SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
DOI : 10.5121/ijait.2014.4303 25
DESIGNING AND IMPLEMENTING THE
LOGICAL SECURITY FRAMEWORK FOR E-
COMMERCE BASED ON SERVICE ORIENTED
ARCHITECTURE
Ashish Kr. Luhach1
, Dr. Sanjay K. Dwivedi2
, Dr. C. K. Jha3
1
Dronacharya College of Engineering, Gurgaon, Hr, India
2
BBA University, Lucknow, U.P., India
3
Banasthali University, Jaipur, Rajasthan, India.
ABSTRACT
Rapid evolution of information technology has contributed to the evolution of more sophisticated E-
commerce system with the better transaction time and protection. The currently used E-commerce models
lack in quality properties such as logical security because of their poor designing and to face the highly
equipped and trained intruders. This editorial proposed a security framework for small and medium sized
E-commerce, based on service oriented architecture and gives an analysis of the eminent security attacks
which can be averted. The proposed security framework will be implemented and validated on an open
source E-commerce, and the results achieved so far are also presented.
KEYWORDS
Web services, E-commerce, Simple Object Access Protocol
1. INTRODUCTION
With the evolution in information engineering, internet users increased exponentially and as a
consequence of which websites are utilized as the new and integrated marketing. These websites
eliminated the physical part of markets. Websites provide a virtual place for the user to perform
online transactions, known as E-markets. These E-markets are becoming the core of attraction for
researchers and initiatives. E-commerce systems are mainly based on networks and computing
power of the users. At present, the problem exists in E-Commerce’s are due to frequent update of
business process because of changing customer demands and platform integration because of the
heterogeneous platform used by different enterprises. To subdue the alleged problems in business
operation and integration, Service Oriented Architecture (SOA) can be applied. SOA is an
information technology approach in which the existing applications in an enterprise can use the
various services available in a network i.e. World Wide Web.
With the help of SOA, such applications can be evolved, as well. SOA also has the feature of
loose coupling, which resolves the problem of transmission and integration of information. SOA
has an open standard protocols and excellent encapsulation, which makes SOA the suitable choice
to implement E-commerce.
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
26
2. E-COMMERCE BASED ON SOA
In general, the most important aspect in business from the customer’s point of view is cost. E-
commerce systems need techniques or technical solutions, which reduces the processing or
transaction cost as the number of users increased exponentially in recent years for performing
online transactions [2]. Another important problem to address while discussing E-commerce’s is
Interoperability because E-commerce’s may vary from each other in terms of business flow and
data description. This variation depends upon communication protocols, and object models used.
Figure1: E-commerce based on SOA
As a consequence of which, if any one of the partner involved in the E - commerce scenario made
any alterations in their realization mechanism, then to adopt these changes other partners also
have to make modifications in their operation. Debating the future of E-commerce development,
Interoperability is still an unresolved inquiry. At present, a great deal of research and conferences
are conducted on E-commerce just to furnish backup to the enterprises for their migration towards
E-commerce. However, Service Oriented Architecture (SOA) proves to be one of the best
technological results to implement E-commerce. The general idea behind developing SOA is to
integrate software into services. SOA is a distributed computing technology, which provides
services through XML protocols. SOA applications embedded into network services using XML.
Web Services attracts enterprises and business to get the benefits of connectivity through the
networks [2]. SOA can help organizations to recycle their existing assets such as programming
code with significant changes and produce a solution for application consolidation, which saves
cost and execution time.SOA provides a reliable platform for communication and integration
between E-commerce system and their associated partners; this will explore new dimensions of
the enterprise. The principal characteristics of SOA are Interoperability and Reusability. However
to solve the above discussed problems in E-commerce, SOA proves to be the best solution for
implementing E-commerce. Figure 1 show an E-commerce based on SOA.
3. CURRENT SECURITY SOLUTIONS AND PRODUCTS –
RELATED WORK
The concept of SOA changed the whole paradigm for the application development. As developers
seem to adopt SOA anxiously, but at the same time, SOA implementation can lead to complex
security and management issues. According to the survey conducted in 2008, 43% of the IT
executives rated security threats as most critical issues while migrating towards SOA and 57%
admits that security threats are one of the main reasons for adjourning the adoption of SOA. The
majority of organizations migrated towards SOA are still at risk and putting a lot of efforts for
securing their SOA environment. Now a day to secure SOA environment, developers are using
current security approach and products provided by companies like IBM, HP, SOA Software,
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
26
2. E-COMMERCE BASED ON SOA
In general, the most important aspect in business from the customer’s point of view is cost. E-
commerce systems need techniques or technical solutions, which reduces the processing or
transaction cost as the number of users increased exponentially in recent years for performing
online transactions [2]. Another important problem to address while discussing E-commerce’s is
Interoperability because E-commerce’s may vary from each other in terms of business flow and
data description. This variation depends upon communication protocols, and object models used.
Figure1: E-commerce based on SOA
As a consequence of which, if any one of the partner involved in the E - commerce scenario made
any alterations in their realization mechanism, then to adopt these changes other partners also
have to make modifications in their operation. Debating the future of E-commerce development,
Interoperability is still an unresolved inquiry. At present, a great deal of research and conferences
are conducted on E-commerce just to furnish backup to the enterprises for their migration towards
E-commerce. However, Service Oriented Architecture (SOA) proves to be one of the best
technological results to implement E-commerce. The general idea behind developing SOA is to
integrate software into services. SOA is a distributed computing technology, which provides
services through XML protocols. SOA applications embedded into network services using XML.
Web Services attracts enterprises and business to get the benefits of connectivity through the
networks [2]. SOA can help organizations to recycle their existing assets such as programming
code with significant changes and produce a solution for application consolidation, which saves
cost and execution time.SOA provides a reliable platform for communication and integration
between E-commerce system and their associated partners; this will explore new dimensions of
the enterprise. The principal characteristics of SOA are Interoperability and Reusability. However
to solve the above discussed problems in E-commerce, SOA proves to be the best solution for
implementing E-commerce. Figure 1 show an E-commerce based on SOA.
3. CURRENT SECURITY SOLUTIONS AND PRODUCTS –
RELATED WORK
The concept of SOA changed the whole paradigm for the application development. As developers
seem to adopt SOA anxiously, but at the same time, SOA implementation can lead to complex
security and management issues. According to the survey conducted in 2008, 43% of the IT
executives rated security threats as most critical issues while migrating towards SOA and 57%
admits that security threats are one of the main reasons for adjourning the adoption of SOA. The
majority of organizations migrated towards SOA are still at risk and putting a lot of efforts for
securing their SOA environment. Now a day to secure SOA environment, developers are using
current security approach and products provided by companies like IBM, HP, SOA Software,
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
26
2. E-COMMERCE BASED ON SOA
In general, the most important aspect in business from the customer’s point of view is cost. E-
commerce systems need techniques or technical solutions, which reduces the processing or
transaction cost as the number of users increased exponentially in recent years for performing
online transactions [2]. Another important problem to address while discussing E-commerce’s is
Interoperability because E-commerce’s may vary from each other in terms of business flow and
data description. This variation depends upon communication protocols, and object models used.
Figure1: E-commerce based on SOA
As a consequence of which, if any one of the partner involved in the E - commerce scenario made
any alterations in their realization mechanism, then to adopt these changes other partners also
have to make modifications in their operation. Debating the future of E-commerce development,
Interoperability is still an unresolved inquiry. At present, a great deal of research and conferences
are conducted on E-commerce just to furnish backup to the enterprises for their migration towards
E-commerce. However, Service Oriented Architecture (SOA) proves to be one of the best
technological results to implement E-commerce. The general idea behind developing SOA is to
