service software transparent to consumers
      –  How to enable consumer select their security choices; and
      –  How to check the security compatibility of the selected security for services.




      Our approach has three main processes:
      –  Reflection of security assurances
      –  Selection of preferred assurances; and
      –  Checking of security compatibility.
Reflection of Security Assurances

•  Mechanisms for reflecting the security assurances of services.
•  Security provisions and requirements are published together with
   their service descriptions
•  Security characterization called security profiles
•  Attaching the security profile with service interfaces.
•  Stakeholder-based view
Levels of Implemented Security Functions

                                                        Development
                 Characterising              ISO/IEC    stage
Service
development      security properties of       15408
                 services                   Common
                                             criteria
                                                        Composition
                                                        stage
                     Establishing            Reasonin
Systems
composition          compositional               g
                     security properties     language

                                                        Operational
Execution            Deriving consumer-      Security   stage
                     level security goals     Goal


              Time
Stakeholders of Services

                     Design and Development of
Service developers            services              Development
                                                        and
                                                    deployment
 Security designer   Analysis of security threats
                     and implementation policies



Software engineer     Discovery of services and
                        functional integration       Operation
                                                       and
 Service consumer                                   Composition
                          User of composed
                             application



                                                                  Time
Four Perspectives of Service Security
Service consumer
   Specific security objectives actually achieved at the system-level
        (Operational time)

Software engineer
    Interested in the compositional impact and conformity of the
         security properties (Composition time)

Security designer
   Focuses technical details of the component security such as
        encryption
   Identifies the threats of the component, define the security
        policies and functions (service development time)

Service developer
   Design, build, deploy and manage services. (service design deployment
       time)
Abstraction Level of Security Properties
Selection of Preferred Assurances


•  Services should provide a choice of security assurances.
•  Capability that enables the consumer to select their preferred
   security assurances
•  Security profile must reflect the actual implementation of security
   functions
Checking of Security Compatibility

•  Security compatibility between interacting services are automatically
   analyzed
•  Conforms that they satisfy each other's security requirements.
•  Ensure that the selected security properties work without
   compromising service security provisions.
Concluding Remarks
•    Our framework has three anticipated innovative aspects.
      –  The first innovative aspect is that we approach security from a (service-
         based) software engineering perspective
          •  Adopt a proactive and predicative line of thinking.
          •  We emphasize on the service consumer's understanding and selection
             capabilities of service security properties
      –  The second innovative aspect is that the framework provides a semantic
         model that is essential to reason about the effectiveness of the selected
         security assurances
      –  The final aspect is the formal analysis techniques for security compatibility
         allow us to check automatically if the services in a composition are
         compatible in terms of security features
          •  Leads to compatible security-aware composition. This is critical to
             providing assurance to system users about the systems security
             behavior,
          •  Nurtures confidence and trust in the business community about service-
             based system security.

Weitere ähnliche Inhalte

Was ist angesagt?

Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
Krishnendu Paul
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareeng
PINKU29
 
IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]
Akram Abbasi
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9
Ian Sommerville
 

Was ist angesagt? (20)

Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service Discovery
 
Requirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsRequirement Engineering for Dependable Systems
Requirement Engineering for Dependable Systems
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
ppt
pptppt
ppt
 
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareeng
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering
 
IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]IS-1 Short Report [Muhammad Akram Abbasi]
IS-1 Short Report [Muhammad Akram Abbasi]
 
Requirment anlaysis
Requirment anlaysisRequirment anlaysis
Requirment anlaysis
 
Ch1-Software Engineering 9
Ch1-Software Engineering 9Ch1-Software Engineering 9
Ch1-Software Engineering 9
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 java
 
Resume_Exp
Resume_ExpResume_Exp
Resume_Exp
 

Ähnlich wie Profile based security assurance for service

Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
Arun Gopinath
 
SDF_Security_A4_0606
SDF_Security_A4_0606SDF_Security_A4_0606
SDF_Security_A4_0606
Eben Visser
 
Application Security
Application SecurityApplication Security
Application Security
onenolesguy
 

Ähnlich wie Profile based security assurance for service (20)

Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Security Design Concepts
Security Design ConceptsSecurity Design Concepts
Security Design Concepts
 
Unit 5
Unit 5Unit 5
Unit 5
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Cloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptxCloud Security Assessment Methods.pptx
Cloud Security Assessment Methods.pptx
 
SDF_Security_A4_0606
SDF_Security_A4_0606SDF_Security_A4_0606
SDF_Security_A4_0606
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Application Security
Application SecurityApplication Security
Application Security
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erp
 
framework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptxframework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptx
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 

Mehr von IESS

Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...
IESS
 
Strategy based service business development for sm es
Strategy based service business development for sm esStrategy based service business development for sm es
Strategy based service business development for sm es
IESS
 
Service systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspectiveService systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspective
IESS
 
Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needs
IESS
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrialization
IESS
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...
IESS
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa services
IESS
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service quality
IESS
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service science
IESS
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systems
IESS
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvement
IESS
 

Mehr von IESS (20)

Iess11 closing session
Iess11 closing sessionIess11 closing session
Iess11 closing session
 
Comparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss modelsComparison of research based vs industry developed pss models
Comparison of research based vs industry developed pss models
 
Towards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logicTowards an ontological foundation of service dominant logic
Towards an ontological foundation of service dominant logic
 
Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...Designing a dynamic competency framework for the service system innovation ar...
Designing a dynamic competency framework for the service system innovation ar...
 
Strategy based service business development for sm es
Strategy based service business development for sm esStrategy based service business development for sm es
Strategy based service business development for sm es
 
Business process flexibility in service composition
Business process flexibility in service compositionBusiness process flexibility in service composition
Business process flexibility in service composition
 
Service systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspectiveService systems and value modeling from an appreciative system perspective
Service systems and value modeling from an appreciative system perspective
 
Service science filling the gap between knowledge and needs
Service science  filling the gap between knowledge and needsService science  filling the gap between knowledge and needs
Service science filling the gap between knowledge and needs
 
The paradox of service industrialization
The paradox of service industrializationThe paradox of service industrialization
The paradox of service industrialization
 
Implementing a request fulfillment process
Implementing a request fulfillment processImplementing a request fulfillment process
Implementing a request fulfillment process
 
Sustainable service innovation
Sustainable service innovationSustainable service innovation
Sustainable service innovation
 
Mining customer loyalty card programs
Mining customer loyalty card programsMining customer loyalty card programs
Mining customer loyalty card programs
 
A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...A model based method for the design of services in collaborative business env...
A model based method for the design of services in collaborative business env...
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa services
 
Impact analysis of process improvement on it service quality
Impact analysis of process improvement on it service qualityImpact analysis of process improvement on it service quality
Impact analysis of process improvement on it service quality
 
Seffah iess11 keynote the human side of service science
Seffah iess11 keynote   the human side of service scienceSeffah iess11 keynote   the human side of service science
Seffah iess11 keynote the human side of service science
 
On viable service systems
On viable service systemsOn viable service systems
On viable service systems
 
Spider maps for location based services improvement
Spider maps for location based services improvementSpider maps for location based services improvement
Spider maps for location based services improvement
 
IESS 1.1 intro
IESS 1.1 introIESS 1.1 intro
IESS 1.1 intro
 
Iess10 Closing
Iess10 ClosingIess10 Closing
Iess10 Closing
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Profile based security assurance for service

