environment, it is difficult to achieve trusted
authentication. Because of the coarse-grain security
checking mechanism for interaction between
computers, a SOA services may be attacked by
illegal users. SOA services have neither
authentication nor authority verification. If a
mainframe's resources were used by illegal users, it
will be a serious security issue.
2.3 SOA may Lead to 'Denial of
Service Attacks'
Because the unsafe SOA open for all users, illegal
users can send a large number of service requests to
the server, which will result in service providers'
abnormal work. Therefore, a group of illegal users'
request may bring on denial of service attacks and
SOA may lose the ability to monitor the service level
it provides if serious. (The service level is the
qualitative measurement for SOA). If there is an
attack, unsafe SOA can't tell you whether it has been
overloaded and will make system administrator can
not react on the security issues in the first time.
2.4 SOA may Lead to Auditing
Problem
An audit log is a basic requirement for IT security.
In order to check the security performance and
analyze security problems, the system administrator
must have the accurate system behavior log in his
hand. Because unsafe SOA don't have message and
transaction log mechanism, there's no way to
determine who had used the service and where the
service originate from when a service was called,
which will result in no audit trail can be used to
investigate the security gap after the incident and no
way to determine who and damaged the system and
when it happened.
2.5 Data Security Problem of SDO
2.5.1 Analysis for Confidentiality of
SDO Data
Confidentiality is to make sure that there's no
eavesdropping in the transmission. Even if the data
is intercept by illegal user, he will not understand the
real meaning. If architecture can not guarantee a
high degree confidentiality, that is not fully secure.
In an unsafe SOA environment, illegal users can
eavesdrop and intercept the SDO data transmitting
on the net. If the SDO data manufacturers sent to
suppliers contains confidential information, for
example, something like a list of materials required,
the necessary quantity of each material, the very
arrival date, and didn't do additional processing,
illegal users could analyze the SDO data he has got
very easily and find these clear message he wants
after he intercepted the SDO data due to the
standards SDO based. What's worse, if illegal users
modified the SDO data and transmitted it to
suppliers, it will result in huge economic losses.
Therefore, the possibility of SDO data's being abuse
by illegal users is very high.
2.5.2 Analysis for Integrity and
Non-repudiation of SDO Data
When a service provider received a call from the
requesting party, it must be verified to ensure that
the data is sent from the requesting party and the
data has been neither changed in transmission nor
forged by illegal third-party. That is data integrity.
The requesting party can not deny that it had sent the
request of the services, namely, the non-repudiation
of data. Data integrity and non-repudiation is very
important for the service providers and petitioner
exchanging data on the net.
3 SOLUTIONS FOR DATA
SECURITY PROBLEM OF SDO
For most security problem in the SOA-SCA
environment there is a suit of solution. A big
solution also contains a number of small solutions,
and every solution resolves a security problem in a
specific area of SOA. Security solutions for SOA
will be hinged on its security architecture and the
needs of each application. I will provide specific
solutions for data security (data confidentiality,
integrity and non-repudiation) (Matt, 2004) of
SOA-SCA.
Security framework of Traditional application is
based on the interaction between human and
computer, while SOA allows interaction between
computers. However, the developers paid very little
attention to that interaction. I think this is because
SOA lacks of internal security. In SOA-SCA
environment, we should embed these functions that
ought to be achieved by the equipment into the
application program.
Since it is not so fast for public key encryption
and private key decryption as well as signing with
the private key and verifying with public key, they
are not suitable to operate on mass data. Owning to
this, my solution doesn’t sign or encrypt all the data.
SECRYPT 2008 - International Conference on Security and Cryptography
338