{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T17:16:26Z","timestamp":1756574186146},"reference-count":30,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,1]]},"abstract":"<p>Cloud computing technology has opened an avenue to meet the critical need to securely share distributed resources and web services, and especially those that belong to clients who have sensitive data and applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from the nature of distributed Web-based technology architecture and infrastructure. One of the key concerns is security logic, which is scattered and tangled across all the cloud service layers. In addition, maintenance and modification of the security aspect is a difficult task. Therefore, cloud services need to be extended by enriching them with features to support adaptation so that these services can become better structured and less complex. Aspect-oriented programming is the right technical solution for this problem as it enables the required separation when implementing security features without the need to change the core code of the server or client in the cloud. Therefore, this article proposes a Runtime Reusable Weaving Model for weaving security-related crosscutting concerns through layers of cloud computing architecture. The proposed model does not require access to the source code of a cloud service and this can make it easier for the client to reuse the needed security-related crosscutting concerns. The proposed model is implemented using aspect orientation techniques to integrate cloud security solutions at the software-as-a-service layer.<\/p>","DOI":"10.4018\/ijwsr.2018010104","type":"journal-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T17:36:25Z","timestamp":1512063385000},"page":"71-88","source":"Crossref","is-referenced-by-count":8,"title":["Runtime Reusable Weaving Model for Cloud Services Using Aspect-Oriented Programming"],"prefix":"10.4018","volume":"15","author":[{"given":"Anas M.R.","family":"Alsobeh","sequence":"first","affiliation":[{"name":"Department of CIS, Faculty of IT, Yarmouk University, Irbid, Jordan"}]},{"given":"Aws Abed Al Raheem","family":"Magableh","sequence":"additional","affiliation":[{"name":"Department of CIS, Faculty of IT, Yarmouk University, Irbid, Jordan"}]},{"given":"Emad M.","family":"AlSukhni","sequence":"additional","affiliation":[{"name":"Department of CIS Yarmouk University, Irbid, Jordan"}]}],"member":"2432","reference":[{"issue":"2","key":"IJWSR.2018010104-0","first-page":"202","article-title":"Securing the Cloud: Threats, Attacks and Mitigation Techniques. Journal of Advanced Computer Science &","volume":"3","author":"M. M.Alani","year":"2014","journal-title":"Technology"},{"key":"IJWSR.2018010104-1","unstructured":"Wikipedia. (n.d.). Apache Axis. Retrieved August 2016 from https:\/\/en.wikipedia.org\/wiki\/Apache_Axis"},{"issue":"2","key":"IJWSR.2018010104-2","first-page":"141","article-title":"Cloud Computing Security Issues.","volume":"1","author":"A.Asma","year":"2012","journal-title":"International Journal of Application or Innovation in Engineering & Management"},{"key":"IJWSR.2018010104-3","author":"T. M.Axis","year":"2016"},{"key":"IJWSR.2018010104-4","first-page":"209","article-title":"Improving Design Patterns Modularity Using Aspect Orientation.","volume":"2005","author":"M. L.Bernardi","year":"2005","journal-title":"STEP"},{"key":"IJWSR.2018010104-5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"IJWSR.2018010104-6","unstructured":"Hmida, M. M. B., Tomaz, R. F., & Monfort, V. (2005, August). Applying AOP concepts to increase web services flexibility. In Proceedings of the International Conference on Next Generation Web Services Practices NWeSP \u201905 (p. 6). IEEE."},{"key":"IJWSR.2018010104-7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEET.2012.6203873"},{"key":"IJWSR.2018010104-8","doi-asserted-by":"publisher","DOI":"10.1109\/SPLINE.2007.12"},{"key":"IJWSR.2018010104-9","doi-asserted-by":"crossref","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., & Griswold, W. G. (2001, June). An overview of AspectJ. In Proceedings of theEuropean Conference on Object-Oriented Programming (pp. 327-354). Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-45337-7_18"},{"key":"IJWSR.2018010104-10","doi-asserted-by":"crossref","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J. M., & Irwin, J. (1997). Aspect-oriented programming. In ECOOP'97\u2014Object-oriented programming (pp. 220-242).","DOI":"10.1007\/BFb0053381"},{"key":"IJWSR.2018010104-11","author":"R. L.Krutz","year":"2010","journal-title":"Cloud security: A comprehensive guide to secure cloud computing"},{"key":"IJWSR.2018010104-12","unstructured":"Lee, J., Kang, S., & Hur, S. J. (2012, February). Web-based development framework for customizing Java-based business logic of SaaS application. In Proceedings of the 2012 14th International Conference on Advanced Communication Technology (ICACT) (pp. 1310-1313). IEEE."},{"key":"IJWSR.2018010104-13","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960285"},{"key":"IJWSR.2018010104-14","author":"A.Look","year":"2011","journal-title":"Expressive scoping and pointcut mechanisms for aspect-oriented web service composition"},{"key":"IJWSR.2018010104-15","doi-asserted-by":"crossref","unstructured":"Masuhara, H., & Kiczales, G. (2003, July). Modeling crosscutting in aspect-oriented mechanisms. In European Conference on Object-Oriented Programming (pp. 2-28). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-45070-2_2"},{"key":"IJWSR.2018010104-16","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2011.67"},{"key":"IJWSR.2018010104-17","doi-asserted-by":"publisher","DOI":"10.1145\/2577080.2577090"},{"key":"IJWSR.2018010104-18","unstructured":"Ramachandran, R., Pearce, D. J., & Welch, I. (2006). AspectJ for multilevel security. Bonn, Germany, March, 20, 13-17.\u200f"},{"key":"IJWSR.2018010104-19","unstructured":"Rao, T. N., Kumar, A., Sunder, S. S., & Chandrasekaran, K. (2013). Performance Analysis of Aspect Oriented Programming for Cloud Service Monitoring."},{"key":"IJWSR.2018010104-20","unstructured":"Razzaq Malik, K., Umar Chaudhry, M., Munwar Iqbal, M., Saleem, Y., & Farhan, M. (2014). Data Security and Privacy in Cloud Computing: Threat Level Indications. Science International, 26(5)."},{"key":"IJWSR.2018010104-21","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1109\/DISCEX.2003.1194952","article-title":"An aspect-oriented security framework. In DARPA Information Survivability Conference and Exposition","volume":"2","author":"V.Shah","year":"2003","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition"},{"key":"IJWSR.2018010104-22","unstructured":"Shahin, A. A., Samir, A., & Khamis, A. (2014). An Aspect-Oriented Approach for SaaS Application Customization. arXiv:1409.1656"},{"key":"IJWSR.2018010104-23","unstructured":"Shahin, A. A., Samir, A., & Khamis, A. (2014). An Aspect-Oriented Approach for SaaS Application Customization. arXiv:1409.1656"},{"key":"IJWSR.2018010104-24","year":"2016"},{"key":"IJWSR.2018010104-25","doi-asserted-by":"publisher","DOI":"10.1145\/2451436.2451456"},{"key":"IJWSR.2018010104-26","unstructured":"Verspecht, D., Vanderperren, W., Suv\u00e9e, D., & Jonckers, V. (2003). JasCo .NET: Unraveling Crosscutting Concerns in .NET Web Services. Vrije Universiteit Brussel."},{"key":"IJWSR.2018010104-27","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00182"},{"key":"IJWSR.2018010104-28","doi-asserted-by":"publisher","DOI":"10.1145\/2184512.2184581"},{"key":"IJWSR.2018010104-29","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"}],"container-title":["International Journal of Web Services Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=193862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T15:50:35Z","timestamp":1651852235000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJWSR.2018010104"}},"subtitle":["The Security-Related Aspect"],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijwsr.2018010104","relation":{},"ISSN":["1545-7362","1546-5004"],"issn-type":[{"value":"1545-7362","type":"print"},{"value":"1546-5004","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}