2015 IEEE International Conference on Web Services 2015
DOI: 10.1109/icws.2015.80
|View full text |Cite
|
Sign up to set email alerts
|

Paving the Way towards Semi-automatic Design-Time Business Process Model Obfuscation

Abstract: Business process (BP) stakeholders want to enjoy the benefits of the cloud, but they are also reluctant to expose their BP models which express the know-how of their companies. To prevent such a know-how exposure, this paper proposes a designtime approach for transforming a BP model into BP fragments so that these BP fragments externalized in a multi-cloud context do not allow a cloud resource provider to understand a critical fragment of the company. While existing contributions on this topic remain at the le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(19 citation statements)
references
References 15 publications
0
19
0
Order By: Relevance
“…To support this process, several works [8][5][1] use separation constraints (separate(t i , t j )) for requiring a sensitive task t i and its complementing sensitive task t j to be assigned to different clouds. [5] proposes an algorithm for automating the generation of separation constraints which, if applied to our motivating example returns the following separation constraints 1 We use the BPMN (Business Process Modeling Notation (http://www.bpmn.org)) for modeling our BP models. In addition these process models are supposed to be well structured [12] • separate(AR, RR) Figure 2 describes a collaboration of BP fragments obtained by this splitting, each fragment being assigned to a different cloud, and the fragments being connected with send and receive messages.…”
Section: B Bp Obfuscation By Splitting Its Logicmentioning
confidence: 99%
See 1 more Smart Citation
“…To support this process, several works [8][5][1] use separation constraints (separate(t i , t j )) for requiring a sensitive task t i and its complementing sensitive task t j to be assigned to different clouds. [5] proposes an algorithm for automating the generation of separation constraints which, if applied to our motivating example returns the following separation constraints 1 We use the BPMN (Business Process Modeling Notation (http://www.bpmn.org)) for modeling our BP models. In addition these process models are supposed to be well structured [12] • separate(AR, RR) Figure 2 describes a collaboration of BP fragments obtained by this splitting, each fragment being assigned to a different cloud, and the fragments being connected with send and receive messages.…”
Section: B Bp Obfuscation By Splitting Its Logicmentioning
confidence: 99%
“…To observe the behavior of our risk metric, we have evaluated the risk of deploying a BP in the cloud with regards to three deployment approaches: 1) an aleatory distribution of tasks, 2) a distribution respecting the principle of assigning complementing sensitive tasks in different clouds (as introduced in [5] and summarized in section II-B, 3) a distribution as the previous one but extended with fake fragments as introduced in [1].…”
Section: Application and Experimentationsmentioning
confidence: 99%
“…For mitigating risks, the bank can obfuscate its BP by transforming its BP model using the principles and the methodology introduced in [14] and in [12] overviewed in the next section.…”
Section: A Motivating Examplementioning
confidence: 99%
“…In [12] we have proposed a design time approach for transforming a BP model into BP fragments, so that these BP fragments externalized in a multi-cloud context do not allow a cloud provider alone to understand a company know-how critical fragment.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation