<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The security of web services: Secure communication and identity management</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Hasnae L'AMRANI</string-name>
          <email>hasnae90lamranii@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Younès EL BOUZEKRI EL IDRISSI</string-name>
          <email>y.elbouzekri@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rachida AJHOUN</string-name>
          <email>r.ajhoun@um5s.net.ma</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National School of Applied Sciences of Kenitra (ENSAK), University Ibn Tofail</institution>
          ,
          <country country="MA">Morocco</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <fpage>56</fpage>
      <lpage>60</lpage>
      <abstract>
        <p>- Service Oriented Architectures have become the new trend in the world of communication on the web. Especially web services are the high-performance specification of service-oriented architectures. The use of confidential data on the Web becomes the primary problem in the secure communication over the web. The solution proposed in this paper is a secure communication tool OCS based on the principals of SAML standard and Single Sign-On. Our solution proposes a new approach which collaborates strong points of SAML standard and single sign-on method. The implementation of this approach is in the form of a platform or a tool which provide a secure communication between web services. Thus, a future approach that exceeds the level of authentication and address the level of access control, likewise and as a further step, prepare an evaluation of the most important technologies which provide Single Sign-On possibility and secure communication context between heterogeneous web services.</p>
      </abstract>
      <kwd-group>
        <kwd>SOA - web services - SAML - SSO - secured communication - security tokens - Secure communication tool on the web (OCS) - Shibboleth</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>Currently, online banking exchange, sending confidential
email, online trade, the exchange of government information on
networks is all at risk network uses. For these reasons, the
secured exchange on networks is becoming more necessary
than ever. Certainly the use of secure protocols can guarantee a
level of confidentiality, message integrity and user
authentication, but this level still minimal compared to the
value of the information exchanged over the network. For this,
the stress of communication between all web services,
distributed over a network, while maintaining the diversity of
domains and flexibility of data exchange need a deeper
discussion about mechanisms for authentication, and secure
communication over a network considered vulnerable.</p>
      <p>The procedure of authentication, based SSO protocol (Single
Sign-On) could solve the problem of domain change, and
reauthenticate with every area of change (Cross-Domain)
required for distributed applications. Furthermore, the
combination of SSO with the secure exchange of confidential
data, and a good identity management can improve safety
communications in web services.</p>
      <p>The most important objectives of this work are:
 Establish the state of art on the actual service oriented
architecture situation, especially, web services
security issues.
 Treat authentication problems and detect the major
problems of communication between web services.
 Investigate on web services security standards as
much as analyze identity management systems and
their most significant models, not only that, but also
single sign on authentication method.
 Prepare an appropriate study about SAML standard as
it is treat authentication level, also do the same with
single sign-on method.
 Propose a new approach which collaborates strong
point of SAML standard and single sign-on method.
The implementation of this approach is in the form of
a platform or a tool which provide a secure
communication between web services.</p>
      <p>In what follows, we will see all concepts related to
serviceoriented architectures, web services, subsequently the security
of web services and in particular, the standards for the safety of
web services, SAML standard as a technology for a securities
exchange , Single Sign-On and finally we will present our
approach entitled secure communication tool (OCS).</p>
      <p>II. SERVICE ORIENTED ARCHITECTURES AND WEB</p>
    </sec>
    <sec id="sec-2">
      <title>SERVICES</title>
      <p>There are various ways to define a Service Oriented
Architecture. The majority of these definitions focuses on the
technical aspects of SOA, although others show business
characteristics. SOA is an architecture style that allows the
reorganization of the information system. It enables the
encapsulation of an information system functionality into a
loosely coupled service belonging to both a business and
technical levels of the company [1].</p>
      <p>Web services are modular applications that can be made,
published, located, and invoked automatically in a web. Thus,
applications can make use of features located on other
machines in other applications. In the end, we can say that the
original purpose of a Web service is to make possible the use
of an application component in a distributed way.</p>
    </sec>
    <sec id="sec-3">
      <title>III. WEB SERVICES SECURITY</title>
      <p>In recent years, under the impulse of major participants like
IBM and Microsoft, some work aims to fill gaps of web
services security. Some of the evolutions of these actors,
creation and investment in the field of standardization and
standardization results agreed on standards for web services
security. There is a usual of standards for the security of web
services and identity management models.</p>
      <sec id="sec-3-1">
        <title>A. The standard of web services security</title>
        <p>A standard is a repository published by a private entity
other than a national or international standards body or not
approved by one of these organizations for a national or
international standard [2].</p>
        <p>Many standards and recommendations have been
developed in the field of security of web services. IBM and
Microsoft have prepared the documents describing the
technical strategy and roadmap for integrating security
architecture based on web services security.</p>
        <p>Developed standards concern the establishment of a trust
network, the definition of security policies, and
implementation of access control... [3].</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>WS-Secure Conversation</title>
    </sec>
    <sec id="sec-5">
      <title>WS-Security</title>
      <p>Policy</p>
      <p>WSFederation</p>
      <p>WSAuthorization</p>
    </sec>
    <sec id="sec-6">
      <title>WS-Trust WS-Privacy</title>
    </sec>
    <sec id="sec-7">
      <title>WS-Security XACML</title>
    </sec>
    <sec id="sec-8">
      <title>SAML</title>
    </sec>
    <sec id="sec-9">
      <title>XML-Encryption</title>
      <p>XML-Digital Signature</p>
      <p>The figure identifies security standards of web services that
we present some of them:</p>
      <sec id="sec-9-1">
        <title>SAML Standard:</title>
        <p>SAML standard (Security Assertion Markup Language) V2.0
[4] was designed by OASIS as a framework for the exchange
and propagation of safety information between trusted partners.
The security information’s are expressed as assertions about
entities with an identity in the security domain. Assertions can
provide information on the attributes of the features on
authentication already made or authorization decisions related
to specific resources [5].</p>
      </sec>
      <sec id="sec-9-2">
        <title>XACML Standard:</title>
        <p>XACML defines a language for the formulation of access
control policies. It specifies the necessary features for the
treatment of these policies and a data flow model of the
functional components for the infrastructure. XACML provides
authorization mechanisms that are transferred by SAML
standard in other words XACML complement SAML to
provide the authorization service.</p>
      </sec>
      <sec id="sec-9-3">
        <title>WS-Trust Standard:</title>
        <p>WS-Trust is based on the WS-Security security mechanisms
and defines a model for the establishment and maintain trusted
relationships across security domains. In service-oriented
architectures, confidence usually involves the emission,
exchange and validation of security tokens to control access for
specific services.</p>
      </sec>
      <sec id="sec-9-4">
        <title>WS-SecureConversation Standard:</title>
        <p>WS-SecureConversation standard allows a
secure communication and a confidential communication. It
uses public key for the exchange session keys and specifies the
mechanisms for establishing and sharing security contexts. This
protocol associated with the application level is the equivalent
of SSL at the transport level [3].</p>
      </sec>
      <sec id="sec-9-5">
        <title>B. Identity management models</title>
        <p>To address the problem of multiple user accounts for each
service used, and the great effort of memorizing passwords for
these accounts, different identity management models was
developed. The notion of identity management requires an
ensemble of models to meet the requirements interested
organizations:
model
isolated model
centralized model
federated model</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>User-centric model</title>
    </sec>
    <sec id="sec-11">
      <title>Description</title>
      <p>In this model, each service provider
(FS) has the responsibility for
managing the identity of each of its
users. FS deploys its own identity
management system (IMS) taking into
account the complexity and
functionality defined by the
organization. It is very difficult for FS,
to integrate these IMS to provide
coordinated services [7].</p>
      <p>This model is based on the single
storage of digital identities. The user
can authenticate with all service
providers using the same identity [7].</p>
      <p>In the federated model, the saved
identities in different service providers
are linked through pseudonyms. The
entities that make up the federation
form a Circle of Trust (CC)
establishing trust relationships [7].</p>
      <p>This model has been designed to give
users more control over their personal
data. Indeed, they can select the
identity provider that suits them and
choose the identity to use to access the
different services [7].</p>
      <p>IV. SECURE COMMUNICATION AND SINGLE SIGN-ON
Before beginning the concept of single sign-on and the
secure communication, it is necessary to say that our goal is to
see the usefulness of the combination of these two important
climbed in terms of improving the web service security.</p>
      <sec id="sec-11-1">
        <title>A. Single Sign-On (SSO) :</title>
        <p>The Single Sign-On is a process that allows a user to
authenticate once to access multiple applications or resources.</p>
        <p>This is a simplified model of single sign-on that shows the
radical principle of it. We note that the user may have access to
all the resources of both applications. A single authentication
guarantee repeated access to the resources.</p>
      </sec>
      <sec id="sec-11-2">
        <title>B. Secure communication based on SAML</title>
        <p>In this contribution, we were choosing to focus our work on
authentication level and as we explained above, SAML
standard has treated authentication problems by securing the
message’s contents. For those reasons, we will explain in
details Security Assertion Markup Language standard.</p>
        <p>So, communication between different remote services,
concern for safety, plays an important role in the design of
strong and effective safety standards.</p>
        <p>SAML standard, namely Security Assertion Markup
Language, is dedicated to helping developers for making
security contexts over the application-level for the
communications based on computers or between security
domains. In this function SAML standard transfer
authentication data that take care of terminal capacity to protect
against illegitimate uses systems.</p>
        <p>For the parts of SAML standard standards are illustrated in
the diagram below:</p>
        <p>SAML standard is used for secure information exchange
between business partners online. SAML manages the
information needed to authenticate and exchange processes
between partners. These exchanges are based on assertions,
protocols, bindings and SAML standard profiles.</p>
        <p>V. THE SECURE COMMUNICATION TOOL : OCS</p>
        <p>After studying single sign-on and SAML standard, we have
proposed a solution which is based on these two technologies.
