Article Review Procedure
Academic Areas and Subjects
Applied Aspects of Information Technology
Search by article
Vol. 4 № 1
Vol. 4 № 2
Vol. 3 № 1
Vol. 3 № 2
Vol. 3 № 3
Vol. 3 № 4
Vol. 2 № 1
Vol. 2 № 2
Vol. 2 № 3
Vol. 2 № 4
Vol. 1 № 1
5 Oct 2021
On October 5, 2021, a business meeting was held between representatives of the EPAM Systems IT Company Denis Grinev and Sergey Garashchuk with the Rector of the State University “Odessa Polytechnic” Gennadii Alexandrovich Oborskiy
17 Sept 2021
International Summer School
15 July 2021
Until November 1, 2021, enrollment in the double degree program of Slovakia 2ouble Degree is carried out.
REDUCTION OF THE HARMFUL EFFECT OF CRITICAL MODES IN THE OPERATION QUEUE ENVIRONMENT FOR AUTHORIZATION PROTOCOLS FOR LARGE REQUESTS
An essential part of web security is keeping the payload intact from changes. The data during transmission could be changed, where the encryption is not used, or the data gets decrypted in the middle of the transmission. In our previous researches, the “chunking” method was introduced, which was compared with the “Buffering to file” method. The comparison showed the reduction of recourse consumption. In a multithreading environment, to manage resources efficiently, it is vital to distribute the workload among processor cores. A decent solution for using multithreading efficiently is operation queues. However, if too many operations are accumulated in the operation queue, the system falls into the critical mode. It is characterized by the increase of memory consumption, which may cause the instability of the system. In the course of the study, the main parameters were determined, influencing the data processing speed, and insignificant ones were excluded from the calculation. Earlier, a method was developed for determining the conditions for the falling of a system to a critical mode. It was used as a starting point for the experimental research. A new method based on the method of identifying critical modes in the operation queue is proposed. It differs from existing ones by the ability to simulate critical modes at a given workload, which allows predicting critical modes in order to reduce their negative effect. A series of experiments were carried out, and the results were used to study the dependences of memory consumption on the number of connections and writing speed in critical modes. From the study, three types of critical modes were determined. This made it possible to establish the patterns of the emergence of critical modes in information systems and their impact on the available memory. The formulas are obtained that approximate the experimental data: the dependence of the used memory on the number of connections and the write speed. The research results can be used in the development of information systems and the analysis of failures.
Sergii S. Surkov
, postgraduate student
( firstname.lastname@example.org )
digital signature; authorization; large payload; operation queues; network requests; verification
1. Surkov, S. & Martynyuk, O. “Method of Migration from Single Server System to Server Cluster”. In Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2015). Warsaw, Poland: 2015. DOI: 10.1109/IDAACS.2015.7341415.
2. Kizza, J. M. “Computer Network Security and Cyber Ethics Fourth Edition”. Jefferson, NC, United States: Publ. McFarland. 2014. 240 p.
3. Fielding, R. & Reschke, J. “ Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing, IETF RFC 7230”. Available from: https://tools.ietf.org/html/rfc7230. [Accessed 12th August 2020].
4. Belshe, M. & Peon, R. “Hypertext Transfer Protocol Version 2 (HTTP/2), IETF RFC 7540”. Available from: https://tools.ietf.org/html/rfc7540. [Accessed 12th August 2020].
5. Liu, Q., Zhang, L. & Fan, A.. “Scheme to authenticate requests for online banking based on identitybased mediated RSA”. Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition). 2015; Vol.16: 29–33. DOI: 10.7666/j.issn.1009-3443.20140929001.
6. Sanae, H. “Security Requirements and Model for Mobile Agent Authentication”. Smart Network Inspired Paradigm and Approaches in IoT Applications Singapore: Republic of Singapore. 2019. p. 179– 189. DOI: 10.1007/978-981-13-8614-5_11.
7. Rash, M. “Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort”. San Francisco, CA, United States: Publ. No Starch Press. 2007. 336 p.
8. Fjordvald M. & Nedelcu C. “Nginx HTTP Server – Fourth Edition: Harness the power of Nginx to make the most of your infrastructure and serve pages faster than ever before”. Birmingham, United Kingdom: Publ. Packt Publishing. 2018. 400 p.
9. Blokdyk, G. “Apache Web Server A Complete Guide – Edition”. Brisbane, Australia: Publ. 5STARCooks. 2020. 238 p.
10. Saini, K. “Squid Proxy Server 3.1: Beginner's Guide Paperback”. Birmingham, United Kingdom: Publ. Packt Publishing. 2011. 332 p.
11.Wessels, D. “Squid: The Definitive Guide”, Sebastopol, CA, United States: Publ. O'Reilly Media. 2010. 472 p.
12. Eugene, F., John, O.R. & Kevin, C. “Security evaluation of the OAuth 2.0 framework”. Information and Computer Security. 2015; Vol.23(1): 73–101. DOI: 10.1108/ICS-12-2013-0089.
13. Cheol-Joo, Chae Ki-Bong & Han-Jin Cho. “A study on secure user authentication and authorization in OAuth protocol”. Springer Cluster Computing. 2019; Vol. 22(2). DOI: 10.1007/s10586-017- 1119-6.
14. Farooqi, S., Zaffar, F., Leontiadis, N., et al. “Measuring and mitigating OAuth access token abuse by collusion networks”. In Communications of the ACM. New York, NY, United States: 2020. p. 103–111, DOI: 10.1145/3387720.
15. Feng, Y. & Sathiamoorthy, M. “A security analysis of the OAuth protocol”. In IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM). Victoria, BC, Canada: 2013. p. 271–276. DOI: 10.1109/PACRIM.2013.6625487.
16. Seung, J. & Souhwan, J. “Personal OAuth authorization server and push OAuth for Internet of Things”. International Journal of Distributed Sensor Networks, Thousand Oaks, CA, United States: 2017; Vol.13. DOI: 10.1177/1550147717712627.
17. Se-Ra, O. & Young-Gab, K. “AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth”. International Journal of Distributed Sensor Networks. Thousand Oaks, CA, United States: 2020; Vol.16(2): 1–15. DOI: 10.1177/1550147720906388.
18. Hossain, N., Hossain, M. A., Hossain, M., et al. “OAuth-SSO: A Framework to Secure the OAuthbased SSO Service for Packaged Web Applications”. In Proc. of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, United States: 2018. p. 1575– 1578. DOI: 10.1109/TrustCom/BigDataSE.2018.00227.
19. El-hajj, M., Fadlallah, A., Maroun, C., et al. “A Survey of Internet of Things (IoT) Authentication Schemes”. Sensors – Open Access Journal. Basel, Switzerland: 2019; Vol. 19: 1–17. DOI: 10.3390/s19051141.
20. Hardt, D. “The OAuth 2.0 Authorization Framework, IETF RFC 6749”. Available from: https://tools.ietf.org/html/rfc6749. [Accessed 26th Jule 2020].
21. Jones, M. & Bradley, J. “JSON Web Token (JWT) IETF RFC 7519”. Available from: https://tools.ietf.org/html/rfc7519. [Accessed 18th Jule 2020].
22. Richer, J. “User Authentication with OAuth 2.0”. Available from: https://oauth.net/articles/authentication/. [Accessed 17th Jule 2020]. 23. Krawczyk, H. & Bellare, M. “HMAC: Keyed-Hashing for Message Authentication”. Available from: https://tools.ietf.org/html/rfc2104. [Accessed 02th Jule 2020].
24. Leiba, B. “OAuth Web Authorization Protocol”. IEEE Internet Computing. Nicosia, Cyprus: 2012;Vol.16: 74-77. DOI: 10.1109/MIC.2012.11. 25. Hammer-Lahav E. (2010). “The OAuth 1.0 Protocol. IETF RFC 5849”. Available from: http://tools.ietf.org/html/rfc5849. [Accesse15th August 2020].
