skip to main content
10.1145/2347673.2347682acmotherconferencesArticle/Chapter ViewAbstractPublication Pagescloud-iConference Proceedingsconference-collections
research-article

Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS

Published:31 August 2012Publication History

ABSTRACT

Many cloud providers offer on demand applications as BPaaS "Business Process as a Service" through multi-tenant cloud platforms, allowing many companies to outsource their business processes. That is, an increasing amount of personal data involved in business processes is automatically gathered and stored on the cloud. For cost saving, some fragments of business processes can be reused i.e., shared between the clients on the cloud regardless of privacy risks. In this paper, we propose an anonymization-based approach to preserve the client business activity while sharing process fragments between organizations on the cloud.

References

  1. T. Anstett, F. Leymann, R. Mietzner, and S. Strauch. Towards bpel in the cloud: Exploiting different delivery models for the execution of business processes. IEEE Congress on Services, pages 670--677, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Baresi, A. Maurino, and S. Modafferi. Towards distributed bpel orchestrations. ECEASST, 3, 2006.Google ScholarGoogle Scholar
  3. C. Beeri, A. Eyal, S. Kamenkovich, and T. Milo. Querying business processes. VLDB, pages 343--354, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Bentounsi, S. Benbernou, and M. J. Atallah. Privacy-preserving business process outsourcing. ICWS 2012, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Campan and T. Truta. Data and structural k-anonymity in social networks. PinKDD, pages 33--54, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Dölitzscher, C. Reich, and A. Sulistio. Designing cloud services adhering to government privacy laws. CIT, pages 930--935, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Friedman, R. Wolff, and A. Schuster. Providing k-anonymity in data mining. VLDB J, 17(4):789--804, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Halevy. Answering queries using views: A survey. VLDB J, 10(4):270--294, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Hu and A. Klein. A benchmark of transparent data encryption for migration of web applications in the cloud. DASC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Huang, Y. He, H. Yifan, L. Li, L. Sun, S. Zhang, Y. Jiang, and T. Zhang. Privacy of value-added context-aware service cloud. CloudCom, pages 547--552, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Ivanovic, M. Carro, and M. Hermenegildo. Automatic fragment identification in workflows based on sharing analysis. ICSOC, pages 350--364, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  12. A. Jansen, W. Cloud hooks: Security and privacy issues in cloud computing. HICSS-44, pages 1--10, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono. On technical security issues in cloud computing. IEEE CLOUD, pages 109--116, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Khalaf and F. Leymann. E role-based decomposition of business processes using bpel. ICWS, pages 770--780, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. McNeill. The evolution of business process as a service (bpaas). Saugatuck Technology Inc., October 2010.Google ScholarGoogle Scholar
  16. N. Mohammed, B. C. M. Fung, K. Wang, and P. C. K. Hung. Privacy-preserving data mashup. EDBT, pages 228--239, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. P. Papazoglou. Cloud blueprints for integrating and managing cloud federations. Software Service and Application Engineering, pages 102--119, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Pearson, Y. Shen, and M. Mowbray. A privacy manager for cloud computing. CloudCom, pages 90--106, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng., 13(6):1010--1027, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Schumm, D. Dentsas, M. Hahn, D. Karastoyanova, F. Leymann, and M. Sonntag. Web service composition reuse through shared process fragment libraries. ICWE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Uba, M. Dumas, L. García-Bañuelos, and M. La Rosa. Clone detection in repositories of business process models. BPM, pages 248--264, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. H. Yaish, M. Goyal, and G. Feuerlicht. A novel multi-tenant architecture design for software as a service applications. CLOSER, pages 82--88, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        Cloud-I '12: Proceedings of the 1st International Workshop on Cloud Intelligence
        August 2012
        59 pages
        ISBN:9781450315968
        DOI:10.1145/2347673

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 August 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Cloud-I '12 Paper Acceptance Rate8of15submissions,53%Overall Acceptance Rate12of23submissions,52%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader