59
Huazhong University of Science and Technology WebPeer: A P2P-based System for Publishing and Discovering Web Services Ruixuan Li Internet and Distributed Computing Laboratory College of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074, P.R.China rxli hust.edu.cn

WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

  • Upload
    others

  • View
    30

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

Huazhong University ofScience and Technology

WebPeer: A P2P-based System for Publishing and Discovering Web Services

Ruixuan Li

Internet and Distributed Computing Laboratory

College of Computer Science and Technology

Huazhong University of Science and Technology

Wuhan 430074, P.R.China

rxli hust.edu.cn

Page 2: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 1

Outline

Background of P2P Research

A Glance of our Current Projects

WebPeer: A Web Services Oriented Peer-to-peer System

Experiments & Implementation

Summary & Ongoing Work

Page 3: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 2

Outline

Background of P2P Research

A Glance of our Current Projects

WebPeer: A Web Services Oriented Peer-to-peer System

Experiments & Implementation

Summary & Ongoing Work

Page 4: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 3

Society Development

Hominid society: Hominid society: cooperativecooperativeequalequalcommutativecommutative

First phase: First phase: Before B.c. 2000 Before B.c. 2000

Page 5: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 4

Structured society: Structured society: hierarchicalhierarchicalrankingrankingcentralizedcentralized

Second phase: Second phase: Before Now Before Now ……

The Day After Tomorrow

Page 6: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 5

Service Architecture Development

Client/Server ArchitectureClient/Server ArchitectureCooperative ArchitectureCooperative ArchitectureThe Arch. After ThoseThe Arch. After Those

PeerPeer--toto--Peer Peer Architecture!Architecture!

Page 7: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 6

Predictions

From Forbes (Feb., 2005)(Internet) Applications based on peer-to-peer topologies will be the mainstream.

From Brainpower of U.S (Jan., 2005)Self-Aware Peer-to-Peer Systems will develop resilient, scalable sensor/computation networks with decentralized control.

Page 8: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 7

Distributed Computing Economics

An equivalent price for following computing items:one database access

10 bytes of internet traffic

100,000 instructions

10 bytes of disk storage

a megabyte of disk bandwidth

The break-even point is 10,000 instructions per byte

This serves a basis how we do cost-effective Internet-based computing, such as peer-to-peer computing

(Views of Jim Gray)

Page 9: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 8

What is Peer-to-Peer?

A model of communication where every node in the network acts alike.

As opposed to the Client-Server model, where one node provides services and other nodes use the services.

In P2P network, every node is both client (consumer) & server (producer).

Page 10: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 9

Why P2P ?

Inherent scalability

Abundant resources

No central point of failure

No guarantee about QoS

Page 11: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 10

Building P2P Topology

Directory Server

User User

User User

Hybrid Centralized P2PsHybrid Centralized P2Ps••NapsterNapster••Central MetadataCentral Metadata••Single Failure PointSingle Failure Point••Low ScalabilityLow Scalability

(1)

Us er

UserUser

User

UserUser

User User

(2)

Pure Decentralized P2PsPure Decentralized P2Ps••Gnutella, Gnutella, FreenetFreenet••No Central PointNo Central Point••Good ScalabilityGood Scalability••FloodingFlooding--based Searchbased Search••Hard ManagementHard Management

SuperNodeA

Peer 4: File 1, File 2, File 3, ...Peer 6: File 1, File 2, File 3, …

Peer 1

SuperNodeC

SuperNodeB

Peer 2 Peer 3

Peer 4 Peer 5 Peer 6

(3)

Partially Decentralized P2PsPartially Decentralized P2Ps••KazaAKazaA, , MorpheusMorpheus••Structured Structured ••Good ScalabilityGood Scalability

Page 12: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 11

P2P Applications

File Sharing

Science Computing

Collaboration

E- Commerce

Others

Page 13: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 12

Key Issues

Topology Maintenance

Searching Scheme (Routing Protocol)

Data Dissemination Scheme

Buffer Management

Security and Reputation

Page 14: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 13

Our Experiences on P2P

WebPeerA Web Services Oriented P2P System

http://idc.hust.edu.cn/webpeer/

CoEditA P2P Based Collaborative Editing System

http://idc.hust.edu.cn/coedit/

TrustedPeerA Secure and Dynamic Trusted P2P System

Page 15: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 14

Next …

Background of P2P Research

A Glance of our Current Projects

WebPeer: A Web Services Oriented Peer-to-peer System

Experiments & Implementation

Summary & Ongoing Work

Page 16: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 15

CoEdit: Overview

Collaborative Editing is a form of Editing which involves a group editing process.

Scenario: Cartographers, designers and drawersfulfill drawing objectives, through sharing resources, context and group interaction.

