Securing Integration of Cloud Services in Cross-Domain Distributed Environments

Bojan Suzic

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Traditional cloud integration scenarios, as adopted by many organizations, assume business processes to be executed in a cross-domain context, connecting on-premise and cloud applications. The emerging model of cloud-based integration platforms extends these scenarios by transferring business process execution entirely to the cloud. Although this approach provides numerous benefits and opens a new range of opportunities, its adoption requires reconsideration of currently applied practices and their adjustment to a new perspective.

In this work, we analyze the existing approaches to cross-domain service composition based on cloud integration platforms. We particularly focus on the security of these approaches, considering currently dominant OAuth 2.0 web authorization protocol and emerging UMA protocol. For this purpose, we present a new tool that enables UMA support in Apache Camel integration framework. We then analyze and discuss the integration flows relying on both protocols. Finally, based on RMIAS framework, we provide a security assessment of both approaches, presenting an overview of issues and challenges for future work.
Originalspracheenglisch
TitelProceedings of the 31st Annual ACM Symposium on Applied Computing
ErscheinungsortNew York, NY, USA
Herausgeber (Verlag)Association of Computing Machinery
Seiten398-405
Seitenumfang8
ISBN (Print)978-1-4503-3739-7
DOIs
PublikationsstatusVeröffentlicht - 2016

ASJC Scopus subject areas

  • Computernetzwerke und -kommunikation
  • Information systems
  • Informatik (sonstige)

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Theoretical
  • Experimental

Fingerprint

Untersuchen Sie die Forschungsthemen von „Securing Integration of Cloud Services in Cross-Domain Distributed Environments“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren