ABSTRACT
Many cloud providers offer on demand applications as BPaaS "Business Process as a Service" through multi-tenant cloud platforms, allowing many companies to outsource their business processes. That is, an increasing amount of personal data involved in business processes is automatically gathered and stored on the cloud. For cost saving, some fragments of business processes can be reused i.e., shared between the clients on the cloud regardless of privacy risks. In this paper, we propose an anonymization-based approach to preserve the client business activity while sharing process fragments between organizations on the cloud.
- T. Anstett, F. Leymann, R. Mietzner, and S. Strauch. Towards bpel in the cloud: Exploiting different delivery models for the execution of business processes. IEEE Congress on Services, pages 670--677, 2009. Google ScholarDigital Library
- L. Baresi, A. Maurino, and S. Modafferi. Towards distributed bpel orchestrations. ECEASST, 3, 2006.Google Scholar
- C. Beeri, A. Eyal, S. Kamenkovich, and T. Milo. Querying business processes. VLDB, pages 343--354, 2006. Google ScholarDigital Library
- M. Bentounsi, S. Benbernou, and M. J. Atallah. Privacy-preserving business process outsourcing. ICWS 2012, 2012. Google ScholarDigital Library
- A. Campan and T. Truta. Data and structural k-anonymity in social networks. PinKDD, pages 33--54, 2009. Google ScholarDigital Library
- F. Dölitzscher, C. Reich, and A. Sulistio. Designing cloud services adhering to government privacy laws. CIT, pages 930--935, 2010. Google ScholarDigital Library
- A. Friedman, R. Wolff, and A. Schuster. Providing k-anonymity in data mining. VLDB J, 17(4):789--804, 2008. Google ScholarDigital Library
- A. Halevy. Answering queries using views: A survey. VLDB J, 10(4):270--294, 2001. Google ScholarDigital Library
- J. Hu and A. Klein. A benchmark of transparent data encryption for migration of web applications in the cloud. DASC, 2009. Google ScholarDigital Library
- X. Huang, Y. He, H. Yifan, L. Li, L. Sun, S. Zhang, Y. Jiang, and T. Zhang. Privacy of value-added context-aware service cloud. CloudCom, pages 547--552, 2009. Google ScholarDigital Library
- D. Ivanovic, M. Carro, and M. Hermenegildo. Automatic fragment identification in workflows based on sharing analysis. ICSOC, pages 350--364, 2010.Google ScholarCross Ref
- A. Jansen, W. Cloud hooks: Security and privacy issues in cloud computing. HICSS-44, pages 1--10, 2011. Google ScholarDigital Library
- M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono. On technical security issues in cloud computing. IEEE CLOUD, pages 109--116, 2009. Google ScholarDigital Library
- R. Khalaf and F. Leymann. E role-based decomposition of business processes using bpel. ICWS, pages 770--780, 2006. Google ScholarDigital Library
- R. McNeill. The evolution of business process as a service (bpaas). Saugatuck Technology Inc., October 2010.Google Scholar
- N. Mohammed, B. C. M. Fung, K. Wang, and P. C. K. Hung. Privacy-preserving data mashup. EDBT, pages 228--239, 2009. Google ScholarDigital Library
- M. P. Papazoglou. Cloud blueprints for integrating and managing cloud federations. Software Service and Application Engineering, pages 102--119, 2012. Google ScholarDigital Library
- S. Pearson, Y. Shen, and M. Mowbray. A privacy manager for cloud computing. CloudCom, pages 90--106, 2009. Google ScholarDigital Library
- P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng., 13(6):1010--1027, 2001. Google ScholarDigital Library
- D. Schumm, D. Dentsas, M. Hahn, D. Karastoyanova, F. Leymann, and M. Sonntag. Web service composition reuse through shared process fragment libraries. ICWE, 2012. Google ScholarDigital Library
- R. Uba, M. Dumas, L. García-Bañuelos, and M. La Rosa. Clone detection in repositories of business process models. BPM, pages 248--264, 2011. Google ScholarDigital Library
- H. Yaish, M. Goyal, and G. Feuerlicht. A novel multi-tenant architecture design for software as a service applications. CLOSER, pages 82--88, 2012.Google Scholar
Index Terms
- Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS
Recommendations
Towards a Stakeholder-Oriented Taxonomical Approach for Secure Cloud Computing
CLOUD '13: Proceedings of the 2013 IEEE Sixth International Conference on Cloud ComputingThe emerging paradigm of cloud computing (CC) arises security risks that adversely impact its different stakeholders. The widespread deployment and service models of CC in addition to the wide variety of stakeholders make it difficult to guarantee ...
A semantic model for business process patterns to support cloud deployment
Interest in cloud computing has steadily increased in the last few years, with new services continuously being introduced into the IT market by cloud vendors. Research efforts have been made to understand how business requirements can be mapped to cloud ...
STRATModel: Elasticity Model Description Language for Evaluating Elasticity Strategies for Business Processes
On the Move to Meaningful Internet Systems. OTM 2017 ConferencesAbstractNowadays, Cloud Computing is receiving more and more attention from IT companies as a new computing paradigm for executing and handling their Business Processes in an efficient and cost-effective way. One of the most important features behind this ...
Comments