XML and Web Services Security

XML and Web Services Security

XML and Web Services Security Lili Sun, Yan Li Department of Mathematics and Computing, University of Southern Queensland Toowoomba, QLD 4350, Australia {sun, liyan}@usq.edu.au Abstract Language[ XPath ])[15]. Meanwhile these standards use binary formats that require specialized software for With an increasing amount of semi-structured data interpretation and use them, even for extracting portions XML has become important. XML documents may of the security information. In addition, some current contain private information that cannot be shared by existing security technologies, such as Secure Socket all user communities. Therefore, securing XML data is Layer (SSL), Transport Layer Security (TLS) and becoming important. Several specifications progressed HTTPS [12] provide several specifications for web toward providing a comprehensive standards services to enable security. But there are some issues framework for securing XML-based application have with these schemes. SSL, TLS both provide transport been presented. These applications can be effective to level security, not message level security. They are protect information in a website. In this paper, we point-to-point security only and do not handle end-to- present XML and Web service security main standards end multi-hopped messaging security. Security only and most specifications for these standards. Each when data is in transition, does not secure data off standard which connects with protecting XML based transition. HTTPS do not support non-repudiation. In documents is discussed, especially we present XML 2002, several specifications were proposed for securing undeniable signature as an application with XML XML-based applications and web services. These digital signature. We also briefly describe the relations standards support to integrate security functionalities with these standards based on existing technologies. into their XML based applications. Finally, comparisons with related works are analyzed. Figure1 shows some of the most important Keywords: XML, XML documents, Security specifications for XML and Web service security. This technologies, Web service security. provides a standard framework for XML based applications. Usually Simple Object Access Protocol (SOAP) is used for message transport. XML digital 1. Introduction signature and XML encryption are used for data confidentiality and integrity. Security Assertion Markup Language (SAML) focuses on authentication assertions. Over the past several years, there has been a XML Access Control Markup Language (XACML) is tremendous surge of interest in XML as an universal, for information access control. XML Key Management queryable representation for data. XML web service is Specification (XKMS) is used to manage Public key a platform-independent Web application that accepts infrastructure and Web service security brings standards requests from different systems on the Internet. XML is together. a fundamental component in many XML web services The remainder of this paper is organized as follows: and it is used to store and exchange data in the Internet Section 2 illustrates the background of XML. Section 3, environment that may include private message. It 4 and 5 present a brief overview on the following core overcomes the complexity of Standard Generalized XML Security standards [14]: Markup Language (SGML) and the user can define Integrity and signatures - XML Digital Signature document structures, removing the limit of the fixed Confidentiality - XML Encryption tags in Hypertext Markup Language (HTML). Key Management - XML Key Management Security technologies provide security algorithms and Specification technologies that can be used in XML security, but for Authentication and Authorization Assertions – many of them the actual formats used to implement Security Assertion Markup Language security requirements are inappropriate for most Authorization Rules - XML Access Control applications. Usually these standards are not designed Markup Language for use with XML and do not support common XML Web Services Security - WS-Security technical approaches for managing contents, such as Finally, Section 6 concludes the paper. specifying contents with uniform resource identifier strings (URIs) or using other XML standard definitions for locating portions of XML contents (like XML Path 1 XML document not only shows the contents of data but also gives the constraints and relationships among data. In Table 1, the element studentInfo includes ID , name and studentCardInfo sub-elements. The sub- element ID is a simple type while sub-elements name and studentCardInfo are combined with their own sub- elements. Since an XML document can express complex relationship between data, it may be generated from various resources with varying security requirements. Also such advantages a user may like to access particular parts of an XML document. In the above example, for the studentInfo objects everyone can read all the information. On the other hand, when an internal or external user accesses this document, his/her access permission has to be limited according to security policies in all databases. These examples show that securing XML document is a significant topic. 3. XML digital signature Figure1: XML security standards Digital signatures are an important element in electronic security because they can be used to ensure 2. XML the integrity, authenticity, and non-repudiability of data [16]. XML digital signatures are designed for use in Extensible Markup Language (XML) [8, 10] is a XML document transactions. XML signatures include markup language for describing semi-structured authentication, data integrity, and support for non- information. XML documents can be classified into two repudiation to the data that they sign. It has established categories: well-formed and valid. A document can be an approach for data exchange as well as some well-formed if it follows the grammar rules of XML, vocabulary shared by the other standards. The XML such as there is exactly one element that completely digital signature specification on the website, contains all other elements, elements may nest but not www.w3.org/TR/2002/REC-xmldsig-core-20020212[2], overlapped, etc. A well-formed document is valid only is a final draft which provides guidelines in this area. It if it contains a proper Document Type Definition (DTD) specifies the basic structures of defining a digital in the source and if the document obeys the constraints signature using XML. XML Signatures can be applied of that declaration. Validation requires XML instance to to any digital contents, including XML documents. contain specified elements and attributes, the following Table 2 shows the structure of XML signature and its example shows an XML document of a student card key elements. information specified datatypes and relationships. <Signature ID> XML differs from HTML since it allows users to define <SignedInfo> their own vocabularies of opening and closing tags. <CanonicalizationMethod/> <SignatureMethod/> <?xml version= “1.0” encoding= “UTF-8”? > <SignatureValue> <studentInfo xmlns= (<Reference URI> “http://www.school.com/StudentInfo”> <DigestMethod> <ID> 123-45-6789 </ID> <DigestValue> <name> </Reference>) <firstname> Mike </firstname> </SignedInfo> <lastName> Harman </lastName> (<KeyInfo>) </name> </Signature> <studentCardInfo> <type> Student card </type> Table 2: XML Signature Structure <cardNo> 8888888888888 </cardNo> <expireDate> 10/08 </expireDtae> An XML Signature can sign more than one type of <nameOnCard> Mike Harman resources [11]. There are three types of XML digital </nameOnCard> signature structures, namely enveloped signature, </studentCardInfo> enveloping signature and detached signature. For </studentInfo> enveloped and enveloping signatures, the signed XML Table 1: XML Document Example 2 documents and its securing signatures are within the of keys, one for encryption and one for decryption. In same files. For the detached signatures, the XML this encryption process the sender encrypts using the signatures are in a separated document. recipient's public key that can be shared widely. The An XML digital signature differs from other recipient decrypt using private key that known only to protocols for message signing, such as PGP, since it themselves. This helps to take over the difficulty of supports for signing only specific portions of the XML establishing confidential communication. But when tree rather than the complete documents. public key cryptography and symmetric cryptography are used together, they will become more efficient. The 3.1. Xml undeniable signature symmetric key is used to encrypt the content, and then the symmetric key is encrypted using public key The central role of digital signatures in the cryptography. Both the encrypted content and encrypted commercial and legal aspects of the evolving electronic symmetric key are then sent to the recipient. In the commerce world is well recognized [17]. Advanced Encryption syntax, <EncryptedData> element is core signature schemes include group signatures, blind element. It also contains: <EncryptionMethord>, signatures, undeniable signatures and proxy signatures. <KeyInfo>, <CipherData> and <EbcryptionProperties> Undeniable signatures were firstly introduced by Chaum sub-elements. As same as above example, it shows a and Van Antulerpen [9]. They secure that signatures customerInf in XML document. It only encrypts the cannot be easily verified. Undeniable signature schemes elements of <CreditCard>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us