This solution is a tool that allows secure communication
between web services. Also, it ensures single sign-on between
different services.</p>
      </sec>
      <sec id="sec-11-3">
        <title>A. Functional principle</title>
        <p>A tool for Secure Communications (OCS) brings together
the strengths of these technologies point, this tool allows a
demand and supply of services in a secure way. The figure
below explains the general principle of operation of the
proposed tool.
The user before reaching the desired service passes through
a series of steps to finally get to use it. The steps in this process
are divided as follows:






</p>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>Service Request; ;</title>
    </sec>
    <sec id="sec-13">
      <title>Redirect authentication;</title>
    </sec>
    <sec id="sec-14">
      <title>Checking the user account;</title>
    </sec>
    <sec id="sec-15">
      <title>Redirection to the desired service;</title>
    </sec>
    <sec id="sec-16">
      <title>Registration of new users;</title>
    </sec>
    <sec id="sec-17">
      <title>Validation of new users;</title>
    </sec>
    <sec id="sec-18">
      <title>Redirect requested service;</title>
      <sec id="sec-18-1">
        <title>B. Implementation</title>
        <p>The establishment of a practical solution, developed by
ourselves was our goal. The developed tool provides a roadmap
for users who want to access the web services by keeping the
confidentiality of their private data. Web services developers
can take this tool as a starting Framework, and then
simultaneously enrich and improve its level of security.
In what below, we will explain how we had implemented our
approach and give more details about every step mentioned
above.</p>
        <p>OCS tool is a framework based JEE language and contain a
list of web services distributed on different applications.
Our tool provides the following processes to access and
manipulate web service functionalities.</p>
      </sec>
      <sec id="sec-18-2">
        <title>Service Request:</title>
        <p>User request one of the services provided on the web services
portal, he must to choice one of those services and send his
request.</p>
      </sec>
      <sec id="sec-18-3">
        <title>Redirect authentication:</title>
        <p>After Service Request step, the user is redirected to the
authentication portal where he can log in for reach the access to
the service demanded.</p>
      </sec>
      <sec id="sec-18-4">
        <title>Checking the user account;</title>
        <p>When the user’s credentials are received, we check if this
user is identified in our Identity Provider or not, else according
to their situation he will be redirected to these services wanted
or to the inscription portal.</p>
      </sec>
      <sec id="sec-18-5">
        <title>Redirection to the desired service:</title>
        <p>The user who had the appropriate privilege is directly
redirected to resources requested, and he can access to other
services in a secure way, because this passage from one service
to another is based on security tokens.</p>
      </sec>
      <sec id="sec-18-6">
        <title>Registration of new users:</title>
        <p>The user who is not registered in our Identity provider must
continue the registration process, then we will evaluate his
account and, after that, we will decide to validate or reject his
inscription.</p>
      </sec>
      <sec id="sec-18-7">
        <title>Validation of new users;</title>
        <p>Actually, the administrator is the one who validates or reject
the user’s inscription and he can also disable some account
temporarily.</p>
      </sec>
      <sec id="sec-18-8">
        <title>Redirect requested service;</title>
        <p>When the new user account is valid, he will be directly
redirected to the service which he requested, and commence to
have the same privileges of the old users.</p>
        <p>The table below presents the objectives achieved and not
achieved after the development of the SCO tool:</p>
        <sec id="sec-18-8-1">
          <title>Objectives</title>
          <p>Secure communication
between web services
based Tokens
Transparent transition
between the different web
services available
Encryption passwords in
the database
Centralized authentication
in the identity provider
Single Sign-On based on
security Tokens
Sends of authentication
data for the first</p>
        </sec>
        <sec id="sec-18-8-2">
          <title>Satisfied</title>
          <p>yes</p>
        </sec>
        <sec id="sec-18-8-3">
          <title>Unsatisfied</title>
          <p>yes
yes
yes
yes</p>
          <p>Not yet
connection on a secure
way</p>
          <p>This evaluation isn’t a fixed point of view, it supports a lot
of modifications, however, our tool is still in the amelioration
and we continue to supply it with news ideas and propositions.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-19">
      <title>VI. FUTURE WORK</title>
      <p>The establishment of a secure communication between the
service and its users is a very complicated mission. In order to
achieve the success, it should not stop at a minimum safety
level, moreover, looking for other more effective solutions.
