1 / 27

Online Library Remote Access Through Proxy Server

Online Library Remote Access Through Proxy Server. Student: Paruyr Hovakimyan Supervisor: Albert Minasyan Referee: Aram Hajian. Abstract.

devon
Download Presentation

Online Library Remote Access Through Proxy Server

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Online Library Remote Access Through Proxy Server Student: Paruyr Hovakimyan Supervisor: Albert Minasyan Referee: Aram Hajian

  2. Abstract • The purpose of “Online Library Remote Access through Proxy Server” project is to build the web application which will allow to login into the application with given username and password and access online repositories with IP restrictions. • This project was initiated by American University of Armenia in order to let the students and faculty members to use library materials from abroad of campus.

  3. Table of Content • Introduction • Problem description and research • Detailed description of the problem • Research • Implementation • Components • Security • Conclusion • Suggestions for Future Work • References

  4. Introduction IP Cont rol AUA E-References ACM AGORA EBSCO Allowed User in AUA Rejected 2 User abroad AUA Authentication AUA Proxy Server ACM EBSCO AGORA

  5. Problem description and research • Detailed description of the problem • Requirements • Research • Solutions

  6. Detailed description of the problem Consider following situations • Scenario 1 • medical-school professor takes up a practice in a university-affiliated clinic needs to access BioMed web site • Scenario 2 • During vacation professor wants to do research and needs to access Oxford English Dictionary • Scenario 3 • Number of students wants to access library online materials from home

  7. AUA prescribed the problem (Requirements) AUA stated following requirements • To have the system which will give the access to bought virtual libraries from anywhere to all students and faculty • The system will work on existing Sun Fireware hardware with Solaris 10 operating system installed on it • There should not be any client-side installation or setup to work with the system • The system should be less expensive and use well known technologies to simplify further development and management

  8. Research • Possible solutions to the problem • VPN Access • Proxy Servers • Pass-Through Proxy Servers

  9. VPN Access

  10. Proxy Servers

  11. Pass-Through Proxy Servers

  12. Why Pass-Through Proxy Strategy • No client side configuration • Easy to manage • Needs less human resources to maintain • Easy to integrate new services • Easy to use

  13. Pass-Through Proxy Strategy Implementations Most known pass-through proxy strategy implementations • EZProxy • LibProxy

  14. EZProxy • Commercial product • Proxy Server with URL rewriting tool • With own user and host database • With own authentication mechanism • Possibility to integrate with Java • Possible to setup in known operating systems(Windows, Unix, Solaris, etc.)

  15. LibProxy • Free open source product • Possible to integrate with MySQL database and LDAP server • Configurable to work on port base and host base strategy (http://avsl.aua.am:2050, http://2050.avsl.aua.am ) • Possible to setup on limited operating servers (Unix, Solaris) • Needs Apache server with perl module

  16. Decision (EZProxy) Comparing two products EZProxy was chosen because: • Unlike EZProxy which is simple to install, LibProxy require a lot of preinstalled packages to be in OS • EZProxy has very good installation and usage guides • Since EZProxy is commercial product it has good maintenance and support • There are number of publications that advice EZProxy to use as one of the stabile pass-through proxy server • EZProxy works as stand alone application

  17. Implementation

  18. Components • Application • E-science-library (which during setup in AUA was named Armenian Virtual Science Library(AVSL)) • DataBase • MySQL • Authentication • Open LDAP Server • Web/EJB container • Sun Java System Application Server

  19. AVSL Web Pages Navigation Work Flow

  20. Request flow chart

  21. Forwarding mechanism • EZCGIServlet String forwardUrl = ezproxyUrl + "/login?user=“ + URLEncoder.encode(user, "UTF-8“) + "&ticket=“+URLEncoder.encode(getKeyedDigest(ezproxyKey + user + timestamp)+ timestamp, "UTF-8") + "&qurl=" + URLEncoder.encode(url, "UTF-8");

  22. Security • Only users with valid session access the EZCGIServlet • http://avsl.aua.am/AVSL /ezcgi?user=username&url=http://www.bl.uk • Double checking • ECGI Servlet sends a ticket to EZProxy with MD5. • EZProxy receives the ticket (the user name, time stamp) it recalculates the message digest and compare it with the ticket. • Request is valid only if the two are identical

  23. Successful opened ACM portal

  24. Conclusion • Possibility to purchase the expensive licenses and provide them freely to the students, faculty • AVSL uses Directory Server for authenticating users • Which make administration easier • The System uses strong security mechanism to check and give appropriate role to logged in user • AVSL System uses EZProxy server for accessing the publishers’ resources • No need for clients to do any configuration

  25. Suggestions for Future Work • Full integration with EZProxy • The ability to synchronize needed virtual hosts between System and EZProxy hosts list • The ability to synchronize users between LDAP System and EZProxy users list • Add different services, such as enhanced searching capabilities, digital library control systems, etc. into AVSL platform.

  26. References • [1] Jalal B Raouf, “Design of Iraqi Virtual Science Library”, 2007. • URL: http://e-science-library.dev.java.net • [2] AlbamaSuperComputer Authority, “Alabama Virtual Library • (AVL)”, 2000. URL: http://www.avl.lib.al.us/about/index.html • [3] URL: http://www.who.int/hinari/about/en/ • [4] URL: http://www.aginternetwork.org/en/about.php • [5] URL: http://portal.acm.org • [6] URL: https://www.ivsl.org • [7] By Jayson Falkner (et. al.), “Servlets and JavaServer Pages™: The J2EE™ Technology Web Tier”, Addison Wesley, United State of America, September 19, 2003. • [8] By Bruce W. Perry, “Java Servlet & JSP Cookbook”, O'Reilly Media Inc., United States of America, January 2004.  [10] NetBeans(IDE) help contents.

  27. Thank YOU!

More Related