Runtime Reusable Weaving Model for Cloud Services Using Aspect-Oriented Programming: The Security-Related Aspect
نویسندگان
چکیده
Cloud computing technologyhas opened an avenue tomeet the critical need to securely share distributedresourcesandwebservices,andespeciallythosethatbelongtoclientswhohavesensitive dataandapplications.However,implementingcrosscuttingconcernsforcloud-basedapplicationsis achallenge.ThischallengestemsfromthenatureofdistributedWeb-basedtechnologyarchitecture andinfrastructure.Oneofthekeyconcernsissecuritylogic,whichisscatteredandtangledacross allthecloudservicelayers.Inaddition,maintenanceandmodificationofthesecurityaspectisa difficulttask.Therefore,cloudservicesneedtobeextendedbyenrichingthemwithfeaturestosupport adaptationsothattheseservicescanbecomebetterstructuredandlesscomplex.Aspect-oriented programmingistherighttechnicalsolutionforthisproblemasitenablestherequiredseparationwhen implementingsecurityfeatureswithouttheneedtochangethecorecodeoftheserverorclientinthe cloud.Therefore,thisarticleproposesaRuntimeReusableWeavingModelforweavingsecurityrelatedcrosscuttingconcernsthroughlayersofcloudcomputingarchitecture.Theproposedmodel doesnotrequireaccesstothesourcecodeofacloudserviceandthiscanmakeiteasierfortheclient toreusetheneededsecurity-relatedcrosscuttingconcerns.Theproposedmodelisimplementedusing aspectorientationtechniquestointegratecloudsecuritysolutionsatthesoftware-as-a-servicelayer. KeyWORdS Aspect-Oriented Programming, Cloud Computing, Cloud Context, Cloud Security Service, Dynamic Joinpoints, Security Crosscutting Concerns, Web Services
منابع مشابه
Aspect-Oriented Programming Runtime-Enforcement of Temporal Properties in Security-Critical Software
The Aspect-Oriented Programming paradigm has been advocated for modularisation of cross-cutting concerns in large systems. Various applications of this approach have been explored in the literature, one of which is that of runtime-verification based on assertions or temporal properties. Manually weaving temporal properties to ensure correct execution into a large code base is difficult to achie...
متن کاملDynamic Aspect Weaver Family for Family-based Adaptable Systems
Complex software systems, like operating systems and middleware, have to cope with a broad range of requirements as well as strict resource constraints. Family-based software development is a promising approach to develop application-specific systems from reusable components. However, once statically configured, these systems still need to adapt at runtime according to the dynamics of the envir...
متن کاملTowards an Aspect Based, Programmable and Extensible Middleware Framework
J2EE is a middleware architecture augmented with supporting tools for developing large scale client/server and multi-tier applications. J2EE uses Enterprise JavaBeans as its component model. The realization of these components by a J2EE application server can be conceptually decomposed into distinct aspects such as persistence, transaction management, security, and load balancing. However, curr...
متن کاملAdaptive Access Control Enforcement in Social Network Using Aspect Weaving
Current social network systems support a large range of applications with very different security requirements. Even if available social network solutions provide some security functionalities, users do not control these functionalities and cannot customize them to handle their specific security needs. In this paper, we suggest a new approach to handle these issues. This approach is based on As...
متن کاملAn Aspect-oriented Approach to Relating Security Requirements and Access Control Conference Item an Aspect-oriented Approach to Relating Security Requirements and Access Control
Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, we propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by composing the modules represent...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Int. J. Web Service Res.
دوره 15 شماره
صفحات -
تاریخ انتشار 2018