Hybrid Security Approach for Behavioural Privacy of Business Processes in a Cloud Environment

被引:0
|
作者
Abdmeziem, Farah [1 ]
Boukhedouma, Saida [1 ]
Oussalah, Mourad Chabane [2 ]
机构
[1] Univ Sci & Technol Houari Boumediene, LSI Lab, Algiers, Algeria
[2] Univ Nantes, LS2N Lab, Nantes, France
关键词
Business process; Security; Multi-Cloud environment; Obfuscation; Security annotation; Know-how privacy; Constraints; Process fragment; MODEL;
D O I
10.1007/978-3-031-37105-9_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Business processes are surely at the heart of companies but they are also the target of numerous security attacks, especially when using nowadays technologies like Cloud computing. Hence, ensuring business processes' security is one of the main concerns in both industry and research area. Securing a business process involves securing its three main aspects namely, the informational, the logical (behavioural), and the organisational aspect. While most of the works in the literature focus on the security of the informational aspect, Goettelmann et al. in [9] propose an obfuscation technique that aims to guarantee explicitly the security of the logical aspect of a business process i.e. persevering the privacy of the company's know-how expressed through the business process. This paper proposes an alternative solution to the obfuscation technique that is based on the strengths of this latter while addressing its identified limits. Our approach combines the ideas of the obfuscation technique and security annotations. The proposed solution is described via a metamodel that exhibits the main concepts it is based on, and a global functional architecture describing the principal steps of the solution, mainly a deployment configuration of the business process, meeting a set of defined constraints (and rules). A comparison between the obfuscation technique and our proposed approach according to security level and deployment costs is also illustrated, through examples.
引用
收藏
页码:271 / 289
页数:19
相关论文
共 50 条
  • [31] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [32] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [33] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [34] Data Security and Privacy in the Cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Samarati, Pierangela
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2019, 2019, 10993
  • [35] Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment
    Stewart Kirubakaran S.
    Arunachalam V.P.
    Karthik S.
    Kannan S.
    Computer Systems Science and Engineering, 2023, 44 (03): : 1881 - 1895
  • [36] Business Intelligence as a Service: a new approach to manage business processes in the Cloud
    Di Sano, Marco
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 155 - 160
  • [37] Security and privacy in business networking
    Sven Wohlgemuth
    Stefan Sackmann
    Noboru Sonehara
    A Min Tjoa
    Electronic Markets, 2014, 24 : 81 - 88
  • [38] Security and privacy in business networking
    Wohlgemuth, Sven
    Sackmann, Stefan
    Sonehara, Noboru
    Tjoa, A. Min
    ELECTRONIC MARKETS, 2014, 24 (02) : 81 - 88
  • [39] An autonomic approach to manage elasticity of business processes in the Cloud
    Mohamed, Mohamed
    Amziani, Mourad
    Belaid, Djamel
    Tata, Samir
    Melliti, Tarek
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 50 : 49 - 61
  • [40] A Correctness Checking Approach for Collaborative Business Processes in the Cloud
    Mo, Qi
    Wang, Yuqi
    Xiang, Jixiang
    Li, Tong
    COMPLEXITY, 2020, 2020