Web Services Security. Introduction Developing standards for Web Services security – XML Key Management Specification (XKMS) – XML Signature – XML Encryption.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Web Security CS-431. HTTP Authentication Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Web services security I
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
CSCI 6962: Server-side Design and Programming
INE1020: Introduction to Internet Engineering 6: Privacy and Security Issues1 Lecture 9: E-commerce & Business r E-Commerce r Security Issues m Secure.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Session 11: Security with ASP.NET
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Module 9: Fundamentals of Securing Network Communication.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
ACM 511 Introduction to Computer Networks. Computer Networks.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Fall 2006CS 395: Computer Security1 Key Management.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Security Outline Encryption Algorithms Authentication Protocols
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Web Services Security.
Message Digest Cryptographic checksum One-way function Relevance
Electronic Payment Security Technologies
Presentation transcript:

Web Services Security

Introduction Developing standards for Web Services security – XML Key Management Specification (XKMS) – XML Signature – XML Encryption – How Web Services affect network security and security policies 2Web Services Security

Introduction Effective Web Services security allows clients to access appropriate services while keeping sensitive information confidential Web services require end-to-end security for transactions – Authentication (e.g., Login names and passwords) can be compromised because of communications not encrypted – Required strong interoperability Because transmissions occurs across multiple platforms and must be secured at all times 3Web Services Security

Introduction Well-defined and well-documented security policies, as well as implementation, administration and maintenance, are crucial to any security infrastructure Companies are responsible to create their own security policies – Result in disparate security policies across organizations – Need to develop security-policy standards for organizations to communicate effectively without compromising their security policies 4Web Services Security

Basic Security for Transmission over HTTP HTTP enables Web servers to authenticate users before allowing access to resources – Web server check user’s credentials (e.g., username and password) – HTTP security employs secret-key cryptography, message digests, etc. However, HTTP do not encrypt the body of a message – Need other strong security technologies E.g., SSL or Kerberos 5Web Services Security

Basic Security for Transmission over HTTP Challenge-response authentication – Users must provide specific authentication information to verify their identities Return 401 Unauthorized response when users are not unauthenticated to view a protected resource – Users provide username and password setup up by, for example, s Return 403 Forbidden if denied – Relatively weak security solution Username and password are not encrypted 6Web Services Security

Basic Security for Transmission over HTTP Digest authentication – A protocol – Part of HTTP 1.1 specification – A user’s credentials are submitted to the server as a checksum – Checksum, input as message digests in digital signature, are generated using Username, password, requested URL, the HTTP method and a nonce value (a unique value generated by the server for each transmission) – Created using MD5 algorithm, with 128 bits input – Message content not encrypted Easy to be intercepted – Both the client and the server must support digest authentication – Use public-key or Kerberos for security help for HTTP 1.1 7Web Services Security

Basic Security for Transmission over HTTP Server can restrict access on the basis of an IP address, password, or public-key Server can disallow access to all or part portions of a site for users with a certain IP address or from a specific IP subnet Also, use Public-key cryptography or other security methods in password 8Web Services Security

Web Services and Secure Sockets Layer (SSL) SSL protocols secures the channel through which data flows between a client and server and enables authentication of both parties. Still have problems using SSL to secure Web services – User credentials and certificates are sometimes too large to transmit efficiently between computers Affect success of transactions – SSL encryption uses processor power Slow down transmissions and significantly impede Web services performance Use SSL accelerators to handle complex SSL encryption calculations to free server resources and improving performance 9Web Services Security

Web Services and Secure Sockets Layer (SSL) For Web services, information going through a third-party device before reaching destination – SSL cannot guarantee the security if the messages – E.g., credit-card information – SSL connects two computers at a time Protect data transmission, but not end-to-end security HTTPS – Secure communications by sending HTTP requests and responses over an SSL connection Use port 443, instead of port 80 10Web Services Security

XML Signature XML-based applications have security concerns – XML documents are plain-text – DTDs and stylesheets can be modified – Alter XML documents (security holes) to allow anyone to access information Digital signature – Solve the problem above by verifying document integrity Web Services Security11