Internet/Intranet

Cartographer Drawer Drawer Designer

Drawer

•Monitoring Activities•Joining Activities•Evaluating Activities

Collaborative WorkplaceDiscussion Collaborative EditingCollaborative Drawing etc

Shared KnowledgeConstruction

Page 17: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 16

CoEdit: IssuesSession Management: How do distributed users create, destroy, join and leave collaborative sessions?Concurrency Control: How do we ensure that concurrent users do not enter inconsistent commands, or merge concurrent commands entered by different users?Undo/Redo: What are the semantics of undo/redo in a collaborative session?Awareness: How are users made aware of “out of band” activities of their collaborator?Access Control: How do we ensure that users do not execute unauthorized commands?Other Aspects: …

Page 18: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 17

CoEdit: Our Approach

Enhance the efficiency and performance through employing P2P technology.

Centralized and decentralized architecture

Direct communication between collaborative sites

Message routing in the collaborative group

Access control among different peers

Page 19: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 18

CoEdit: Arcgitecture

Internet/LANInternet/LAN

Collaborative Group 1

Collaborative Peer

CoEdit Server

Collaborative Peer

Collaborative Peer

Collaborative Peer

Collaborative Peer

Collaborative Group 2

Page 20: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 19

CoEdit: Function Model

Collaborative User Interface Layer

Collaborative Control Layer

Collaborative Transport Layer

Co A

waren

ess

Role A

dm

inistrate

Co assistan

t

Co D

esign

Co u

ndo / R

edo

Consisten

ce M

ainten

ance

Dyn

amic Lo

ck M

echan

ism

Page 21: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 20

Another Project

TrustedPeer ––

One of the security related projects

Page 22: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 21

TrustedPeer: Overview referenced

Page 23: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 22

TrustedPeer: Overview

Trust on client platform is needed in modern systems and emerging applications

Distributed Dissemination CONtrol (DDCON)e.g, Health records of a patient may be transmitted from a primary physician to a consultant who can access them for some limited period of time and cannot transmit them to anyone else

P2P VOIP ApplicationRealtime protection of audio data in a platform

conversation is not eavesdropped or illegally recorded. Forward control of audio object (e.g., voice mail)

Control the platform and user to forward

P2P E-CommerceElectronic currency between peer platformsPayment systems for p2p e-commerce

Page 24: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 23

TrustedPeer: OverviewNeed new security model and architecture

Change of trust relation between client and serverNo centralized and strongly protected serverData located in peers or general client platforms

Location of policy enforcement changedClient-side policy enforcement needs trust

Trust of platform and applicationDynamic environment Software-based attacks

Trusted user authentication and authorization in client platformTrusted path from peer to peer

Spoofing and “man-in-the-middle” eavesdropping or modification attacksTrusted information exchange between peers

Page 25: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 24

TrustedPeer: What’s our Focus?Three types of researches for P2P security

Reputation systems

Recommendation systems

Trust systems

TrustedPeer – part of the following projectPolicy-based Secure Interoperability among Multiple Autonomous Domains

TrustedPeer: A Secure and Dynamic Trusted P2P System

OntoRBAC: Ontology-based Description and Enforcement of RBAC

OntoPolicy: Ontology-based Secure Interoperability among Multiple Security Policies (extended OntoRBAC)

Page 26: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

Policy-based Secure Interoperability Architecture

Secure Session

Global Security Policy

Domain 1

Domain 4 Domain 3

Domain 2Distributed Network Environment

Group A Group N

Group Security Policy

Local Security Policy

Dynamic Trust Domain

Group Security Policy

Secure Negotiation

Local Security Policy

Page 27: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 26

Protocol Layers

Policy Layer

Mapping Layer

Control Layer Authentication Access ControlTrust

ManagementPolicy

NegotiationPolicy

Evalution

Policy Representation & Transformation

Trust Policy

Transport Layer Message Binding & Delivery

Authorization Policy

Aud

iting

Ris

k A

sses

smen

t

Authentication Policy

Page 28: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 27

OntoRBAC

Kinds of methods for security policy descriptionLogic-based (FOL, Stratified Logic, Deontic Logic)

XML-based (XACML, XRBAC, SAML, …)

Ontology-based (Rei, KAoS)

OntoRBACOntology-based Description and Enforcement of RBAC

Concepts: Entity, Subject, Role, PolicyRule, Permission, Action, Policy, …

Page 29: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 28

OntoRBAC: Concept-Relationship Diagram

Page 30: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 29

OntoRBAC: Architecture

PEP: Policy Enforcement PointPDP: Policy Decision PointPGP: Policy Administration Point

Request

Request+Credential

Response

Load

PDP

Access Requester PEP

Policy Loader PAP

OntoRBAC Policy

Query

Administrate

Response

Result

Policy Engine

Page 31: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 30

OntoPolicy

Goal: Integration of Multiple Different Security Policies

Heterogeneity of security model

Heterogeneity of security policy (description)

Heterogeneity of security semantics

OntoPolicyOntology-based Secure Interoperability among Multiple Security Policies

Nearly ongoing

Page 32: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 31

Next …

Background of P2P Research

A Glance of our Current Projects

WebPeer: A Web Services Oriented Peer-to-peer System

Experiments & Implementation

Summary & Ongoing Work

Page 33: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 32

Web Services are booming …

Classical Web ServicesService provider

Service requestor

Service broker (UDDI)

Service Provider

Service Broker Service Requester

Publish Bind

Find

Page 34: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 33

Disadvantages of Web Services

Single Node Failure

UDDI Bottleneck

Limited Scalability

Denial of Service (DoS) Attack

Page 35: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 34

While Peer-to-peer Computing …

Sharing plentiful resources and services among network edges

Federated cooperation among companies

Having Lower costs of system maintenance

Fault tolerance & load balance

Page 36: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 35

Combination of the two technologies

Using P2P-based technologies to publish and discover Web Services

Combination of centralized and decentralizedcharacteristics

The node providing web services act as a peer

Each peer can request web services from other peers

Extend the reliability and scalability of the current web services architecture

Page 37: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 36

Related Work

Content-based search in P2P networksCAN(AT&T), Pastry(Microsoft), Chord(MIT)

Combination of web services and peer-to-peer networks

Self-Serv (UNSW, QUT)

Peermetrics

P2P platform supporting Web ServicesJXTA (Sun)

Page 38: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 37

WSOP: Web Services Oriented Peer-to-peer Architecture

Bind

Common Web Services

Service Requestor

Super Peer

Peer 2

Peer Group 1

Service Provider

Common Service Registry Broker

PublishFind

Local Service Registry Broker

Peer 1 Peer 3

Super Peer

Peer 2

Peer Group 2

Peer 1 Peer 3

Local Service Registry Broker

Page 39: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 38

CSRB & LSRB

CSRB: Common Service Registry BrokerCommon Web ServicesService provider, requestor, brokerUDDI (CSRB), SOAP, WSDL

LSRB: Local Service Registry BrokerLocal Web ServicePeers (service provider, requestor)Super peers (LSRB)Peer group (same interests, neighbors)

Page 40: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 39

Service Publishing

Publishing services to LSRBRegister services to one peer group (super peer)Register services to multiple peer groups

Publishing services to CSRBAs a traditional service provider

Publishing to both LSRB and CSRBMappings between LSRB and CSRB

Page 41: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 40

Service Discovery

Step 1: search the services in its peer groupIf matches, enjoy the service

Otherwise, go to Step 2

Step 2: request will be delivered to other peer groups

If matches, return the result, and cache the result on the way home

Otherwise, go to Step 3

Page 42: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 41

Service Discovery

Step 3: request will be delivered to CSRBIf matches, return the result

Establish mappings on LSRB

Cache the result on LSRB

Otherwise, service not found

Page 43: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 42

Existing Problems

Open problem:Super peer will be the bottleneck if the peer group grows large enough

Solutions:Using more than one super peer in the group

Using Distributed Hash Table (DHT) to organize LSRBs on super peers

Page 44: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 43

Using Multiple Super Peers

Super Peer

Peer

Peer Group 1Peer Peer

Peer

Peer

Peer Group 3

Peer Super PeerSuper Peer

Peer

Peer Group 2

Peer

Peer

Peer

Peer Peer

Super Peer

Super Peer

Page 45: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 44

Modified DHT Approach

Establish DHT among Super PeersDHT: key-based search, need cost of maintenance

Super peers are less dynamic and transient than other peers

Publishing services

Discovering services

K V

K V

K V

K V

K V

Insert(k1, v1)

(k1,v1)

Retrive(k1)

Super Peer

Super Peer

Super Peer

Super Peer

Super Peer

Page 46: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 45

Another Solution

Using peer groups, but no super peersPublishing services to its neighbors

Selected peers (including itself)

Discovering services from its neighborsBreadth-First Search (BFS)

Random Breadth First Search (RBFS)

Intelligent Search Mechanism (ISM)

Most results in the past (>RES)

Maybe other approaches …

Page 47: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 46

No Super Peers

Peer

Peer

Peer Group 1Peer Peer

Peer

Peer

Peer Group 3

Peer Peer Peer

Peer

Peer Group 2

Peer

Peer

Peer

Peer Peer

Peer

Peer

Page 48: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 47

Service Discovery Techniques

Breadth First Search (BFS)

Random Breadth First Search (RBFS)

query all neighbors query a random subset of neighbors

Page 49: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 48

Service Discovery Techniques (Cont.)