integrate software into services. SOA is a distributed computing technology, which provides
services through XML protocols. SOA applications embedded into network services using XML.
Web Services attracts enterprises and business to get the benefits of connectivity through the
networks [2]. SOA can help organizations to recycle their existing assets such as programming
code with significant changes and produce a solution for application consolidation, which saves
cost and execution time.SOA provides a reliable platform for communication and integration
between E-commerce system and their associated partners; this will explore new dimensions of
the enterprise. The principal characteristics of SOA are Interoperability and Reusability. However
to solve the above discussed problems in E-commerce, SOA proves to be the best solution for
implementing E-commerce. Figure 1 show an E-commerce based on SOA.
3. CURRENT SECURITY SOLUTIONS AND PRODUCTS –
RELATED WORK
The concept of SOA changed the whole paradigm for the application development. As developers
seem to adopt SOA anxiously, but at the same time, SOA implementation can lead to complex
security and management issues. According to the survey conducted in 2008, 43% of the IT
executives rated security threats as most critical issues while migrating towards SOA and 57%
admits that security threats are one of the main reasons for adjourning the adoption of SOA. The
majority of organizations migrated towards SOA are still at risk and putting a lot of efforts for
securing their SOA environment. Now a day to secure SOA environment, developers are using
current security approach and products provided by companies like IBM, HP, SOA Software,
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
27
Oracle and SAP. This section provides an overview of current security solution and products
provided by various companies.
3.1 SOA Software Solution
SOA Software is one of the leading service providers in the field of SOA security and
management. SOA Software developed a product named as an SOA Infrastructure Reference
Model based on current standards [9]. The SOA Software’s product contains the following:
3.1.1 Service Manager
It acts as policy manager and the main of service manager is to provide security services. Service
manager also provides high performance and scalable SOA management solutions. Service
manger includes management server and the management server helps to manage the various
application monitoring functions such as registry and alert manager.
3.1.2 Network Director
Network Director designs and implements the policies for the service manager. The main
objective of the Network Director is to provide fault tolerance capabilities, so that the available
services can be consumed by the widest possible range of applications. It delivers comprehensive
governance, security, monitoring, management and mediation of Web services.
3.1.3 Partner Manager
partner manager ensures that organizations can securely publish their web services for their
partners and customers. It provides a complete trading partner management, and service
provisioning workflow solution. It uses service virtualization to securely extend internal services
into partners’ networks.
3.1.4 SOLA
SOLA stands for Service Oriented Legacy Architecture (SOLA) and SOLA referred as complete
mainframe Service Oriented Architecture solution [10]. The most important advantage of SOLA
is that it makes the mainframe applications as a part of SOA in a cost effective manner. SOLA
provides customers with a fast and easy process to expose mainframe applications as secure Web
Services, and allows mainframe applications to consume Web Services. The SOLA runtime
environment runs entirely on the mainframe, eliminating the need for expensive, unreliable and
unnecessary middleware. SOLA is the only product proven in enterprise implementations to
handle high volume (10 million+) transactions per day in mission-critical mainframe SOA
environments. The various advantages of SOLA are comprehensive mainframe SOA solution, one
click web services, no extra software’s needed to install at work station and centralized directory.
3.2. IBM SOA Security Reference Model
Figure 3 shows the basic structure of IBM SOA Security Reference Model [11], this security
model mainly divided into three different parts which are Business Security Services, IT Security
Services and Security Policy Management. Business Security Services represent the main function
of business security services is to manage the business requirement, for example identity
management, data protection and securing networks. IT Security Services can be defined as the
foundation wedges of an SOA infrastructure. IT Security Services makes the SOA environment
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
28
capable of stopping up the services offered with the SOA infrastructure. In general, IT Security
Services form a universal statement of services, which can be utilized by different users or
components in the SOA environment. These services cover confidentiality, integrity, identity,
authorization and authentication. Security Policy Management describes and design the various
outlines related to the implementation of security policies in SOA environments. This includes the
ability to define policies to authenticate and authorize requesters to access services, propagate
security context across service requests based on an underlying trust model, audit events of
significance, and protect information. Thus, Security Policy Management functionality is a core
part of providing security capability in SOA. IBM SOA Security Reference Model was developed
by IBM and the main objective behind this is to ascertain the security in SOA environments. To
ascertain the security in a real world SOA environment, IBM also developed several products and
instruments such as Tivoli and WebSphere. Tivoli and WebSphere are discussed next.
3.2.1 WebSphere Application Server
WebSphere Application Server is used for E-commerce and integration of organisational
information. It can be defined as software framework used for hosting Java based applications.
WebSphere Application Server promises to save the rich application development environment
and it also provides superior transaction capabilities for transaction management. WebSphere
Application Server has highly improved security model, as it is designed and produced on the
basis of services provided in the operating organization. WebSphere Application Server supports
user authorization and certification. The primary advantages of WebSphere Application Server are
improved security and control standards, includes liberty Profile, superior capabilities for
deployment and management for applications and higher developer productivity.
3.2.2 IBM Tivoli security management solutions
IBM Tivoli security management solutions designed to ensure the dynamic organizations and
supply them a perfect entourage of security and compliance management. It solves the two critical
problems for E-commerce, which is security management and identity management. It assists
organizations in recovering from security attacks and system failures by bringing users and
application online. It also assists organizations to actively monitor and react to security attacks.
The primary benefits of IBM Tivoli solution are managing risk by specifying and deploying
secure infrastructure, improved services and Reducing Cost of management, governance and
mental process of the security infrastructure while increasing productivity.
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
29
Figure 3 IBM SOA Security Reference Model
3.3 JBoss Enterprise SOA (ESOA) Platform
JBoss ESOA is open source software primarily based on Service Oriented Architecture and Java.
It can be implemented independently or with other third party components as well. JBoss ESOA
enables enterprises to properly handle business events, Integrate services; Automate existing
business operations and linking existing IT resources with information and services. According to
[12], “The versatility of the program permits us to use one development tool, technology and set
of touchstones for many uses. Likewise, applications deployed on the JBoss ESOA Platform can
be monitored and contained in a standardized way”. JBoss itself is freely licensed but also called
for other middleware components such as JBoss Enterprise Service Bus (ESB) and JBoss
Enterprise Application Platform. JBoss can be applied with whatever operating system such as
Windows, UNIX and Linux. The main implementation benefits of JBoss are improved business
process performance, improved reliability and scalability, higher customer satisfaction and
Eliminate Manual Pain Points from your Business Processes.
3.4Vordel Solution
Vordel is an organization which provides various hardware and software solutions to implement
SOA. The primary benefits of Vordel solution are Efficient security mechanism against various
security attacks such as XML content-layer attacks, Improved monitoring of web serving
performance and usage, Improved performance by removing processing bottlenecks, Enhanced
governance through central service management, Well defined access control including
authentication and authorization and Proper control for SOA policy.
3.5 Oracle SOA Security Solution
Oracle SOA Security Solution ensures the security outside the web serves as well. This solution
can combine transport-layer and application-level protection, and use a layered defense scheme.
The diverse benefits and products provided by Oracle SOA Security Solution are:
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
30
• Identity management includes Oracle Access Manager, Oracle Identity Federation and
Oracle Web Services Manager
• Deployment and development tools include Oracle Security Developer Tools (OSDT)
• Java Developer consists of Java Integrated Development Environment
• Governance aware runtime environment comprises of Oracle components for Java (OC4J)
Oracle's strategy is to focus on well established criteria such as SAML, essential for identity
federation, identity propagation, and close-to-end security from the user’s web browser all the
way across SOA-based transactions involving multiple Web Services.
4. SECURITY ANALYSIS OF SOA BASED E-COMMERCE
E-commerce provides user with a variety of business service components and user can call any of
these business service components online such as trading information services, contract
management services and other information management services, if they are authenticated and
passed. Before calling business service component's user submits their authentication through
HTTP to a WWW host. Users can log on to the component requested through Simple Object
Access Protocol (SOAP) and at the same time user may utilize other services as well, which is
furnished by other collaborators such as banking and logistics services. E-commerce platform is
not hardly used for online transactions, but also can be practiced as a serial publication of services
such as banking and revenue enhancement. So, E-commerce provides a complete lay down of
business procedures which consist of various inspection and repairs. These services are originated
by different vendors and managed or kept up by diverse departments within an endeavor, which
makes E-commerce a service oriented heterogeneous system. This heterogeneous system will
confront a kind of security threats and risk factors which are:
4.1 Certificate Duplicity
Approach to business service components, users should submit their authentication through HTTP
and get it validated from web hosts. In return an authentication credential is released for users as a
validation of certification. After getting this authentication certificate user can access business
service components. This process of issuing authentication certificate is managed by Identity
Management Service (IMS). It is possible to generate a duplicate certificate or forge the
certificate and submit it to the web server instead of the original user and identity authentication is
bypassed and call to the Business Service Component can be attained. One of the possible
implementation solutions for this is to use better communication protocols such as HTTPS, which
can’t be worked well.
4.2 No filters mentioned on the application level
Filters are really important at application level and absence of these filters may allows an attacker
to send malicious codes through web application and perform attacks like Cross Site Scripting,
Remote/Local File Inclusion etc. which may immediately or indirectly lead to a successful attack.
4.3 Unsecure Database
In most of E-commerce models, database is maintained on the same server without going through
any security bars. Thither are a number of security risks related to database that are as follows:
• Malware infections into the database may also go to incidents like leakage or disclosure of
important information.
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
31
5. PROPOSED E-COMMERCE MODEL BASED ON SOA
The proposed Security Framework of SOA based E-commerce is shown in Figure 4. The
proposed security framework resolves the security threats and risk involved in E-commerce
security. In the proposed framework, the authentication of user is handled by Identity
Management Service (IMS). IMS provides access to the authorized and authenticated users for
various business service components such as Transaction Information Service and Online
Transaction Services. Proposed framework also implemented on E-commerce systems which
supports a series of services such as insurance services and banking services. User can call any of
the supported services, by sending access request to that corresponding service through IMS. IMS
in return generates a certificate of authentication for the users. The proposed security framework
has the additional feature called as input sanitization. The main aim of the input sanitization is to
filter the users request according to the services available in the database, if no corresponding
services are available the users' requests denied. Rule based plug-in is defined in the proposed
security framework to offer an extra layer of protection. Intrusion detection system (IDS) and
Intrusion protection system (IPS) is employed in the proposed security framework to provide
spare security to business service components and database related. In offering a security
framework, business service components and connected database are maintained on different
hosts. Server 1 maintains business service components and network hosts. Server 2 keeps up the
databases connected with business service components. The communication between server 1 and
server 2 is monitored by a firewall. If an attack detected by Intrusion detection system (IDS),
firewall will disconnect the both servers from one another to assure minimal data loss.
6. IMPLEMENTING THE PROPOSED SOLUTION
The proposed security framework implemented on open source E-commerce system. Through
which the proposed framework analyzed to discover its strengths and weakness in the light of
security threats discussed above. The methodology for evaluating the framework depends upon
the character of security threats. The rating also depends on the security requirements and
arranging for the endeavour. Some of the character attributes which already achieved, such as
database encryption shown in figure 5.
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
32
Figure 4 The Architectural overview of the proposed model
6.1 Database Encryption
The database maintained onto a totally different host (Server 2) which monitored by IDS/IPS. The
database itself encrypted with a unique key which stored in data service component on server 1.
Figure 5 shows the encrypted database for the proposed security design.
Figure 5 Encrypted Database
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
33
6.2 Prevention against DOS and DDOS
The presentation of IDS/IPS on both the servers will avoid most of the Denial of Service attacks
as all the incoming data would be supervised and separated out by them. The IDS/IPS can be
easily configured and automatically outlaw the IP Addresses generating multiple requests within a
suitable interval of fourth dimension. Snort is open source software, which is used as IDS/IPS.
Figure 6 shows how incoming data and activities can be monitored in proposed security design.
Figure 6: Snort as IDS
7. CONCLUSION
In today’s rising information technology infrastructure, E-commerce is a promising business
opportunity which continues and joins the business partners and customers in the electronic
environment. The purpose of this research is to identify the best technology for E-commerce
implementation, which is hardware and software platform neutral. This paper proposes an
implementation scheme for E-commerce applications, which based on SOA. The proposed
strategy has a logical security cover for user transactions and databases.
REFERENCES:
[1] Min Huang et al, “Research for E-Commerce Platform Security Framework Based On SOA”,
proceeding of the 2011 4th International Conference on Biomedical Engineering and Informatics
(BMEI), Shanghai, China, Pg. No. 2171-2174, October 15-17, 2011.
[2] Luhach Ashish Kr., Dwivedi Sanjay k. “Service-Oriented Architecture and Web Services Concepts,
Technologies, and Tools” proceeding of the IEEE International Conference on Computational
Intelligence and Computing Research (ICCIC-2011), Kanyakumari, India, Pg. No. 147-150, Dec 15-
18, 2011.
[3] Erl, T., SOA Principles of Service Design. 1 Ed., Indiana: Prentice Hall, 2008.
[4] Giblin, T. I. el at., ‘Web Services Security Configuration in a Service-Oriented Architecture’. WWW
2005, May 10-14, 2005 pp. 1120-1121. Chiba, Japan: ACM.
[5] Kuppuraju, S., Kumar, A., & Kumari, G. P. (2007). ‘Case Study to Verify the Interoperability of a
Service Oriented Architecture Stack’. 2007 IEEE International Conference on Services Computing
(SCC 2007). IEEE Computer Society.
[6] Ramaro Kannergant, Prasad Chodavarapu. SOA Security in Action. Manning Publishing, 2006.
[7] ChristopherSteel Ramesh Nagappan, Ray La. Core Security Patterns. London: PrenticeHall, 2005.
[8] Ramarao Kanneganti, Prasad Chodavarapu, SOA Security, Manning Publications Co., USA, 2008.
January.
[9] SOA Software, Inc. Seven steps to SOA, Los Angeles, white paper, 2006.
International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014
34
[10] SOA Software, Inc. SOA Infrastructure Reference Model, Los Angeles (U.S.A.), White paper, 2002.
[11] Axel Buecker et al., Understanding SOA Security Design and Implementation, 7 ed., Redbooks: IBM
Corp., November 2007.
[12] SOA Magazine, Online, Available: http://soa.sys-con.com.
[13] Luhach Ashish Kr., Dwivedi Sanjay k., Jha C. K., Designing a logical Security Framework for E-
commerce System based on Service Oriented Architectures, International journal of Soft Computing,
Vol. –5, No.-2, Pg. No 1-10, May 2014.
[14] Mohammad H. Danesh et al, “A framework for process and performance management in service
oriented virtual organisations”, International Journal of Computer Information Systems and Industrial
Management Applications, Vol. -5, Pg. No. 203-215, 2013.
[15] Deepu Raveendran et al, “A Study on Secure and Efficient Access Control Framework for SOA”,
International Journal of Computer Science and Telecommunications, Vol.-3, No.-6, Pg. No. 71-76,
June 2012.
[16] Seyyed Mohammad Reza Farshchi et al., “Study of Security Issues on Traditional And New
Generation of E-Commerce Model, proceeding of the 2011 International Conference on Software and
Computer Applications, Kathmandu, Nepal, July 1-2, 2011, published by IPCSIT, Singapore, Vol.-9,
Pg. No. 113- 117.

More Related Content

What's hot

E-Commerce Programming - "Chapter 3: Building an e-Business: Design, Developm...
E-Commerce Programming - "Chapter 3: Building an e-Business: Design, Developm...E-Commerce Programming - "Chapter 3: Building an e-Business: Design, Developm...
E-Commerce Programming - "Chapter 3: Building an e-Business: Design, Developm...Ra'Fat Al-Msie'deen
 
TM Forum AI Program Overview
TM Forum AI Program OverviewTM Forum AI Program Overview
TM Forum AI Program OverviewTMForum
 
How Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationHow Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationCognizant
 
Chap07 Electronic Business Systems
Chap07 Electronic Business SystemsChap07 Electronic Business Systems
Chap07 Electronic Business SystemsAqib Syed
 
The Cloud Is The Corporation Abeyta
The Cloud Is The Corporation AbeytaThe Cloud Is The Corporation Abeyta
The Cloud Is The Corporation Abeytabern co
 
Web Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesWeb Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesMustafa Salam
 
Long Term e-skills Stratergy, EU
Long Term e-skills Stratergy, EULong Term e-skills Stratergy, EU
Long Term e-skills Stratergy, EU@cristobalcobo
 
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTURE
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTUREBUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTURE
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTUREIJCSEA Journal
 
Chapter 08 pertemuan 11- donpas - e-business dan e-commerce
Chapter 08 pertemuan 11- donpas - e-business dan e-commerceChapter 08 pertemuan 11- donpas - e-business dan e-commerce
Chapter 08 pertemuan 11- donpas - e-business dan e-commerceUNIVERSITAS TEKNOKRAT INDONESIA
 
Business Connectivity Solution
Business Connectivity SolutionBusiness Connectivity Solution
Business Connectivity SolutionLatte Media
 
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONSREFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONScsandit
 
Relevance In Enterprises
Relevance In EnterprisesRelevance In Enterprises
Relevance In Enterprisesramesh_manian
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
E business 2 teofilo kisanji university
E business 2 teofilo kisanji universityE business 2 teofilo kisanji university
E business 2 teofilo kisanji universityITNet
 
Sravan 30131831 cloud computing
Sravan 30131831 cloud computingSravan 30131831 cloud computing
Sravan 30131831 cloud computingSravan Kumar Eaga
 

What's hot (18)

E-Commerce Programming - "Chapter 3: Building an e-Business: Design, Developm...
E-Commerce Programming - "Chapter 3: Building an e-Business: Design, Developm...E-Commerce Programming - "Chapter 3: Building an e-Business: Design, Developm...
E-Commerce Programming - "Chapter 3: Building an e-Business: Design, Developm...
 
TM Forum AI Program Overview
TM Forum AI Program OverviewTM Forum AI Program Overview
TM Forum AI Program Overview
 
How Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System ModernizationHow Domain-Driven Design Can Boost Legacy System Modernization
How Domain-Driven Design Can Boost Legacy System Modernization
 
Chap07 Electronic Business Systems
Chap07 Electronic Business SystemsChap07 Electronic Business Systems
Chap07 Electronic Business Systems
 
2008 4
2008 42008 4
2008 4
 
The Cloud Is The Corporation Abeyta
The Cloud Is The Corporation AbeytaThe Cloud Is The Corporation Abeyta
The Cloud Is The Corporation Abeyta
 
Web Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesWeb Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business Processes
 
Long Term e-skills Stratergy, EU
Long Term e-skills Stratergy, EULong Term e-skills Stratergy, EU
Long Term e-skills Stratergy, EU
 
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTURE
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTUREBUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTURE
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTURE
 
Chapter 08 pertemuan 11- donpas - e-business dan e-commerce
Chapter 08 pertemuan 11- donpas - e-business dan e-commerceChapter 08 pertemuan 11- donpas - e-business dan e-commerce
Chapter 08 pertemuan 11- donpas - e-business dan e-commerce
 
Business Connectivity Solution
Business Connectivity SolutionBusiness Connectivity Solution
Business Connectivity Solution
 
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONSREFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
 
Relevance In Enterprises
Relevance In EnterprisesRelevance In Enterprises
Relevance In Enterprises
 
Edi
EdiEdi
Edi
 
Ashu lic reporrtjgjg
Ashu lic reporrtjgjgAshu lic reporrtjgjg
Ashu lic reporrtjgjg
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
E business 2 teofilo kisanji university
E business 2 teofilo kisanji universityE business 2 teofilo kisanji university
E business 2 teofilo kisanji university
 
Sravan 30131831 cloud computing
Sravan 30131831 cloud computingSravan 30131831 cloud computing
Sravan 30131831 cloud computing
 

Viewers also liked

Migration from Weblogic to vFabric Cloud App Platform
Migration from Weblogic to vFabric Cloud App PlatformMigration from Weblogic to vFabric Cloud App Platform
Migration from Weblogic to vFabric Cloud App PlatformVMware vFabric
 
Cap2194 migration from weblogic to v fabric - cloud application platform
Cap2194  migration from weblogic to v fabric - cloud application platformCap2194  migration from weblogic to v fabric - cloud application platform
Cap2194 migration from weblogic to v fabric - cloud application platformRamarao Kanneganti
 
Spring One 2012 Presentation – Effective design patterns with NewSQL
Spring One 2012 Presentation – Effective design patterns with NewSQLSpring One 2012 Presentation – Effective design patterns with NewSQL
Spring One 2012 Presentation – Effective design patterns with NewSQLVMware vFabric
 
vFabric Data Director - DB as a Service
vFabric Data Director - DB as a ServicevFabric Data Director - DB as a Service
vFabric Data Director - DB as a ServiceVMware vFabric
 
Experimental research data quality in
Experimental research data quality inExperimental research data quality in
Experimental research data quality inijait
 
INFORMATION AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY OF EGYPTIAN ...
INFORMATION  AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY  OF  EGYPTIAN ...INFORMATION  AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY  OF  EGYPTIAN ...
INFORMATION AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY OF EGYPTIAN ...ijait
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancementijait
 
An adaptive watermarking process in hadamard transform
An adaptive watermarking process in hadamard transformAn adaptive watermarking process in hadamard transform
An adaptive watermarking process in hadamard transformijait
 
4214ijait01
4214ijait014214ijait01
4214ijait01ijait
 
Evaluation of hospital information
Evaluation of hospital informationEvaluation of hospital information
Evaluation of hospital informationijait
 
Artificial intelligence in law
Artificial intelligence in lawArtificial intelligence in law
Artificial intelligence in lawijait
 
Exact implementation of design patterns in
Exact implementation of design patterns inExact implementation of design patterns in
Exact implementation of design patterns inijait
 
Influence of icts on workforce
Influence of icts on workforceInfluence of icts on workforce
Influence of icts on workforceijait
 
Introduction to Cloud Foundry
Introduction to Cloud FoundryIntroduction to Cloud Foundry
Introduction to Cloud FoundryVMware vFabric
 
VMware vFabric - CIO Webinar - Al Sargent
VMware vFabric - CIO Webinar - Al SargentVMware vFabric - CIO Webinar - Al Sargent
VMware vFabric - CIO Webinar - Al SargentVMware vFabric
 
vFabric - Ideal Platform for SaaS Apps
vFabric - Ideal Platform for SaaS AppsvFabric - Ideal Platform for SaaS Apps
vFabric - Ideal Platform for SaaS AppsVMware vFabric
 
Oracle database 12c new features
Oracle database 12c new featuresOracle database 12c new features
Oracle database 12c new featuresJakkrapat S.
 

Viewers also liked (18)

Migration from Weblogic to vFabric Cloud App Platform
Migration from Weblogic to vFabric Cloud App PlatformMigration from Weblogic to vFabric Cloud App Platform
Migration from Weblogic to vFabric Cloud App Platform
 
Cap2194 migration from weblogic to v fabric - cloud application platform
Cap2194  migration from weblogic to v fabric - cloud application platformCap2194  migration from weblogic to v fabric - cloud application platform
Cap2194 migration from weblogic to v fabric - cloud application platform
 
Spring One 2012 Presentation – Effective design patterns with NewSQL
Spring One 2012 Presentation – Effective design patterns with NewSQLSpring One 2012 Presentation – Effective design patterns with NewSQL
Spring One 2012 Presentation – Effective design patterns with NewSQL
 
vFabric Data Director - DB as a Service
vFabric Data Director - DB as a ServicevFabric Data Director - DB as a Service
vFabric Data Director - DB as a Service
 
Experimental research data quality in
Experimental research data quality inExperimental research data quality in
Experimental research data quality in
 
INFORMATION AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY OF EGYPTIAN ...
INFORMATION  AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY  OF  EGYPTIAN ...INFORMATION  AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY  OF  EGYPTIAN ...
INFORMATION AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY OF EGYPTIAN ...
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancement
 
An adaptive watermarking process in hadamard transform
An adaptive watermarking process in hadamard transformAn adaptive watermarking process in hadamard transform
An adaptive watermarking process in hadamard transform
 
4214ijait01
4214ijait014214ijait01
4214ijait01
 
New trends in data
New trends in dataNew trends in data
New trends in data
 
Evaluation of hospital information
Evaluation of hospital informationEvaluation of hospital information
Evaluation of hospital information
 
Artificial intelligence in law
Artificial intelligence in lawArtificial intelligence in law
Artificial intelligence in law
 
Exact implementation of design patterns in
Exact implementation of design patterns inExact implementation of design patterns in
Exact implementation of design patterns in
 
Influence of icts on workforce
Influence of icts on workforceInfluence of icts on workforce
Influence of icts on workforce
 
Introduction to Cloud Foundry
Introduction to Cloud FoundryIntroduction to Cloud Foundry
Introduction to Cloud Foundry
 
VMware vFabric - CIO Webinar - Al Sargent
VMware vFabric - CIO Webinar - Al SargentVMware vFabric - CIO Webinar - Al Sargent
VMware vFabric - CIO Webinar - Al Sargent
 
vFabric - Ideal Platform for SaaS Apps
vFabric - Ideal Platform for SaaS AppsvFabric - Ideal Platform for SaaS Apps
vFabric - Ideal Platform for SaaS Apps
 
Oracle database 12c new features
Oracle database 12c new featuresOracle database 12c new features
Oracle database 12c new features
 

Similar to Designing and implementing the

EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security EssayJennifer Wood
 
SOA in Financial Services
SOA in Financial ServicesSOA in Financial Services
SOA in Financial ServicesMike Walker
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
 
A Test-Bed For The Correlation Center Of Digital Services
A Test-Bed For The Correlation Center Of Digital ServicesA Test-Bed For The Correlation Center Of Digital Services
A Test-Bed For The Correlation Center Of Digital ServicesJoe Andelija
 
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEMMETRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEMijseajournal
 
e-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdfe-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdfpetermulei3
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsVijay Karan
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability AnalysisFinite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability Analysisdannyijwest
 
IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET Journal
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsVijay Karan
 
M phil-computer-science-server-computing-projects
M phil-computer-science-server-computing-projectsM phil-computer-science-server-computing-projects
M phil-computer-science-server-computing-projectsVijay Karan
 
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONSREFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONScscpconf
 
Services Modeling based on SOA and BPM for Information System Flexibility Imp...
Services Modeling based on SOA and BPM for Information System Flexibility Imp...Services Modeling based on SOA and BPM for Information System Flexibility Imp...
Services Modeling based on SOA and BPM for Information System Flexibility Imp...IJECEIAES
 
Malta soa infrastructure
Malta soa infrastructureMalta soa infrastructure
Malta soa infrastructureAngel Knight
 

Similar to Designing and implementing the (20)

EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONEVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATION
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
SOA in Financial Services
SOA in Financial ServicesSOA in Financial Services
SOA in Financial Services
 
I018115768
I018115768I018115768
I018115768
 
Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
 
A Test-Bed For The Correlation Center Of Digital Services
A Test-Bed For The Correlation Center Of Digital ServicesA Test-Bed For The Correlation Center Of Digital Services
A Test-Bed For The Correlation Center Of Digital Services
 
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEMMETRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
METRIC-BASED FRAMEWORK FOR TESTING & EVALUATION OF SERVICE-ORIENTED SYSTEM
 
e-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdfe-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdf
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing Projects
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability AnalysisFinite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
 
H05525256
H05525256H05525256
H05525256
 
IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...IRJET - Application Development Approach to Transform Traditional Web Applica...
IRJET - Application Development Approach to Transform Traditional Web Applica...
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing Projects
 
M phil-computer-science-server-computing-projects
M phil-computer-science-server-computing-projectsM phil-computer-science-server-computing-projects
M phil-computer-science-server-computing-projects
 
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONSREFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
REFERENCE ARCHITECTURE FOR SMAC SOLUTIONS
 
Thesis
ThesisThesis
Thesis
 
Migration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris WhitepaperMigration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris Whitepaper
 
Services Modeling based on SOA and BPM for Information System Flexibility Imp...
Services Modeling based on SOA and BPM for Information System Flexibility Imp...Services Modeling based on SOA and BPM for Information System Flexibility Imp...
Services Modeling based on SOA and BPM for Information System Flexibility Imp...
 