XML Signature W3C’s XML Signature specification – Define an XML-based standard for representing digital signatures – Provide authentication, message integrity and nonrepudiation – Use Digital Signature Standard (DSS) public-key algorithm and the Secure Hash (SHA-1) authentication algorithm Web Services Security12

XML Signature Extend XML signature to support their own algorithm and secure models – Sign any type of file, not just XML document – Signed data can reside inside or outside the XML document that contains the signature – The data object is cryptographically signed and used in generating a message digest Web Services Security13

XML Signature Using canonical form of an XML document before it is signed – Avoid XML documents have the same hash value – Same canonical form  logically equivalent – Small differences create different hash values E.g., comments or spaces that have no impact on the meaning of an XML document – Transform an XML document into a context interpreted by an application Logically equivalent documents produce the same message digest Regardless of structures of documents Web Services Security14

XML Signature An example – Online book order using credit card Send an XML document contains name, address, credit-card information, and order info. Information is protected by the signature and sent to the seller Seller checks the integrity of the customer’s signature and sign the document before submitting it to the credit-card company The credit-card company receives signatures that verify the authenticate the customer and the seller – Protects buyers against unauthorized purchases Web Services Security15

XML Encryption Handle the encryption and decryption of XML documents that are secured with XML signature. Signature verifies a sender’s identity and the data’s integrity, but encryption is necessary to prevent the signed data from being read en route. Protect any form of data Web Services Security16

XML Encryption Exmaple Web Services Security17

XML Encryption 18

XML Key management Specification (XKMS) Developed by Microsoft, VeriSign and webMethods A specification for registering and distributing encryption keys for Public Key Infrastructure (PKI) in Web services Problems with PKI – No Web services PKI standards exist – PKI solutions are expensive, difficult to implement – No interoperable with other businesses’ PKI product Web Services Security19

XML Key management Specification (XKMS) XKMS solves the problems – Establishes a platform-independent set of standards – Place portions of the PKI workload on the server side Free application resources for other processes – Works with proprietary PKI solutions to integrate encryption, digital signature and authentication. – Easy the steps to implement PKI – Provide an easy and user-friendly method for secure transactions Web Services Security20

Authentication and Authorization for Web Services Web service providers that want to reach the largest number of users should provide authentication and authorization via various popular sign-on services Web Services Security21

Authentication and Authorization for Web Services Microsoft Passport uses.NET Web services for authentication and authorization – Provide single sign-on – Required to access Windows XP applications and Hotmail – Adopted by many e-business, including eBay, Monster – 200 millions users registered Web Services Security22

Authentication and Authorization for Web Services Liberty Alliance – Formed in October 2001 by Sun Microsystems – Try to establish non-proprietary single sign-on standards for e-business – Seek to secure businesses’ and users’ confidential information and to establish universal single sign- on methods – Participants include AOL Time Warner, General Motors, American Express, Mastercard International, and RSA Security Web Services Security23

Authentication and Authorization for Web Services Liberty Alliance – The specification is designed to support decentralized authentication and interoperability Users are not required to contact a central server to receive authentication Increase flexibility Provide an ideal authentication system for wireless communications – Offer an alternative to Microsoft Passport service Web Services Security24

Web Services and Network Security Web services create additional network security concerns – Network authenticate users before allowing access to resource – However, Web services are designed to use single sign-on Allow access to applications on the basis of another source’s authentication credentials. Carry transactions beyond firewalls and place resources in risk of attack Web Services Security25

Web Services and Network Security The biggest concern – The immaturity of underlying standards – Vulnerabilities are not discovered until attacks occur Usually, companies operate Web services over internal networks and restrict external access – For security reasons – Need extra steps to protect applications and network to offer external access to Web services Web Services Security26

Web Services and Network Security Still improving – Web services create new security challenge, but also can protect computers on a network Use Web services to search networks for signs of viruses Use Web services to apply updates to computers Web Services Security27