Skip to main content

Exploiting Metadata for Intelligent and Secure JSON REST API Services

  • Conference paper
  • First Online:
Proceedings of World Conference on Information Systems for Business Management (ISBM 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 833))

Included in the following conference series:

  • 77 Accesses

Abstract

As data sources are dynamically growing and as they become widely available from cloud servers, application programs actively access the data sources. Cloud servers run on REST APIs, which can then be requested by applications to leverage data. It is likely that the data can be transmitted to applications in a JSON format from a cloud API server. However, the cloud server may not serve databases efficiently to the requests if JSON data requests are overwhelming. Its service may not be intelligent to form a JSON data, or it may not preserve private data from unauthorized JSON data requests. This paper proposes (1) privately authorized JSON data generation by using either database states of metadata or by partial-order relations among data states, and (2) efficient JSON data generation by observing the auxiliary from the previously requested requests. The contribution of this paper includes intelligent and secure JSON data services that can protect data and predict a JSON request before it is requested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Psaras I, Rene S, Katsaros K, Sourlas V, Pavlou G, Bezirgiannidis N, Diamantopoulos S, Komnios I, Tsaoussidis V (2016) Keyword-based mobile application sharing. In: Proceedings of the workshop on mobility in the evolving internet architecture, pp 1–6

    Google Scholar 

  2. Gawande A, Clark J, Coomes D, Wang L (2016) Decentralized and secure multimedia sharing application over named data networking. In: Proceedings of the 6th ACM conference on information-centric networking, pp 19–29

    Google Scholar 

  3. Namee K, Phoarun R, Albadrani G, Polpinij J (2019) A form and API data management platform for progressive web application and serverless application architecture. In: Proceedings of the 2nd international conference on computational intelligence and intelligent systems, pp 144–149

    Google Scholar 

  4. Godefroid P, Huang B, Polishchuk M (2020) Intelligent REST API data fuzzing. In: Proceedings of the 28th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, pp 725–736

    Google Scholar 

  5. Cleveland S, Jamthe A, Padhy S, Stubbs J, Packard M (2020) Tapis API development with Python: best practices in scientific REST API implementation: experience implementing a distributed stream API. In: Practice and experience in advanced research computing, pp 181–187

    Google Scholar 

  6. Sohan S, Anslow C, Maurer F (2017) Automated example oriented REST API documentation at Cisco. In: Proceedings of the 39th international conference on software engineering: software engineering in practice track, pp 213–222

    Google Scholar 

  7. Wilde E (2018) Surfing the API web: web concepts. In: Proceedings of the web conference WWW’18, pp 797–803

    Google Scholar 

  8. Pezoa F, Reutter J, Suarez F (2016) Foundations of JSON schema. In: Proceedings of the 25th international conference on world wide web, pp 263–273

    Google Scholar 

  9. JSON web tokens. https://jwt.io/. Accessed 5 June 2023

  10. OWASP. https://cheatsheetseries.owasp.org/cheatsheets/JSON_Web_Token_for_Java_Cheat_Sheet.html. Accessed 5 June 2023

  11. Mior M (2023) Relational playground: teaching the duality of relational algebra and SQL. In: Proceedings of the 2nd workshop on data systems education: bridging education practice with education research, pp 56–58

    Google Scholar 

  12. Feng F, He X, Liu Y, Nie L, Chua T (2018) Learning on partial-order hypergraphs. In: Proceedings of the 2018 world wide web conference, pp 1523–1532

    Google Scholar 

  13. Rabiner L, Juang B (1986) An introduction to hidden Markov models. In: IEEE ASSP magazine

    Google Scholar 

  14. Rabiner L (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77:257–286

    Article  Google Scholar 

  15. Bar El O, Milo T, Somech S (2020) Automatically generating data exploration sessions using deep reinforcement learning. In: Proceedings of the 2020 ACM SIGMOD international conference on management of data, pp 1527–1537

    Google Scholar 

Download references

Acknowledgements

This research was supported in part by a National Centers of Academic Excellence in Cybersecurity grant (H98230-22-1-0256), which is part of the National Security Agency (NSA). Any findings, conclusions or recommendations expressed in this research are those of the author and do not necessarily reflect the views of the sponsor.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John Yoon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yoon, J. (2024). Exploiting Metadata for Intelligent and Secure JSON REST API Services. In: Iglesias, A., Shin, J., Patel, B., Joshi, A. (eds) Proceedings of World Conference on Information Systems for Business Management. ISBM 2023. Lecture Notes in Networks and Systems, vol 833. Springer, Singapore. https://doi.org/10.1007/978-981-99-8346-9_12

Download citation

Publish with us

Policies and ethics