







Vol.1 , No. 2, Publication Date: Nov. 13, 2014, Page: 10-23
[1] | Okafor Anthony Chinedu, Dept. of Electronics and Computer Engineering, Nnamdi Azikiwe University, Awka, Nigeria. |
[2] | Okafor Kennedy Chinedu, Dept. of Electrical and Electronic Engineering, Federal University of Technology, Owerri, FUTO, Nigeria. |
[3] | Ugwoke Fidelia Ndidi, Dept. of Computer Science, Michael Okpara University of Agriculture, Umudike, Umuahia, Nigeria. |
[4] | Osuesu Blessing Obianuju, Dept. of Electronics and Computer Engineering, Nnamdi Azikiwe University, Awka, Nigeria. |
[5] | Ogbu Vincent Ikechukwu, Dept. of Electrical and Electronic Engineering, Anambra State University, Uli, Anambra State, Nigeria. |
For a good design, security trust in Online Service Computing can effectively improve the underlying design architecture. This paper reviewed various contributions for OSC in the context of existing web services architecture. Though various security models have been proposed in literature, we observed that online stores application integration on a Secured-tier VLAN offers an extended advantage over other schemes. In this regard, validating the overall online web architecture for optimality considering the secured-tier VLAN is the focus of this paper. A comparison as well as performance evaluation was carried out on OSC VLAN implementations yielding a satisfactory security measure on the part of end users, merchants and vendors, but showed no significant impact on the network utilization, throughput and queuing delays as similarity pattern was observed. We conclude that the security of OSC network can be improved through the logical isolation of users and the end servers in such designs. As such, a secured network with accepted performance metrics can drive any online application with little administrative overhead.
Keywords
Standards, Architecture, Security, Models, Evaluation, VLAN, Utilization, Throughput
Reference
[01] | Okafor, Anthony, Chinedu, “A Model for Online Service Process Computing; A Case for VLAN Online Shop Integration”, M.Sc Thesis, Department of Electrical and Electronic Engineering, Nnamdi Azikiwe University, Awka, Unpublished, 2014 |
[02] | A. Frier, P. Karlton and P. Kocher, “The SSL3.0 Protocol Version 3.0”, Available Online: http://home.netscape.com/eng/ssl3/ |
[03] | T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne, S. Lehtinen “SSH Protocol Architecture”, IETF Internet draft, work in progress, Jul. 2003. |
[04] | MasterCard International and Visa International, “Secure Electronic Transaction Specification, Version 1.0”, http://www.setco.org/, May 1997. |
[05] | R. Fielding et al., “Hypertext Transfer Protocol –HTTP/1.1”, RFC 2616, Jun. 1999. |
[06] | D. Wagner, B. Schneier, “Analysis of the SSL 3.0 protocol”, 2nd USENIX Workshop on Electronic Commerce, Nov. 1996. |
[07] | C. Coarfa, P. Druschel, D. Wallach, “Performance Analysis of TLS Web Servers”, Network and Distributed Systems Security Symposium ’02, San Diego, California, Feb. 2002. |
[08] | Okafor Nneka I.,Okafor K.C, Ugwoke F. N, Udeze,C.C “3-Tier E-ComP: A Novel E-Commerce Management Portal Based on Secured SDLC Approach”, Computing, Information Systems, Development Informatics & Allied Research Vol. 4 No. 4 December, 2013, Pp.1-11 |
[09] | Swapna Kodali, “The Design and Implementation of an E-Commerce Site For Online Book Sales”, M.Sc thesis for the Department of Computer and Information Sciences, Indiana University South Bend, May 2007 |
[10] | Han Zhang, “A Formal Security Modeling and Analysis in B2B e-commerce, A thesis submitted in partial fulfillment of the requirements of Doctor of Philosophy in Computer Science, University of Auckland July 2006, |
[11] | James Joshi, Walid G. Aref, Arif Ghafoor, and Eugene H. Spafford. Security models for web-based applications. Commun. ACM, 44(2):38–44, 2001. |
[12] | Zhongwei Zhang and Zhen Wang, “Assessing and Assuring Trust in E-Commerce Systems”, |
[13] | Minli Zhu, Mart Molle, “Design and Implementation of Application-based Secure VLAN”, |
[14] | Okafor K.C and Dr. T.A Nwaodo: “ A Synthesis VLAN Approach to Congestion Management in Datacenter internet Networks”, International Journal of Electronics and Telecommunication System Research, Volume 5, Number 6, May 2012 pp. 86 – 92, electroscopejournal.org/wa6.php or www.electroscopejournal.org.ng/j11t6.html. |
[15] | Xin Sun and Sanjay G. Rao, “A Cost-Benefit Framework for Judicious Enterprise Network Redesign”, In Proc. IEEE INFOCOM, 2011.pp.216-220 |
[16] | P. Garimella, Y.-W. E. Sung, N. Zhang, and S. Rao. Characterizing VLAN usage in an operational network. In ACM SIGCOMM workshop on Internet Network Management (INM’07), Kyoto, Japan, 2007. |
[17] | S. K. Sadhukhan and D. Saha. Auditing campus-wide local area networks (LANs) for Virtual LAN configurations using a simple network manager. Technical report, Indian Institute of Management (IIM). |
[18] | Okafor, K.C, Achumba I,Ezeh G.N,Diala, U.H, “ OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot”, (Accepted) |
[19] | P. Garimella, Y.-W. E. Sung, N. Zhang, and S. Rao. Characterizing VLAN usage in an operational network. In ACM SIGCOMM workshop on Internet Network Management (INM’07), Kyoto, Japan, 2007. |
[20] | Y.-W. E. Sung, S. G. Rao, G. G. Xie, and D. A. Maltz. Towards systematic design of enterprise networks. In Proc. of the ACM CoNEXT Conference, 2008. |
[21] | A. Mansy, M. B. Tariq, N. Feamster, and M. Ammar. Measuring VLAN-induced dependencies on a campus network. In Proc. ACM SIGCOMM IMC, 2009 |
[22] | K. Sripanidkulchai, C. Issariyapat, and K. Meesublak. Inference of network-wide VLAN usage in small enterprise networks. In Proc. of IEEE Workshop on Automated Network Management, 2008. |
[23] | Cisco. Understanding vlan trunk protocol (VTP). Online: document.http://www.cisco.com/application/pdf/paws/10558/21.pdf, 2007 |
[24] | Udeze C.C., Okafor K.C, C.C.Okezie, Okeke O., “Performance Evaluation of Openflow VLAN Strategy in DataCenter Switched Ethernet, African Journal of Computing & ICT, IEEE. Vol 6. No 2. September 2013. pp 63-72. Online: http://www.ajocict.net. |
[25] | C.C. Okezie, Okafor K.C, Udeze C.C “Open Flow Virtualization: a Declarative Infrastructure Optimization Scheme for High Performance Computing” Academic Research International, Vol.4, Number 4, July 2013, Pp. 232-244 |
[26] | Riverbed Modeler Academic Edition release17.5 PL6.https://splash.riverbed.com/.../riverbed-modeler-academic-edition-release, June 11, 2014 |