Вы находитесь на странице: 1из 5

Systematic review of security challenges to OSGi service framework

Kamran Talib1, Tabassum Riaz2 , B S R K Kishore3, V. S P Babu4


1 2 3 4
8210215359, 8205052577 , 7903310436, 8709291234
1
kamrantalib1982@yahoo.com, 2 tabasumriaz@yahoo.com, 3 bsrk_kishore@yahoo.com, 4-
Blekinge Tekniska Hogskola, Sweden

Abstract:
The systematic literature review regarding the 2. Repeatable Process:
OSGi framework is done in this paper.
Specifically, the security issues/challenges and At first the initial questions are set which are
their solutions have been reviewed. This systematic revised and refined to make more specific and
review has been made to take into account the important research questions and after that the
research about the security challenges to the OSGi detailed discussion the final research questions
framework and the methods to face them proposed are finalized.
by the researchers.
2.1 Initial questions for research:
1. Introduction to OSGi What is OSGi framework?
It„s a dynamic module system for Java™ platform What are specifications of OSGi
[1]. It is dynamic because it Install, start, stop, framework?
update, and uninstall bundles at run time. It Keywords: OSGi
includes dependency management, version
handling and visibility rules of OSGi bundle and 2.2 Revised research questions:
modules. How security is implemented in OSGi
The OSGi Service Platform gives functionality to framework?
Java to make Java the leading environment for What are the general security specifications
software development and integration [1]. It of OSGi framework?
provides the standardized primitives to construct Keywords: Security AND Implementation
small, collaborative and reusable components for AND OSGi
applications. Then these components can be
composed to make a new application and deployed. 2.3 Final research questions:
In OSGi Service Platform, there is no need to What are the security challenges to the OSGi
restart as the composition of the devices of various framework and their solutions?
networks change dynamically. The OSGi Keywords: Security in OSGi, security
technology provides the SOA (Service-oriented challenges AND OSGi, Security Solution
architecture) that makes the components to search AND OSGi
each other for cooperation and collaboration
dynamically so that the coupling is minimized and
managed. OSGi Alliance has developed and 3 Systematic Review of OSGi
introduces different standard component interfaces
for general functions like Configuration, Http 3.1 Review protocol of OSGi framework
Servers, security, logging, XML, user The review protocol of the OSGi framework is
authentication and administration and much more. as follows:
The adopters‟ benefit of OSGi technology are
development cost is reduced because it provides the 3.2 Background
integration of pre-developed and tested modules The major purpose of the review protocol is to
instead of developing new applications. That‟s review the research already done in the field of
why, this also reduces the costs of maintenance. OSGi framework from 2000 to 2008. The
overview of the OSGi framework will be
presented by this systematic review. It will
provide the current level of the research done
in OSGi framework.

3.3 Strategy for search:


The online search process will be done by the
following search terms and resources;
a) Search terms:
i. OSGi
ii. OSGi framework
iii. Why OSGi?
iv. Need of (ii)
v. Introduction to (i) and (ii)
vi. Security in (i)
vii. Security issues AND (i)
viii. Security threats to (ii) 3.6 Quality evaluation and processes:
ix. Security threats AND (ii) The research papers and articles that are
x. Security mechanism in (ii) selected will be assessed on the basis of the
xi. Authentication AND (ii) structure of the research papers or article i.e.,
xii. Authorization AND (ii) subheadings of the paper like the introduction
xiii. Access control AND (ii) of paper, methods/models described, analysis
xiv. Integrity of services AND (ii) and conclusion.
xv. Methods to secure (ii)
xvi. Limitations in (vi) 3.7 Strategy for Data extraction:
To gain the information from study followings
b) Search resources: forms of data extraction will be used.
1) General Information of Research
We used following online resources; Paper:
IEEE Xplore 1. Research article or paper title
ACM digital library 2. Name(s) of author(s)
Inspec 3. Conference/Journal/Conference
Springer Proceedings
4. Search terms used to get the search
3.4 Article Selection Criteria: research papers or articles
We will focus on the general research papers, 5. Research article or paper retrieval
articles, case studies, experiments and surveys database
which will be related to the our research 6. Publication date
questions published from 2000 to 2008, others 2) Specific information of Research
will be excluded. Paper:
1. Environment of study
First Selection Step i) Academia
ii) Industrial
2. Research methodology
IEEE
i) Case study
ACM
ii) Action research
Springer iii) Experiment
Inspec iv) Survey
v) Subjects
3. Professionals
i) Students
ii) Selection of subjects
4. OSGi framework
3.5 Selection procedure: i) Definitions of OSGi and OSGi
First of all we will see the title then read the framework
abstract, if it will be relevant to our research ii) Implementation of OSGi
question then we will study its conclusion and framework
finally the whole paper to find the specific iii) Security Implementation in OSGi
information needed to answer the research framework
question. iv) Security issues in OSGi
framework
v) Challenges regarding security in
OSGi framework

