et al., 2010).
It must be mentioned, that the XSpRES proto-
type implementation is focused on security and not
on efficiency in the first place. Nevertheless, Figure 7
shows that it is comparable to the Rampart security
module. One reason for this is, that XSpRES is very
light-weight, i.e., it is only capable of handling dig-
ital signatures. Rampart, in contrast, is much more
complete in the sense of standards-compliance, in-
cluding features such as encryption, username token,
which impacts on the time required for signature ver-
ification. On the other hand, the processing time of
the XSpRES modules can be improved significantly.
By aligning the object models of the various deployed
Java components, the need for the costly object con-
version would be eliminated, reducing the processing
time by one third.
7 CONCLUSIONS
The use of SOA and Cloud concepts for the construc-
tion of distributed applications handling more and
more sensitive data is on the rise. XML is playing an
important role in such applications, since it is used for
encoding data at rest as well as data in transit. The se-
curity demands coming with the processing and stor-
age of sensitive data rely on robust and effective se-
curity technologies. Recent discoveries showed that
the XML Security specifications include serious flaws
and thus can currently not fulfill the required protec-
tion levels readily.
This paper contributes a comprehensive approach
to face these vulnerabilities providing an architec-
ture which compiles a set of inter-linked protec-
tion mechanisms for the client-side as well as the
server-side. The selection and composition of the
protection means have been guided by the require-
ments to realize the targeted architecture in an ef-
fective, but still standard-compliant and cost efficient
way. Based on this ground work, an open-source
XML Signature Wrapping attack protection library
has been implemented, which is robust against all
known instances of the XML Signature Wrapping at-
tack and thus provides a vehicle to generate and verify
signed XML documents and messages in a fail-safe
and standard-compliant manner. The seamless inte-
gration of the developed library into standard Web
Services frameworks has been another requirement,
enabling—amongst others—to evaluate the develop-
ments in a common SOAP setting. The obtained re-
sults emphasize that the proposed approach fulfills
the targeted goals and provides an effective protec-
tion against XML Signature Wrapping attacks at low
computational extra costs and by still being standard-
compliant.
Future work will target the publishing of the pre-
sented XML Signature Wrapping protection library
XSpRES. Additionally, a more in-depth and formal
analysis of the protection provided by XSpRES in
case of not yet known variations of the XML Signa-
ture Wrapping attack will bexy performed.
ACKNOWLEDGEMENTS
This work was funded by the Federal Office for Infor-
mation Security in Germany (BSI) under the contract
number 882/2010.
The authors would like to thank Holger Junker and
Juraj Somorovsky for many fruitful discussions and
their valuable input.
REFERENCES
Bartel, M., Boyer, J., Fox, B., LaMacchia, B., and Simon, E.
(2008). XML Signature Syntax and Processing. W3C
Recommendation.
Bhargavan, K., Fournet, C., and Gordon, A. D. (2005a). A
semantics for Web Services authentication. Theoreti-
cal Computer Science, 340(1):102–153.
Bhargavan, K., Fournet, C., Gordon, A. D., and O’Shea, G.
(2005b). An advisor for Web Services Security poli-
cies. In SWS ’05: Proceedings of the 2005 Workshop
on Secure Web Services, pages 1–9, New York, NY,
USA. ACM Press.
Gajek, S., Jensen, M., Liao, L., and Schwenk, J. (2009).
Analysis of signature wrapping attacks and counter-
measures. In ICWS, pages 575–582.
Gajek, S., Liao, L., and Schwenk, J. (2007). Breaking and
fixing the inline approach. In Proceedings of the 2007
ACM Workshop on Secure Web Services (SWS’07),
pages 37–42, Fairfax, Virginia, USA. Association for
Computing Machinery.
Gruschka, N., Jensen, M., Lo Iacono, L., and Luttenberger,
N. (2011). Server-side streaming processing of ws-
security. IEEE T. Services Computing, 4(4):272–285.
Gruschka, N. and Lo Iacono, L. (2009). Vulnerable Cloud:
SOAP Message Security Validation Revisited. In
ICWS ’09: Proceedings of the IEEE International
Conference on Web Services, Los Angeles, USA.
IEEE.
Gudgin, M., Hadley, M., and Rogers, T. (2006). Web Ser-
vices Addressing 1.0 - SOAP Binding. W3C Recom-
mendation.
Imamura, T., Dillaway, B., and Simon, E. (2002). XML
Encryption Syntax and Processing. W3C Recommen-
dation.
CLOSER2012-2ndInternationalConferenceonCloudComputingandServicesScience
196