Intelligent Search Mechanism (ISM)

Directed BFS and >RES

query the neighbors that returned the most results in the last 10 queries

intelligently query a subset of neighbors according to the relevance rank

Page 50: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 49

Next …

Background of P2P Research

WSOP: Web Services Oriented Peer-to-peer Architecture

WebPeer: A Web Services Oriented Peer-to-peer System

Experiments & Implementation

Summary & Future Work

Page 51: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 50

Experiments

Experiment ParametersVary nodes between 1,000..100,000

Vary percentage of nodes for service publishing between 0.1..0.5

Vary percentage of nodes for service discovery between 0.5..0.9

Initial topology random graph

Page 52: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 51

Experiments

Simulations for the four types of approaches

CSRB: Traditional UDDI server only

LSRB: Using single super peer

MSP: Multiple super peers

NSP: None super peersBFS, RBFS, ISM, >RES

Results will come out soon

Page 53: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 52

Implementation: Detailed Architecture

Peer Group

P2P Overlay

Web ServicesConfiguration

Peer Node

WSDL DownloadWSIF

Invocation

WSDL Processing

P2P System Initialization

Peer Group Discovery

Peer Authentication

Service Publishing

Service Discovery

Local SOAP Server

Remote SOAP Server

Local Service Cache

WSDL Generation

WSDL Parsing

Export Pipe

Import Pipe

Security Policy

Internet

Single Super Peer

Page 54: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 53

An Instance of Web Services Advertisement <?xml version="1.0"?> <!DOCTYPE jxta:MSA> <jxta:MSA xmlns:jxta="http://www.jxta.org"> <MSID>urn:jxta:uuid-D110E7397F24401EA8318F383CFF29 4035B8C3C1CF6645EABD13B9C76EBB115906</MSID> <Name>JXTASPEC:WebServices:urn:helloservice</Name> <Crtr> Example.org </Crtr> <SURI> http://www.example.org </SURI> <Vers> 1.0 </Vers> <Desc> A service allow you to say hello </Desc> <Parm> <wsdlURI> http://www.example.org/helloservice/ helloservice.wsdl </wsdlURI> </Parm> <jxta:PipeAdvertisement xmlns:jxta="http://jxta.org"> <Id>urn:jxta:uuid-2EC8CDF870744C468B7CB111E337A0 1EE5E3818 F9BBD405B90D2B7626E1549C504</Id> <Type> JxtaUnicast </Type> <Name> WebServices:RespPipe:urn:helloservice</Name> </jxta:PipeAdvertisement> </jxta:MSA>

Page 55: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 54

Algorithms of Discovering Web Services

PROCEDURE discoverWebServicesAdvertisementBEGIN WHILE Looking up Web Services Advertisements in local service cache; IF (search result doesn’t match the request)

BEGIN Sending discovery request to peer group; IF (search result matches the request) Saving result in local service cache; ELSE

BEGIN Sending discovery request to CSRB; IF (search result matches the request) Saving result in local service cache; ELSE Return result with no matches; END; END;

return the discovery result; UNTIL (number of discovery request is 0); END;

PROCEDURE getWsdlDocument BEGIN WHILE BEGIN Getting a Web Services advertisement; IF (parameters of advertisement are not null) BEGIN Call doc(StructuredTextDocument) to create a structured text document; Saving parameters of advertisement into created document; elements := doc; WHILE BEGIN Getting names of subitems; IF (subitem is wsdlURI)

BEGIN Getting the value of wsdlURI; IF (the value of wsdlURI is not null)

BEGIN return the value of wsdlURI; break the inner LOOP; END END END END else repeat the outer loop; UNTIL (peers has more elements); END;

Page 56: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 55

WebPeer System Interfaces

Page 57: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 56

Next …

Background of P2P Research

WSOP: Web Services Oriented Peer-to-peer Architecture

WebPeer: A Web Services Oriented Peer-to-peer System

Experiments & Implementation

Summary & Ongoing Work

Page 58: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 57

Summary & Ongoing Work

Security models for different approaches and topologies

Semantic-based model for service publishing and discovery

Possible mobility of Web Services in P2P Environment

Page 59: WebPeeridc.hust.edu.cn/~rxli/slides/WebPeer_UWS.pdf · 2017-10-19 · Publishing and Discovering Web Services Ruixuan Li ... Heterogeneity of security model Heterogeneity of security

IDC Lab, HUST 58

Thanks!