In this paper, we examined the SSO technology and the SAML
standard, thereafter we developed a tool for secure
communication (OCS) which is inspired by those two
technologies.</p>
      <p>All the results achieved stops at the authentication level;
either by keeping the safe passage for the private information
(SAML), or by using single a sign-on (SSO). For all of this and
as a perspective, we propose to expand the circle of research at
the management of the access control.</p>
      <p>In order to achieve this goal, we plan to investigate
in identity federation technology “Shibboleth” more
thoroughly and compare it with other technologies like OpenID,
OAuth...</p>
      <p>Identity federation, single sign-on systems (SSO), the
connection and the disconnection in the SSO systems will be
our future main research lines.</p>
      <p>Finally, we contemplate to compare our tool (OCS) with
other tools such as: shibboleth, OpenID…, to locate the
strength and weakness not just of our proposal but also of the
other technologies.</p>
      <p>VII.</p>
      <p>CONCLUSION</p>
      <p>The study of security standards for web services and their
areas of intervention and systems identities management have
enriched our scientific research about web services security.
The extensive studies on the safety standard SAML,
components, operation and threats that target has improved our
knowledge of the safe transfer of data authentication and
authorization on the web. In addition, the SSO brought another
level of security for web services, by reducing the number of
authentications, and subsequently decrease the probability of
interception of private user data.</p>
      <p>The proposal of the "OCS" tool is an innovative step,
because it reflects secure connections between clients and
services trade. This tool provides a secure authentication and
communication between the client and the web service and then
have a secure communication context procedure. As an outlook,
adding a distribution server for a security tokens temporary,
specific to each user for each service will be our goal to prevent
attacks like session hijacking and other attacks targeting private
customer data.
[1] «Interconnexion des processus Interentreprises : une
approche orientée services».
[2]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          hniques#Standard,» [En ligne]. [3]
          <string-name>
            <given-names>P. B.</given-names>
            <surname>Nassar</surname>
          </string-name>
          , «Gestion de la sécurité dans une
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>gestion des risques</article-title>
          ,»
          <year>2012</year>
          . [4]
          <string-name>
            <given-names>U.</given-names>
            i. d. t.
            <surname>-S. D. L. N. D. L'UIT</surname>
          </string-name>
          , «Langage de balisage
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>d'assertion de sécurité (SAML2.0)»</article-title>
          . Brevet X.
          <volume>1141</volume>
          ,
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>juin</surname>
          </string-name>
          <year>2006</year>
          . [5]
          <string-name>
            <surname>M. E. Hughes J.</surname>
          </string-name>
          , «Security Assertion Markup
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Language (SAML) V2</surname>
          </string-name>
          . 0,» OASIS SSTC Working Draft,
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <year>2005</year>
          . [6]
          <string-name>
            <given-names>M. U.</given-names>
            <surname>FRAGOSO-RODRIGUEZ</surname>
          </string-name>
          , «Modèle de
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          fédérée,»
          <volume>16</volume>
          décembre
          <year>2009</year>
          . [7]
          <string-name>
            <given-names>P. B.</given-names>
            <surname>Nassar</surname>
          </string-name>
          , «Gestion de la sécurité dans une
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>gestion des risques</article-title>
          ,»
          <year>2012</year>
          . [8]
          <string-name>
            <given-names>C. B. e. x. L. G. G. L.</given-names>
            <surname>Maesano</surname>
          </string-name>
          , Services Web en J2EE
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          EYROLLES 61,
          <string-name>
            <surname>bd</surname>
          </string-name>
          Saint-Germain 75240 Paris Cedex 05,
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <year>2003</year>
          . [9]
          <string-name>
            <surname>G. HARRY</surname>
          </string-name>
          , «
          <article-title>IAM : GESTION DES IDENTITES ET</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>DES ACCES CONCEPTS ET ETATS DE L'ART</surname>
          </string-name>
          ,»
          <volume>12</volume>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Septembre</surname>
          </string-name>
          <year>2013</year>
          .. [10]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zhenhua</surname>
          </string-name>
          , «Research and Implementation of a
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Telecommunications</surname>
          </string-name>
          , beging,
          <issue>21</issue>
          <year>Décembre 2012</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>