Malta soa infrastructure
Malta soa infrastructureMalta soa infrastructure
Malta soa infrastructure
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Designing and implementing the

  • 1. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 DOI : 10.5121/ijait.2014.4303 25 DESIGNING AND IMPLEMENTING THE LOGICAL SECURITY FRAMEWORK FOR E- COMMERCE BASED ON SERVICE ORIENTED ARCHITECTURE Ashish Kr. Luhach1 , Dr. Sanjay K. Dwivedi2 , Dr. C. K. Jha3 1 Dronacharya College of Engineering, Gurgaon, Hr, India 2 BBA University, Lucknow, U.P., India 3 Banasthali University, Jaipur, Rajasthan, India. ABSTRACT Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the eminent security attacks which can be averted. The proposed security framework will be implemented and validated on an open source E-commerce, and the results achieved so far are also presented. KEYWORDS Web services, E-commerce, Simple Object Access Protocol 1. INTRODUCTION With the evolution in information engineering, internet users increased exponentially and as a consequence of which websites are utilized as the new and integrated marketing. These websites eliminated the physical part of markets. Websites provide a virtual place for the user to perform online transactions, known as E-markets. These E-markets are becoming the core of attraction for researchers and initiatives. E-commerce systems are mainly based on networks and computing power of the users. At present, the problem exists in E-Commerce’s are due to frequent update of business process because of changing customer demands and platform integration because of the heterogeneous platform used by different enterprises. To subdue the alleged problems in business operation and integration, Service Oriented Architecture (SOA) can be applied. SOA is an information technology approach in which the existing applications in an enterprise can use the various services available in a network i.e. World Wide Web. With the help of SOA, such applications can be evolved, as well. SOA also has the feature of loose coupling, which resolves the problem of transmission and integration of information. SOA has an open standard protocols and excellent encapsulation, which makes SOA the suitable choice to implement E-commerce.
  • 2. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 26 2. E-COMMERCE BASED ON SOA In general, the most important aspect in business from the customer’s point of view is cost. E- commerce systems need techniques or technical solutions, which reduces the processing or transaction cost as the number of users increased exponentially in recent years for performing online transactions [2]. Another important problem to address while discussing E-commerce’s is Interoperability because E-commerce’s may vary from each other in terms of business flow and data description. This variation depends upon communication protocols, and object models used. Figure1: E-commerce based on SOA As a consequence of which, if any one of the partner involved in the E - commerce scenario made any alterations in their realization mechanism, then to adopt these changes other partners also have to make modifications in their operation. Debating the future of E-commerce development, Interoperability is still an unresolved inquiry. At present, a great deal of research and conferences are conducted on E-commerce just to furnish backup to the enterprises for their migration towards E-commerce. However, Service Oriented Architecture (SOA) proves to be one of the best technological results to implement E-commerce. The general idea behind developing SOA is to integrate software into services. SOA is a distributed computing technology, which provides services through XML protocols. SOA applications embedded into network services using XML. Web Services attracts enterprises and business to get the benefits of connectivity through the networks [2]. SOA can help organizations to recycle their existing assets such as programming code with significant changes and produce a solution for application consolidation, which saves cost and execution time.SOA provides a reliable platform for communication and integration between E-commerce system and their associated partners; this will explore new dimensions of the enterprise. The principal characteristics of SOA are Interoperability and Reusability. However to solve the above discussed problems in E-commerce, SOA proves to be the best solution for implementing E-commerce. Figure 1 show an E-commerce based on SOA. 3. CURRENT SECURITY SOLUTIONS AND PRODUCTS – RELATED WORK The concept of SOA changed the whole paradigm for the application development. As developers seem to adopt SOA anxiously, but at the same time, SOA implementation can lead to complex security and management issues. According to the survey conducted in 2008, 43% of the IT executives rated security threats as most critical issues while migrating towards SOA and 57% admits that security threats are one of the main reasons for adjourning the adoption of SOA. The majority of organizations migrated towards SOA are still at risk and putting a lot of efforts for securing their SOA environment. Now a day to secure SOA environment, developers are using current security approach and products provided by companies like IBM, HP, SOA Software, International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 26 2. E-COMMERCE BASED ON SOA In general, the most important aspect in business from the customer’s point of view is cost. E- commerce systems need techniques or technical solutions, which reduces the processing or transaction cost as the number of users increased exponentially in recent years for performing online transactions [2]. Another important problem to address while discussing E-commerce’s is Interoperability because E-commerce’s may vary from each other in terms of business flow and data description. This variation depends upon communication protocols, and object models used. Figure1: E-commerce based on SOA As a consequence of which, if any one of the partner involved in the E - commerce scenario made any alterations in their realization mechanism, then to adopt these changes other partners also have to make modifications in their operation. Debating the future of E-commerce development, Interoperability is still an unresolved inquiry. At present, a great deal of research and conferences are conducted on E-commerce just to furnish backup to the enterprises for their migration towards E-commerce. However, Service Oriented Architecture (SOA) proves to be one of the best technological results to implement E-commerce. The general idea behind developing SOA is to integrate software into services. SOA is a distributed computing technology, which provides services through XML protocols. SOA applications embedded into network services using XML. Web Services attracts enterprises and business to get the benefits of connectivity through the networks [2]. SOA can help organizations to recycle their existing assets such as programming code with significant changes and produce a solution for application consolidation, which saves cost and execution time.SOA provides a reliable platform for communication and integration between E-commerce system and their associated partners; this will explore new dimensions of the enterprise. The principal characteristics of SOA are Interoperability and Reusability. However to solve the above discussed problems in E-commerce, SOA proves to be the best solution for implementing E-commerce. Figure 1 show an E-commerce based on SOA. 3. CURRENT SECURITY SOLUTIONS AND PRODUCTS – RELATED WORK The concept of SOA changed the whole paradigm for the application development. As developers seem to adopt SOA anxiously, but at the same time, SOA implementation can lead to complex security and management issues. According to the survey conducted in 2008, 43% of the IT executives rated security threats as most critical issues while migrating towards SOA and 57% admits that security threats are one of the main reasons for adjourning the adoption of SOA. The majority of organizations migrated towards SOA are still at risk and putting a lot of efforts for securing their SOA environment. Now a day to secure SOA environment, developers are using current security approach and products provided by companies like IBM, HP, SOA Software, International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 26 2. E-COMMERCE BASED ON SOA In general, the most important aspect in business from the customer’s point of view is cost. E- commerce systems need techniques or technical solutions, which reduces the processing or transaction cost as the number of users increased exponentially in recent years for performing online transactions [2]. Another important problem to address while discussing E-commerce’s is Interoperability because E-commerce’s may vary from each other in terms of business flow and data description. This variation depends upon communication protocols, and object models used. Figure1: E-commerce based on SOA As a consequence of which, if any one of the partner involved in the E - commerce scenario made any alterations in their realization mechanism, then to adopt these changes other partners also have to make modifications in their operation. Debating the future of E-commerce development, Interoperability is still an unresolved inquiry. At present, a great deal of research and conferences are conducted on E-commerce just to furnish backup to the enterprises for their migration towards E-commerce. However, Service Oriented Architecture (SOA) proves to be one of the best technological results to implement E-commerce. The general idea behind developing SOA is to integrate software into services. SOA is a distributed computing technology, which provides services through XML protocols. SOA applications