26. Hammer, E. “OAuth 2.0 and the Road to Hell”. Available from: http://hueniverse.com/2012/07/oauth-2-0-and-the-road-to-hell/.[Accessed 29th June 2020]. 27. Hammer, E. “HAWK / HTTP Holder-Of-Key Authentication Scheme”. Available from: https://github.com/hueniverse/hawk. [Accessed 14th August 2020].
28. Surkov, S. S. “Model and method of chunk processing of payload for HTTP authorization protocols”. Proceedings of IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), Slavske, Ukraine: 2020. p. 317–321. DOI: 10.1109/TCSET49122.2020.235447.
29. Surkov, S. S., Martynyuk, O. M. & Mileiko, I. G. “Modification of open authorization protocol for verification of request“. Electrotechnic and Computer systems. 2015; Vol. 19(95): 178–181. Odessa Ukraine: (in Russian).
30. Surkov, S. S. “Comparison of authorization protocols for large requests in operation queue environment”. Applied Aspects of Information Technology. Odessa, Ukraine: Publ. Nauka I Tekhnika. 2020; Vol. 3 No.3. DOI: 10.15276/hait.03.2020.5.
31. Grosch, S. “Concurrency by Tutorials (Second Edition): Multithreading in Swift with GCD and Operations”, McGaheysville, VA, United States: Publ. Razeware LLC. 2020. 100 p.
32. Drozd, O., Kharchenko, V., Rucinski, A., et al. “Development of Models in Resilient Computing”. In Proc. of 10th IEEE International Conference on Dependable Systems, Services and Technologies (DESSERT’2019). Leeds, UK. 2019. DOI: 10.1109/DESSERT.2019.8770035.
33. Drozd, A., Antoshchuk, S., Drozd, J., et al. “Checkable FPGA Design: Energy Consumption, Throughput and Trustworthiness”. In Green IT Engineering: Social, Business and Industrial Applications, Studies in Systems, Decision and Control. Warsaw, Poland: 2018. p. 73–94. DOI: 10.1007/978-3-030-00253- 4_4.
34. Drozd, O., Kuznietsov, M., Martynyuk, O., et al. “A method of the hidden faults elimination in FPGA projects for the critical applications”. In Proc. of 9th IEEE International Conference on Dependable Systems. Services and Technologies (DESSERT’2018). Kyiv, Ukraine: 2018. p. 231–234. DOI: 10.1109/DESSERT.2018.8409131.
35. Apple Inc. “Grand Central Dispatch”. [Digital Resource]. Available from: https://github.com/ apple/swift-corelibs-libdispatch. [Accessed 27th June 2020].
Received after revision 14.09.2020
Vol. 3 № 3, 2020
22 Oct 2021
Search by author
Information Systems and Technologies
1. Models and Methods of Information Technology
2. Design of Information Systems and Technologies
3. Mathematical Issues of Information Technologies
4. Innovative Technologies in Education, Culture and art
5. Game Technologies, Augmented and Virtual Reality
6. Theoretical and Applied Issues of Computer Science
7. Project, Program and Portfolio Management
Digital control of Technical and Social Systems
1. Adaptive and optimal Control Systems
2. Parametric and System Identification
3. Interconnected Systems and Systems with Distributed Parameter
4. Renewable Energy Systems
5. Machine Learning and Artificial Intelligence in General Technical Problems and Electromechanics
6. Management of Production and Power Plants
7. Control Systems for Robotic Systems and Complexes, Electric Vehicles
8. Diagnosis and Evaluation of Complex Systems
9. Simulation of Physical Objects and Processes
Sensor less Control Systems
Software Engineering and Systems Analysis
1. Methods and Means of Intellectual Information Processing
2. Recognition, Decision Making, Forecasting
3. Neural Network Technologies and Machine Learning Methods
4. Semantic Models. Natural Language Processing
5. Theoretical and Applied Issues of Software Engineering
6. Models and Methods of Software Quality Management
Computer Systems and Cybersecurity
1. Parallel and Distributed Information Processing
2. Internet of Things
3. Information Security and Cybersecurity
4. Computer Networks and Systems
5. Components of Robotic Systems
KarelWintersky ] [
[ © Odessa National Polytechnic University, 2018.]