Title: Mr.%20Abdelkrim%20Boujraf,%20Unisys
1R4eGov Inter-Agency Collaboration Security
Performance Measurement
- Mr. Abdelkrim Boujraf, Unisys
- Mr. Andreas Schaad, SAP Research
- Mr. Mohammad Ashiqur Rahaman, SAP Research
- funded by EU Integrated Project R4eGov
2AGENDA
R4eGov Inter-agency collaboration
WS Performance Criteria
Evaluating WS vs. SOAP Accounts
Evaluation Results
3The problem.
- The majority of eGovernment systems is and may
have to remain heterogeneous. - Their configuration and definition of processes
is likely to remain under local administration. - eGovernment interoperability in the EU follows
an ad hoc approach and systems are only made
interoperable when there is a shared purpose and
some general legal guidelines. - We believe the majority of systems to require the
methodologies, systems and tools for achieving
the maturity level of collaborative organisations.
Europol and Eurojust are SAP EU project
partners but not SAP customers. The case study
is for illustration / requirements engineering
purposes only.
4EU Interagency Collaboration - The reality.
- During a routine check Spanish customs intercept
a shipment of coffee containing cocaine in the
harbour of Malaga. - The container came from Caracas, Venezuela and
was supposed to be transported by road to Antwerp
and to be delivered to a trade company called BE.
- A number of persons are taken into custody,
whilst investigations start.. - The involved authorities (Europol and Eurojust)
need to collaborate in a quick and efficient
manner. - European Arrest Warrant
- Rogatory Letter
- Joint Investigation Teams
- .
- They need to remain in control of their systems
- They need to follow local as well as EU-wide laws
and agreements
Europol and Eurojust are SAP EU project
partners but not SAP customers. The case study
is for illustration / requirements engineering
purposes only.
5Europol and Eurojust
- Eurojust
- Eurojust National Members,
- Case Management Analysts
- EJN Secretariat,
- National Correspondents,
- EJN Contact Points
- National judicial authorities
- Europol
- Member States (MS)
- Analysis Work File Teams (AWFTs)
- Europol Liaison Officers (ELOs)
- Member States Liaison Bureaux (MS-LBx)
- Serious Crime Units (SCUs) / Analysis Unit (SC7)
- Liaison Officer Interpol / Washington DC
Europol and Eurojust are SAP EU project
partners but not SAP customers. The case study
is for illustration / requirements engineering
purposes only.
6Towards standardised collaboration processes
Europol and Eurojust are SAP EU project
partners but not SAP customers. The case study
is for illustration / requirements engineering
purposes only.
Europol and Eurojust are SAP EU project
partners but not SAP customers. The case study
is for illustration / requirements engineering
purposes only.
7Requirements
- Local case management
- Exchange of documents
- Access Control on documents
- Traceability
- Chain of evidence
- European and Local Directives on Data Usage
- Collaboration agreements
Can in parts be addressed by using OASIS WS
standards.
8General WS Security Setup
WS-Policy describes the capabilities and
constraints on intermediaries and endpoints (e.g.
required security tokens, supported encryption
algorithms)
Policy
Security Token Service
WS-Trust describes a framework for trust models
that enables Web services to trust other domains
Policy
Policy
Requester
Web Service
WS-SecureConversation describes how to manage and
authenticate a series of message exchanges
WS-Security attaching signature and encryption
headers / security tokens to SOAP messages e.g.
X.509 certificates and Kerberos tickets, to
messages
9Performance / A general Web Service invocation
flow
- Some Performance Relevant Criteria (incomplete)
- Methods for issuing, renewing, and validating
security tokens - Establishing security contexts for a conversation
of messages. - Amending, Renewing, and cancelling the security
contexts. - Computing and passing derived keys and session
keys. - Verify Subjects / Security Attributes
10Approach to Performance Measurement
- Our Problem
- What can we measure performance against?
- No real benchmarks for WS Performance
Measurement. - Our Approach
- Build our own solution for defined purpose scope
- Measure WS key performance indicators against
this - Our (simplified) requirements
- Preservation of message confidentiality /
integrity - Handling of complex / large messages
- Focus on prevention of XML re-writing attacks
- Our Proposal
- SOAP Account Keeps record of SOAP message
structure / elements. - Requires small component to be deployed on each
SOAP processing node.