  • 1. IESS 1.1 Geneva 2011 Profile-based Security Assurances for Service Software Khaled Khan Computer Science and Engineering Qatar University Qatar
  • 2. Overview •  Context •  Stakeholders of services •  Research problems •  Motivating Example •  Proposed framework •  Conclusion
  • 3. Software Service, Composition and Security •  An increasing interest in deploying software applications as services over the open communication channels •  A software offering a service exists independently - developed, managed by third party service provider •  These services are aimed for direct integration with any application system dynamically at run-time •  A service may be secure in one application system, but the same service may not be secure in a different application due to different security requirements •  The term `secure' is over-used and somehow misleading because it does not state the specific type of security achieved
  • 4. Research Problems •  End users with limited resources could compose application based on services which are consistent with their security requirements. •  Services are normally associated with security features that are designed to withstand certain security threats •  The representation of security properties for an end-user is quite different from those for –  a security expert, or –  a software engineer, or –  a different service consumer (end-user). •  The current practice may lead the service consumer to select a service that does not tell much about its security assurances. •  The way the security features are implemented, embedded and presented is often too complex for the service consumer to understand and use. •  Services most often use the notion of “one-size-fits-all’ security assurances. •  Consequently, –  Either service consumers do not use the services of which security properties are not well understood, or –  The security properties remain unused or wrongly configured in the application because these do not conform with the users security requirements.
  • 5. Problems with Service Consumers •  Difficult for the service consumer to verify the conformity of security properties between their security requirements and the assurances of third party services. •  There are two explanations for this: –  Security properties are not specified in a form easily comprehensible by the service consumer who perhaps has limited knowledge of formal security technologies, –  A lack of a suitable framework with which they could select and compose their application based on security profiles of services and their security requirements. •  Service consumers may not have enough background with formal education in computer science or security.
  • 6. Research Issues •  How can a service consumer know that the level of security assurances provided by the selected service software would meet her requirements? and •  How can the consumer verify immediately that the ensured security properties of the service are consistent with her security requirements?
  • 7. A Motivating Example •  Carol, a consumer, likes to book an item such as a hotel room, a car, or a flight. •  The normal sequence of steps in a service-based application includes: –  Carol searches (a service) for her preferred reservation item, and selects the item; –  Then she provides her details (another service to make the reservation); –  Makes online payment (a service too), and –  Finally receives a bar-coded digital receipt (a service) of reservation. •  In this journey of moving from one service to another in an integrated system environment (composed of multiple services), Carol may have different security requirements for each service she uses:
  • 8. Security Requirements of Carol a)  For example, she wants her search parameters should not be used by anyone to link with her identity (a security property called non-linkability). b)  She also prefers her name, phone number, email and home address kept confidential (confidentiality). c)  She does not care if her suburb and street names are disclosed provided that none could identify her or her home address with these two pieces of information (non-deducability). d)  She also likes to have a guarantee that her credit card number is kept secret (confidentiality), and on one should be able to alter the amount she paid (integrity). e)  Carol also wants that no unauthorized entities are able to see (privacy) and make a copy of her receipt (authorization). f)  Finally, she needs an assurance that none could observe her activities in the Internet (non-observability). •  We can see that Carol has very specific security requirements in this scenario. •  Likewise, another consumer John, may have different requirements from Carol of the same reservation software system. •  How do we handle these types of diverse security requirements?
  • 9. Research Objectives and Approaches •  Our work attempts to address the following research challenges project: –  How to make security assurances of service software transparent to consumers –  How to enable consumer select their security choices; and –  How to check the security compatibility of the selected security for services. Our approach has three main processes: –  Reflection of security assurances –  Selection of preferred assurances; and –  Checking of security compatibility.
  • 10. Reflection of Security Assurances •  Mechanisms for reflecting the security assurances of services. •  Security provisions and requirements are published together with their service descriptions •  Security characterization called security profiles •  Attaching the security profile with service interfaces. •  Stakeholder-based view
  • 11. Levels of Implemented Security Functions Development Characterising ISO/IEC stage Service development security properties of 15408 services Common criteria Composition stage Establishing Reasonin Systems composition compositional g security properties language Operational Execution Deriving consumer- Security stage level security goals Goal Time
  • 12. Stakeholders of Services Design and Development of Service developers services Development and deployment Security designer Analysis of security threats and implementation policies Software engineer Discovery of services and functional integration Operation and Service consumer Composition User of composed application Time
  • 13. Four Perspectives of Service Security Service consumer Specific security objectives actually achieved at the system-level (Operational time) Software engineer Interested in the compositional impact and conformity of the security properties (Composition time) Security designer Focuses technical details of the component security such as encryption Identifies the threats of the component, define the security policies and functions (service development time) Service developer Design, build, deploy and manage services. (service design deployment time)
  • 14. Abstraction Level of Security Properties
  • 15. Selection of Preferred Assurances •  Services should provide a choice of security assurances. •  Capability that enables the consumer to select their preferred security assurances •  Security profile must reflect the actual implementation of security functions
  • 16. Checking of Security Compatibility •  Security compatibility between interacting services are automatically analyzed •  Conforms that they satisfy each other's security requirements. •  Ensure that the selected security properties work without compromising service security provisions.
  • 17. Concluding Remarks •  Our framework has three anticipated innovative aspects. –  The first innovative aspect is that we approach security from a (service- based) software engineering perspective •  Adopt a proactive and predicative line of thinking. •  We emphasize on the service consumer's understanding and selection capabilities of service security properties –  The second innovative aspect is that the framework provides a semantic model that is essential to reason about the effectiveness of the selected security assurances –  The final aspect is the formal analysis techniques for security compatibility allow us to check automatically if the services in a composition are compatible in terms of security features •  Leads to compatible security-aware composition. This is critical to providing assurance to system users about the systems security behavior, •  Nurtures confidence and trust in the business community about service- based system security.