Dynamic High Availability Architecture Framework for SOA Computing

  • Authors

    • S Kumaresan
    • Sumithra Devi.K.A
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.16492
  • .
  • In Software technology stackCloud services provides easy coupling implementation to enhance encapsulation data between multiple platform data exchanges. My finding towards  introducing High Availability Architecture for cloud environment which covers Load Balancing, Failover, High Availability Resources. To achieve thisfeatures it’s identified framework architecture which is called as Dynamic High Availability Architecture Framework for SOA Computing which increase cloud services standard inhigh witheasy adaptable security. Even though cloud service supports loose coupling and isolation business logics. At current cloud service provide wants to launch new web service request on fly same service will notnotified into client in real-time scenario.  To overcome this complicated situation we have introduced (GHAFC) Generic Architecture Framework in Cloud Computing. Which will support data exchanges between producer and consumer onthe fly with real time scenario.

  • References

    1. [1] BHARGAVAN, K., FOURNET, C., AND GORDON, A. D, “Verifyingpolicy-based security for web servicesâ€, In CCS ’04: Proceedingsof the 11th ACM conference on Computer and communicationssecurity , pp. 268–277, 2004.

      [2] BHARGAVAN, K., FOURNET, C., GORDON, A. D., ANDO’SHEA, G, “An advisor for web services security policiesâ€, InSWS ’05: Proceedings of the 2005 workshop on Secure web services(New York, NY, USA, ACM, pp. 1–9, 2005.

      [3] CANTOR, S., MOREH, J., PHILPOTT, R., AND MALER, E, “Metadata for the OASIS Security Assertion MarkupLanguage (SAML) V2.0â€, OASIS Standard, 15.03.2005, 2005. http://docs.oasis-org/security/saml/v2.0/saml-metadata-2.0-os.pdf.

      [4] D. Richards, S. van Splunter, F. M. T. Brazier, and M. Sabou, “Composing Web Services using an Agent Factoryâ€, In Proceedings of the 1st International Workshop on Web Services and Agent Based Engineering, Sydney, July 2003.

      [5] M. O. Shafiq, A. Ali, H. F. Ahmad, and H. Suguri, “AgentWeb Gateway - a Middleware for Dynamic Integration of Multi Agent System and Web Services Frameworkâ€, In Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, pages 267–270, Washington, DC, IEEE Computer Society, 2005.

      [6] L. Z. Varga and ´A. Hajnal, “Engineering Web Service Invocations from Agent Systemsâ€, In Proceedings of the 3rd International Central and Eastern European Conference on Multi Agent Systems, pages 626–635, Prague, Czech Republic, June 2003.

      [7] BENAMEUR, A., KADIR, F. A., AND FENET, S, “XML RewritingAttacks: Existing Solutions and their Limitationsâ€, In IADISApplied Computing 2008 (Apr. 2008), IADIS Press.

      [8] CHAN, Y.-Y, “Weakest link attack on single sign-on and its casein saml v2.0 web ssoâ€, In Computational Science and Its Applications- ICCSA 2006.

      [9] M. Gavrilova, O. Gervasi, V. Kumar, C. Tan,D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds., vol. 3982 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, pp. 507–516. 10.1007/11751595 54, 2006.

      [10] LUTZ, D., AND STILLER, B, “Combining identity federation withpayment: The saml-based payment protocolâ€, In Network Operationsand Management Symposium (NOMS), 2010 IEEE, pp. 495 –502, April 2010.

      [11] RAHAMAN, M. A., MARTEN, R., AND SCHAAD, A, “An inlineapproach for secure soap requests and early validationâ€, OWASPAppSec Europe, 2006.

      [12] EASTLAKE, D., REAGLE, J., SOLO, D., HIRSCH, F., ANDROESSLER, T, “XML Signature Syntax and Processing “,(SecondEdition), http://www.w3.org/TR/xmldsig-core/., 2008.

      [13] GAJEK, S., LIAO, L., AND SCHWENK, J, “Breaking and fixingthe inline approachâ€, In SWS ’07: Proceedings of the 2007 ACMworkshop on Secure web services (New York, NY, USA), ACM, pp. 37–43, 2007.

      [14] GROSS, T, “Security Analysis of the SAML SSO Browser/ArtifactProfileâ€, In ACSAC, IEEE Computer Society, pp. 298–307, 2003.

      [15] GRUSCHKA, N., AND IACONO, L. L, “Vulnerable cloud: Soapmessage security validation revisitedâ€, In ICWS [1], pp. 625–631.

      GUDGIN, M., HADLEY, M., MENDELSOHN, N., MOREAU, J.-J., AND NIELSEN, H. F. SOAP Version 1.2 Part 1: MessagingFramework. W3C Recommendation, 2003.
  • Downloads

  • How to Cite

    Kumaresan, S., & Devi.K.A, S. (2018). Dynamic High Availability Architecture Framework for SOA Computing. International Journal of Engineering & Technology, 7(3.12), 740-743. https://doi.org/10.14419/ijet.v7i3.12.16492