3.8 Strategy for Data extraction and


Synthesis:
In the process of systematic review, synthesis
of data is done by gathering and reviewing the
results gained from the included basic studies.
The synthesis quality is will be gained from
studying and analyzing the research papers or
articles. The whole results are stated as
according to the research questions mentioned (PKI) used for authentication of the service
in review protocol. The data extraction bundles securely are not efficient enough for
procedures will be used to gather the the OSGi framework having a little resources
information from each basic study. because RSH and PKI require long time for the
encryption/decryption process and more
Chi chih houng & et.al [2] has presented the memory is needed for this purpose as well.
challenge to the security of the OSGi They have also raised another issue that the
framework due to the java. They describe that only OSGi User-Admin specification is not
though the java presents a strong mechanism enough sufficient for the management of the
against modification of the system but there users and associated permissions with them.
are chances of the service level attacks due to Further, the movement and deployment of the
the services which are authorized and service bundles is in on demand fashion, so it
accessing the same resources and files. They is very difficult to build the policies without
say that java has weak security against the knowing in detail about the service bundle
denial of service because when a service is implementation. So the policy file format
authorized to use the resources allocated to it should be common and standard when the
then system may hog by it if this service is not policy files are referenced by the service
able to stop the nonstop allocation. The system bundles. Many security threats may arise in the
can be rebooted to end denial of the service policy files being transferred to the home
attack in general. But the problem with OSGi gateway.
is that the local system makes cache of the Hee-Young Lim & et al [5] has proposed the
bundle. The OSGi is not capable of stopping above problem using the XML signature.
this attack as it can‟t remove the bundle which Using XML signature, a service bundle is
is cached in the local disk. They are agreed transferred from the operator to the receiver in
with the sunil & et al [10], who proposed an the secure way. It provides the solution of the
intrusion detector and facility of thread level problem regarding the generation and the
auditing for the JVM for detecting the transmission of the policies of the access
malicious code attack. control securely to the home gateway with the
Chi Chih houng & et.al [3] has described help of RBAC model based on the XACML in
another threat to the OSGi framework known the home network of the service OSGi
as shared object attack which is the major framework.
threat to the Java card environment also, that is Young-Gab Kim & et al [6] explain that the
similar to the OSGi. process used to authenticate the service
Gail-Joon Ahn & et.al [3] explain that service bundles using PKI and RSH is not proper for
of User Admin used for authorization is not the OSGi framework that has limited memory
adequate enough to work in open and dynamic as well as operations. As operations of public
environments like OSGi. They has proposed key like DSA or RSA may be performed by it
the solution of this threat with the help of and it will also check the certificate which is
RBAC (role-based access control), in which working with the certification authority for
the users will be associated with the roles and effectiveness. And the one problem with the
then the roles are associated with the RSA is that encryption as well as
permissions. The mechanism of authorization authentication of all the data being transferred
in the OSGi framework is mapped and among operators and the service gateways, is
configured with the RBAC. based on the MACs (Message Authentication
Pierre Parrend and Stephane Frenot [4] present Code). So there is expectation that there will
that the OSGi is becoming the de-facto be poor performance when the service bundle
component based middleware for the size will be increased.
extensible soft wares, with the help of its MAC-based service bundle has been proposed
management layer for managing the life cycle by Young-Gab Kim & et al [6] for
of the bundles or components. But it is hard to authenticating the service bundles rather than
find out the security features of this life cycle RSH protocol or PKI. At first, mutual
especially during the deployment phase of the authentication b/w service bundle and operator
bundles that is generally done over the non is carried on, then the MAC-based
secure networks. The challenge is that how to authentication is done. The mutual
deploy the bundles securely. authentication provides shared key which is
Pierre Parrend and Stephane Frenot [4] have then used for the formation of MAC. They
developed some tools for deploying the service have also designed a key exchange method for
bundles securely. SF-Jarisgnerl supports the sending the service bundle in safe form in the
security of the early life cycle deployment phase of the bootstrapping which is used for
phase. SFelix2 has implemented the validation recognizing and starting the equipment.
