[vc_empty_space][vc_empty_space]
Web Services Security and Threats: A Systematic Literature Review
Setyawan E.A.a, Hidayat F.a
a Smart City and Community Innovation Center (SCCIC), School of Electrical Engineering and Informatics Institut Teknologi Bandung, Bandung, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2020 IEEE.Privacy and data protection issues are the main problems in using web services to transmit data. Three aspects of information security that contains confidentiality, integrity, and availability need to be considered in maintaining web service security. Data sent by data providers can be easily attacked, resulting in data leaks when the data traffic process. Privacy data such as personal information and location data providers are sensitive data and need to be protected from unauthorized parties to avoid improper use of data. Also, data sent via the web service must be guaranteed that data is not changed by unauthorized persons in the data transmission process, because attacks that result in data changes can occur when the data has not yet arrived at the data recipient. The web service system must also ensure that data can always be available when needed. However, various attacks can be carried out to inhibit or stop the availability of this data. Therefore, we conducted a systematic literature review which aims to review and present some observation that has been done on existing research on web services security. Based on the results of our literature review, the secure coding method can be an available security solution. However, this method needs further development if it is applied to web services with the REST architecture which is currently being widely used.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Literature reviews,Personal information,Security solutions,Systematic literature review,Various attacks,Web service security,Web service systems,Web services security[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]attack,REST,security,SLR,SOAP,systematic literature review,vulnerability,web services[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICISS50791.2020.9307569[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]