11SOAP Account Message flow in the proposed
technique
12A SOAP request using a SOAP Account
RST token is signed
ltEnvelopegt ltHeadergt ltSecuritygt
ltBinarySecurityToken Id" Id-2"
ValueType"...X509v3"gt
MIIEZzCCA9CgAwIBAgIQEmtJZc0...lt/BinarySecurityToke
ngt ltSignaturegt ltSignedInfogt
ltCanonicalizationMethod Algorithm"..xml-exc-c14n
"/gt ltSignatureMethod Algorithm"...rsa-sha
1"/gt ltReference URI"Id-1"gt
ltDigestMethod Algorithm"...sha1"/gt
ltDigestValuegtd5AOd..lt/DigestValuegt lt/Referencegt
ltReference URI"Id-2gt...lt/Referencegt
ltReference URI"Id-3gt....lt/Referencegt
lt/SignedInfogt ltSignatureValuegte4EyW...lt/Sign
atureValuegt ltKeyInfogtltSecurityTokenReference
gtltReference URI"Id-2"
ValueType"...X509v3" /gtlt/KeyInfogt
SOAP Account added
ltSoapAccount IdId-3gt
ltNoChildOfEnvelopegt2lt/gt ltNoOfHeadergt2lt/gt
lt/SoapAccountgt
Receiver can verify
ltBody Id"Id-1"gt ltRequestSecurityTokengt
ltTokenTypegthttp//schemas.xmlsoap.org/ws
/2005/02/sc/sct lt/TokenTypegtltRequestTypegth
ttp//schemas.xmlsoap.org/
ws/2004/04/security/trust/Issue lt/RequestTypegt
ltBasegt...lt/Basegt lt/RequestSecurityTokengt lt/
Bodygt
13Simulated SOAP, WS Policy, SOAP Account
SOAP Account
SOAP
ltSoapAccount IdId-3gt
ltNoOfHeadergt2lt/gt lt/SoapAccountgt
ltEnvelopegt ltHeadergt ltSecuritygt
ltBinarySecurityToken Id" Id-2" ..gt
...lt/BinarySecurityTokengt
ltSignaturegt ltSignedInfogt
ltReference
URI"Id-1"gt ..lt/Referencegt
ltReference URI"Id-2gt
....lt/Referencegt
lt/SignedInfogt ltSignatureValuegte4EyW.
.. lt/SignatureValuegt
ltKeyInfogtlt/KeyInfogt ltBody Id"Id-1"gt
ltRequestSecurityTokengt
ltTokenTypegthttp//schemas.xmlsoap
.org/ws/2005/02/sc/sct
lt/TokenTypegt ltRequestTypegthttp//schemas.xml
soap.org/ ws/2004/04/security
/trust/Issue lt/RequestType..
lt/RequestSecurityTokengt
197 bytes
WS Policy
ltwspPolicy ..gt .. ltspSignedPartsgt
ltspBody/gt lt/spSignedPartsgt lt/wsp
Policygt
2695 bytes to 51551 bytes
388 bytes
14Performance Criteria
1. SOAP Account Processing. 2. Policy
processing. 3. Signature Processing. 4.
Attacker Simulation
Comparison Criteria
- Request SOAP size vs. requestor Soap Account
header size and Policy file size. - SOAP Account size vs. Policy file size.
- Relative comparison of signature processing in
both ends. - Enforcement time of SOAP Account and Policy in
sender (requestor). - Enforcement time of SOAP Account and Policy in
the receiver. - XML rewriting attack detection time using SOAP
Account and Policy.
SOAP Size 2695 to 51551 bytes SOAP Account 197
bytes 0.72 of SOAP Policy File 388 bytes
1.42 of SOAP Scalability.
15 more time in the Requestor
Comparable enforcement time for both in the
Requestor.
- 30 less Enforcement time using SOAP Account in
the Receiver. - SOAP size gt 4500 bytes..SOAP Account Enforcement
Time Policy Enforcement Time.
1.50 faster XML Rewriting Attack Detection
using SOAP Account. SOAP Account is scalable.
15 less time in the Receiver
15Summary Conclusion
- We presented a real-world collaboration
scenario and security requirements - WS can be deployed to satisfy some of these
requirements - WS Security performance indicators
- Measure these indicators against our own SOAP
account solution - In summary, our solution is more performant due
to being purpose-built for avoiding XML rewriting
attacks (overly simplified). - Not really scientific approach but valuable
lessons learnt on - Establishing a set of Security / Web Service
Performance Indicators - Implementation and Setup, Memory Consumption,
Processing, Key Generation, Validation,
Message Sizing etc. - Current research work is focusing on XACML
testing - Overall goal is a general test tool suite for
standards evaluation
16Thank You Questions
abdelkrim.boujraf_at_be.unisys.com andreas.schaad_at_sap
.com mohammad.ashiqur.rahaman_at_sap.com
Europol and Eurojust are SAP EU project
partners but not SAP or Unisys customers. The
case study is for illustration / requirements
engineering purposes only.