layer of digital signature of specifications of Jongil Jenong & et al [7] has discussed the
OSGi Release 4 [11]. security concerns when web and mobile
Hee-Young Lim & et al.[4] has described that services are expanded up to home networks by
RSH protocol or the public Key Infrastructure using OSGi service framework. According to
them the core security issue is that security research in this field. Secondly, this review
architecture has distributed nature and there is cannot stay away from selection bias while
need of building of the main security searching the papers relevant to the research
characteristics the whole system parts. It is question. We only searched the papers
necessary for the user to remember his user available in English on some research
name and the password for every service, and databases like ACM and IEEE Xplore etc.
administer has to manage the passwords
present in the database. There is also danger of
the insecurity of the passwords because the 5 Conclusion:
password is transmitted frequently on the sites.
The solution to the above problem as The systematic review describes the work done
recommended by Jong Jenong & et al [7] is in the field of security of the OSGi service
SS0 (Single sign-on), which provides the framework. It summarizes the security threats
facility of authentication of the user only once to the OSGi framework as well as accounts
for using the various services. SAML can be their solutions proposed by the researchers.
used for the exchanging of the information in The major challenges were related to bundle
the format of XML. OASIS [8] has authentication, authorization for using a
recommended the SAML for the purpose of service, problems related inner Java security
single sign-on. like denial of service attack, limitations of the
Phu H.Phung and David [9] have proposed the PKI and RSH protocol etc. In short, the
enforcement of the policy in OSGi framework systematic review has helped us to search the
with the help of aspect oriented programming papers which focus on our research question
which is AspectJ. for finding the challenges to OSGi service
framework and their possible solutions.
Ref. Date of
No. Article Title
No. Publish
Advanced OSGi Security May
6 References:
1 [2] [1] OSGi Alliance|about/OSGi Technology,
Layer 2007
Towards Role-Based Oct. http://www.OSGi.org/About/Technology, last
2 [3] Authorization for OSGi 2008 visited 12 April 2009
Service Environments [2] Pang-Chieh Wang, Chi-Chih Huang, and Ting-
Supporting the Secure Jun. Wei Hou, “Advanced OSGi Security Layer ",
3 [4] Deployment of OSGi 2007 Advanced Information Networking and
Bundles
Applications Workshops, 2007, AINAW '07.
Bundle authentication and 2005
authorization using XML 21st International Conference on Volume 2
4 [5] Page(s):518 - 523, 21-23 May 2007
security in the OSGi
service platform [3] Hongxin Hu, Gail-Joon Ahn, and Jing Jin,
A service bundle 2004 “Towards Role-Based Authorization for OSGi
authentication mechanism Service Environments ", Future Trends of
5 [6]
in the OSGi service Distributed Computing Systems, 2008. FTDCS
platform
'08. 12th IEEE International Workshop,
An XML-based single Jan.
6 [7] sign-on scheme supporting 2005 Page(s):23 - 29, 21-23 Oct. 2008
OSGi framework [4] Frenot, Parrend, Pierre; and Stephane,
Security Policy Aug. “Supporting the Secure Deployment of OSGi
Enforcement in the OSGi 2008 Bundles", World of Wireless, Mobile and
7 [9]
Framework Using Aspect- Multimedia Networks, 2007. WoWMoM 2007.
Oriented Programming IEEE International Symposium, Page(s):1 - 6,
8 [1] OSGi technology 2008
18-21 June 2007
OSGi service platform 2008
[5] Hee-Young Lim, Chang-Joo Moon, Young-Gab
core specification the
9 [11] Kim, and Doo-Kwan Baik, " Bundle
OSGi Alliance release 4
version 4.1 authentication and authorization using XML
security in the OSGi service platform ",
4 Systematic Review Limitations: Computer and Information Science, 2005.
Fourth Annual ACIS International Conference,
Though the systematic review has helped us to Page(s):502 - 507, 2005
summarize the present status of the research [6] Young-Gab Kim, Chang-Joo Moon, Dae-Ha
regarding to our research question, but it has Park, and Doo-Kwon Baik, " A service bundle
some limitations also. At first, small number of
authentication mechanism in the OSGi service
research papers relevant to our research
question were found. There is still need of platform ", Advanced Information Networking
and Applications, 2004. AINA 2004. 18th Software and Applications, 2008. COMPSAC
International Conference Volume Page(s):420 - '08. 32nd Annual IEEE International,
425 1, 2004 Page(s):1076 - 1082, July 28 2008-Aug. 1 2008
[7] Dongkyoo Shin, Jongil Jeong, and Dongil Shin, [10] Krintz C, Soman S, and Vigna G, “Detecting
" An XML-based single sign-on scheme Malicious Java Code Using Virtual Machine
supporting OSGi framework ", Consumer Auditing,” 12th USENIX Security Symposium,
Electronics, 2005. ICCE. 2005 Digest of 2003.
Technical Papers. International Conference, [11] OSGi Alliance|about/OSGi service plateform
Page(s):31 - 32, 8-12 Jan. 2005 core specification,
[8] “OASIS security services”, http://www.oasis- http://www.OSGi.org/About/Technology, last
open.org, last visited 16 April 2009. visited 12 April 2009
[9] Sands. D. and Phung. P.H. “Security Policy
Enforcement in the OSGi Framework Using
Aspect-Oriented Programming ", Computer

Вам также может понравиться