embedded into network services using XML. Web Services attracts enterprises and business to get the benefits of connectivity through the networks [2]. SOA can help organizations to recycle their existing assets such as programming code with significant changes and produce a solution for application consolidation, which saves cost and execution time.SOA provides a reliable platform for communication and integration between E-commerce system and their associated partners; this will explore new dimensions of the enterprise. The principal characteristics of SOA are Interoperability and Reusability. However to solve the above discussed problems in E-commerce, SOA proves to be the best solution for implementing E-commerce. Figure 1 show an E-commerce based on SOA. 3. CURRENT SECURITY SOLUTIONS AND PRODUCTS – RELATED WORK The concept of SOA changed the whole paradigm for the application development. As developers seem to adopt SOA anxiously, but at the same time, SOA implementation can lead to complex security and management issues. According to the survey conducted in 2008, 43% of the IT executives rated security threats as most critical issues while migrating towards SOA and 57% admits that security threats are one of the main reasons for adjourning the adoption of SOA. The majority of organizations migrated towards SOA are still at risk and putting a lot of efforts for securing their SOA environment. Now a day to secure SOA environment, developers are using current security approach and products provided by companies like IBM, HP, SOA Software,
  • 3. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 27 Oracle and SAP. This section provides an overview of current security solution and products provided by various companies. 3.1 SOA Software Solution SOA Software is one of the leading service providers in the field of SOA security and management. SOA Software developed a product named as an SOA Infrastructure Reference Model based on current standards [9]. The SOA Software’s product contains the following: 3.1.1 Service Manager It acts as policy manager and the main of service manager is to provide security services. Service manager also provides high performance and scalable SOA management solutions. Service manger includes management server and the management server helps to manage the various application monitoring functions such as registry and alert manager. 3.1.2 Network Director Network Director designs and implements the policies for the service manager. The main objective of the Network Director is to provide fault tolerance capabilities, so that the available services can be consumed by the widest possible range of applications. It delivers comprehensive governance, security, monitoring, management and mediation of Web services. 3.1.3 Partner Manager partner manager ensures that organizations can securely publish their web services for their partners and customers. It provides a complete trading partner management, and service provisioning workflow solution. It uses service virtualization to securely extend internal services into partners’ networks. 3.1.4 SOLA SOLA stands for Service Oriented Legacy Architecture (SOLA) and SOLA referred as complete mainframe Service Oriented Architecture solution [10]. The most important advantage of SOLA is that it makes the mainframe applications as a part of SOA in a cost effective manner. SOLA provides customers with a fast and easy process to expose mainframe applications as secure Web Services, and allows mainframe applications to consume Web Services. The SOLA runtime environment runs entirely on the mainframe, eliminating the need for expensive, unreliable and unnecessary middleware. SOLA is the only product proven in enterprise implementations to handle high volume (10 million+) transactions per day in mission-critical mainframe SOA environments. The various advantages of SOLA are comprehensive mainframe SOA solution, one click web services, no extra software’s needed to install at work station and centralized directory. 3.2. IBM SOA Security Reference Model Figure 3 shows the basic structure of IBM SOA Security Reference Model [11], this security model mainly divided into three different parts which are Business Security Services, IT Security Services and Security Policy Management. Business Security Services represent the main function of business security services is to manage the business requirement, for example identity management, data protection and securing networks. IT Security Services can be defined as the foundation wedges of an SOA infrastructure. IT Security Services makes the SOA environment
  • 4. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 28 capable of stopping up the services offered with the SOA infrastructure. In general, IT Security Services form a universal statement of services, which can be utilized by different users or components in the SOA environment. These services cover confidentiality, integrity, identity, authorization and authentication. Security Policy Management describes and design the various outlines related to the implementation of security policies in SOA environments. This includes the ability to define policies to authenticate and authorize requesters to access services, propagate security context across service requests based on an underlying trust model, audit events of significance, and protect information. Thus, Security Policy Management functionality is a core part of providing security capability in SOA. IBM SOA Security Reference Model was developed by IBM and the main objective behind this is to ascertain the security in SOA environments. To ascertain the security in a real world SOA environment, IBM also developed several products and instruments such as Tivoli and WebSphere. Tivoli and WebSphere are discussed next. 3.2.1 WebSphere Application Server WebSphere Application Server is used for E-commerce and integration of organisational information. It can be defined as software framework used for hosting Java based applications. WebSphere Application Server promises to save the rich application development environment and it also provides superior transaction capabilities for transaction management. WebSphere Application Server has highly improved security model, as it is designed and produced on the basis of services provided in the operating organization. WebSphere Application Server supports user authorization and certification. The primary advantages of WebSphere Application Server are improved security and control standards, includes liberty Profile, superior capabilities for deployment and management for applications and higher developer productivity. 3.2.2 IBM Tivoli security management solutions IBM Tivoli security management solutions designed to ensure the dynamic organizations and supply them a perfect entourage of security and compliance management. It solves the two critical problems for E-commerce, which is security management and identity management. It assists organizations in recovering from security attacks and system failures by bringing users and application online. It also assists organizations to actively monitor and react to security attacks. The primary benefits of IBM Tivoli solution are managing risk by specifying and deploying secure infrastructure, improved services and Reducing Cost of management, governance and mental process of the security infrastructure while increasing productivity.
  • 5. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 29 Figure 3 IBM SOA Security Reference Model 3.3 JBoss Enterprise SOA (ESOA) Platform JBoss ESOA is open source software primarily based on Service Oriented Architecture and Java. It can be implemented independently or with other third party components as well. JBoss ESOA enables enterprises to properly handle business events, Integrate services; Automate existing business operations and linking existing IT resources with information and services. According to [12], “The versatility of the program permits us to use one development tool, technology and set of touchstones for many uses. Likewise, applications deployed on the JBoss ESOA Platform can be monitored and contained in a standardized way”. JBoss itself is freely licensed but also called for other middleware components such as JBoss Enterprise Service Bus (ESB) and JBoss Enterprise Application Platform. JBoss can be applied with whatever operating system such as Windows, UNIX and Linux. The main implementation benefits of JBoss are improved business process performance, improved reliability and scalability, higher customer satisfaction and Eliminate Manual Pain Points from your Business Processes. 3.4Vordel Solution Vordel is an organization which provides various hardware and software solutions to implement SOA. The primary benefits of Vordel solution are Efficient security mechanism against various security attacks such as XML content-layer attacks, Improved monitoring of web serving performance and usage, Improved performance by removing processing bottlenecks, Enhanced governance through central service management, Well defined access control including authentication and authorization and Proper control for SOA policy. 3.5 Oracle SOA Security Solution Oracle SOA Security Solution ensures the security outside the web serves as well. This solution can combine transport-layer and application-level protection, and use a layered defense scheme. The diverse benefits and products provided by Oracle SOA Security Solution are:
  • 6. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 30 • Identity management includes Oracle Access Manager, Oracle Identity Federation and Oracle Web Services Manager • Deployment and development tools include Oracle Security Developer Tools (OSDT) • Java Developer consists of Java Integrated Development Environment • Governance aware runtime environment comprises of Oracle components for Java (OC4J) Oracle's strategy is to focus on well established criteria such as SAML, essential for identity federation, identity propagation, and close-to-end security from the user’s web browser all the way across SOA-based transactions involving multiple Web Services. 4. SECURITY ANALYSIS OF SOA BASED E-COMMERCE E-commerce provides user with a variety of business service components and user can call any of these business service components online such as trading information services, contract management services and other information management services, if they are authenticated and passed. Before calling business service component's user submits their authentication through HTTP to a WWW host. Users can log on to the component requested through Simple Object Access Protocol (SOAP) and at the same time user may utilize other services as well, which is furnished by other collaborators such as banking and logistics services. E-commerce platform is not hardly used for online transactions, but also can be practiced as a serial publication of services such as banking and revenue enhancement. So, E-commerce provides a complete lay down of business procedures which consist of various inspection and repairs. These services are originated by different vendors and managed or kept up by diverse departments within an endeavor, which makes E-commerce a service oriented heterogeneous system. This heterogeneous system will confront a kind of security threats and risk factors which are: 4.1 Certificate Duplicity Approach to business service components, users should submit their authentication through HTTP and get it validated from web hosts. In return an authentication credential is released for users as a validation of certification. After getting this authentication certificate user can access business service components. This process of issuing authentication certificate is managed by Identity Management Service (IMS). It is possible to generate a duplicate certificate or forge the certificate and submit it to the web server instead of the original user and identity authentication is bypassed and call to the Business Service Component can be attained. One of the possible implementation solutions for this is to use better communication protocols such as HTTPS, which can’t be worked well. 4.2 No filters mentioned on the application level Filters are really important at application level and absence of these filters may allows an attacker to send malicious codes through web application and perform attacks like Cross Site Scripting, Remote/Local File Inclusion etc. which may immediately or indirectly lead to a successful attack. 4.3 Unsecure Database In most of E-commerce models, database is maintained on the same server without going through any security bars. Thither are a number of security risks related to database that are as follows: • Malware infections into the database may also go to incidents like leakage or disclosure of important information.
  • 7. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 31 5. PROPOSED E-COMMERCE MODEL BASED ON SOA The proposed Security Framework of SOA based E-commerce is shown in Figure 4. The proposed security framework resolves the security threats and risk involved in E-commerce security. In the proposed framework, the authentication of user is handled by Identity Management Service (IMS). IMS provides access to the authorized and authenticated users for various business service components such as Transaction Information Service and Online Transaction Services. Proposed framework also implemented on E-commerce systems which supports a series of services such as insurance services and banking services. User can call any of the supported services, by sending access request to that corresponding service through IMS. IMS in return generates a certificate of authentication for the users. The proposed security framework has the additional feature called as input sanitization. The main aim of the input sanitization is to filter the users request according to the services available in the database, if no corresponding services are available the users' requests denied. Rule based plug-in is defined in the proposed security framework to offer an extra layer of protection. Intrusion detection system (IDS) and Intrusion protection system (IPS) is employed in the proposed security framework to provide spare security to business service components and database related. In offering a security framework, business service components and connected database are maintained on different hosts. Server 1 maintains business service components and network hosts. Server 2 keeps up the databases connected with business service components. The communication between server 1 and server 2 is monitored by a firewall. If an attack detected by Intrusion detection system (IDS), firewall will disconnect the both servers from one another to assure minimal data loss. 6. IMPLEMENTING THE PROPOSED SOLUTION The proposed security framework implemented on open source E-commerce system. Through which the proposed framework analyzed to discover its strengths and weakness in the light of security threats discussed above. The methodology for evaluating the framework depends upon the character of security threats. The rating also depends on the security requirements and arranging for the endeavour. Some of the character attributes which already achieved, such as database encryption shown in figure 5.
  • 8. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 32 Figure 4 The Architectural overview of the proposed model 6.1 Database Encryption The database maintained onto a totally different host (Server 2) which monitored by IDS/IPS. The database itself encrypted with a unique key which stored in data service component on server 1. Figure 5 shows the encrypted database for the proposed security design. Figure 5 Encrypted Database
  • 9. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 33 6.2 Prevention against DOS and DDOS The presentation of IDS/IPS on both the servers will avoid most of the Denial of Service attacks as all the incoming data would be supervised and separated out by them. The IDS/IPS can be easily configured and automatically outlaw the IP Addresses generating multiple requests within a suitable interval of fourth dimension. Snort is open source software, which is used as IDS/IPS. Figure 6 shows how incoming data and activities can be monitored in proposed security design. Figure 6: Snort as IDS 7. CONCLUSION In today’s rising information technology infrastructure, E-commerce is a promising business opportunity which continues and joins the business partners and customers in the electronic environment. The purpose of this research is to identify the best technology for E-commerce implementation, which is hardware and software platform neutral. This paper proposes an implementation scheme for E-commerce applications, which based on SOA. The proposed strategy has a logical security cover for user transactions and databases. REFERENCES: [1] Min Huang et al, “Research for E-Commerce Platform Security Framework Based On SOA”, proceeding of the 2011 4th International Conference on Biomedical Engineering and Informatics (BMEI), Shanghai, China, Pg. No. 2171-2174, October 15-17, 2011. [2] Luhach Ashish Kr., Dwivedi Sanjay k. “Service-Oriented Architecture and Web Services Concepts, Technologies, and Tools” proceeding of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC-2011), Kanyakumari, India, Pg. No. 147-150, Dec 15- 18, 2011. [3] Erl, T., SOA Principles of Service Design. 1 Ed., Indiana: Prentice Hall, 2008. [4] Giblin, T. I. el at., ‘Web Services Security Configuration in a Service-Oriented Architecture’. WWW 2005, May 10-14, 2005 pp. 1120-1121. Chiba, Japan: ACM. [5] Kuppuraju, S., Kumar, A., & Kumari, G. P. (2007). ‘Case Study to Verify the Interoperability of a Service Oriented Architecture Stack’. 2007 IEEE International Conference on Services Computing (SCC 2007). IEEE Computer Society. [6] Ramaro Kannergant, Prasad Chodavarapu. SOA Security in Action. Manning Publishing, 2006. [7] ChristopherSteel Ramesh Nagappan, Ray La. Core Security Patterns. London: PrenticeHall, 2005. [8] Ramarao Kanneganti, Prasad Chodavarapu, SOA Security, Manning Publications Co., USA, 2008. January. [9] SOA Software, Inc. Seven steps to SOA, Los Angeles, white paper, 2006.
  • 10. International Journal of Advanced Information Technology (IJAIT) Vol. 4, No. 3, June 2014 34 [10] SOA Software, Inc. SOA Infrastructure Reference Model, Los Angeles (U.S.A.), White paper, 2002. [11] Axel Buecker et al., Understanding SOA Security Design and Implementation, 7 ed., Redbooks: IBM Corp., November 2007. [12] SOA Magazine, Online, Available: http://soa.sys-con.com. [13] Luhach Ashish Kr., Dwivedi Sanjay k., Jha C. K., Designing a logical Security Framework for E- commerce System based on Service Oriented Architectures, International journal of Soft Computing, Vol. –5, No.-2, Pg. No 1-10, May 2014. [14] Mohammad H. Danesh et al, “A framework for process and performance management in service oriented virtual organisations”, International Journal of Computer Information Systems and Industrial Management Applications, Vol. -5, Pg. No. 203-215, 2013. [15] Deepu Raveendran et al, “A Study on Secure and Efficient Access Control Framework for SOA”, International Journal of Computer Science and Telecommunications, Vol.-3, No.-6, Pg. No. 71-76, June 2012. [16] Seyyed Mohammad Reza Farshchi et al., “Study of Security Issues on Traditional And New Generation of E-Commerce Model, proceeding of the 2011 International Conference on Software and Computer Applications, Kathmandu, Nepal, July 1-2, 2011, published by IPCSIT, Singapore, Vol.-9, Pg. No. 113- 117.