Providing security for Web Service Composition using Finite State Machine

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the security requirements is truly a demanding task because of the dynamic and capricious nature of the Web. Web Service Composition associates web services to create high level business process that absolutely matches and conforms appropriately to the service requestor’s needs. It involves customizing services often by locating, assimilating and deploying elementary services. Our paper proposes a policy based system for granting security during the process of web service composition. Policies defined for effective and secure composition analyze and verify the conditions under which the task of the web service is allowed or rejected. To achieve this specification, we make use of Finite State Machine model which clearly portrays the business and flow logic. Nodes in the Finite State Machine represent rules. Upon efficacious fulfillment of policies which are defined in the node access points, transition between rules is stimulated. A service composition is said to be successfully incorporated only if there is complete absence of policy violations when combining the policies of elementary services. The simulated FSM which extracts the rules and policies of the web services and correctly matches and satisfies the policy constraints defined in the access points ensure providing security for the composite web service.

Authors and Affiliations

Priya Sundar, R Raju, P Mahalakshmi, G Lalitha

Keywords

Related Articles

Optimized Load Balancing Strategy In Cloud Computing : A Review

Now a days every organization is migrating towards  cloud computing as cloud computing is considered being more flexible and scalable as compared to other technologies. The technology simply means to provide the com...

Identifying Network Anomalies Using Clustering Technique in Weblog Data

In this paper we present an approach for identifying networkanomalies by visualizing network flow data which is stored inweblogs. Various clustering techniques can be used to identifydifferent anomalies in the network. H...

Problems of Modern Networks

Most of the modern computer networks encounter a lot of problems in order to use the new development of technologies with its needed and requirements, especially for data density, which affect to the large data Losses, t...

A Proposed Electronic Health Record Content Structure Based on Clinical Organizations Survey

Computer systems and communication technologies made a strong and influential presence in the different fields of medicine. The cornerstone of a functional medical information system is the Electronic Health Records (EHR...

Mental Disorder Recognition Using Face Based Image Retrieval Technique In The Compressed Domain

In this paper we explore content based image retrieval to identify mental disorder based on face expression the compressed domain. The work was conducted by constructing an application or tool which automatically detect...

Download PDF file
  • EP ID EP649996
  • DOI 10.24297/ijct.v4i2b1.3232
  • Views 86
  • Downloads 0

How To Cite

Priya Sundar, R Raju, P Mahalakshmi, G Lalitha (2013). Providing security for Web Service Composition using Finite State Machine. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 435-444. https://europub.co.uk./articles/-A-649996