Hybrid Security Approach for Behavioural Privacy of Business Processes in a Cloud Environment

被引:0
|
作者
Abdmeziem, Farah [1 ]
Boukhedouma, Saida [1 ]
Oussalah, Mourad Chabane [2 ]
机构
[1] Univ Sci & Technol Houari Boumediene, LSI Lab, Algiers, Algeria
[2] Univ Nantes, LS2N Lab, Nantes, France
关键词
Business process; Security; Multi-Cloud environment; Obfuscation; Security annotation; Know-how privacy; Constraints; Process fragment; MODEL;
D O I
10.1007/978-3-031-37105-9_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Business processes are surely at the heart of companies but they are also the target of numerous security attacks, especially when using nowadays technologies like Cloud computing. Hence, ensuring business processes' security is one of the main concerns in both industry and research area. Securing a business process involves securing its three main aspects namely, the informational, the logical (behavioural), and the organisational aspect. While most of the works in the literature focus on the security of the informational aspect, Goettelmann et al. in [9] propose an obfuscation technique that aims to guarantee explicitly the security of the logical aspect of a business process i.e. persevering the privacy of the company's know-how expressed through the business process. This paper proposes an alternative solution to the obfuscation technique that is based on the strengths of this latter while addressing its identified limits. Our approach combines the ideas of the obfuscation technique and security annotations. The proposed solution is described via a metamodel that exhibits the main concepts it is based on, and a global functional architecture describing the principal steps of the solution, mainly a deployment configuration of the business process, meeting a set of defined constraints (and rules). A comparison between the obfuscation technique and our proposed approach according to security level and deployment costs is also illustrated, through examples.
引用
收藏
页码:271 / 289
页数:19
相关论文
共 50 条
  • [41] Cloud Security Ecosystem for Data Security and Privacy
    Arora, Akshay
    Khanna, Abhirup
    Rastogi, Anmol
    Agarwal, Amit
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 288 - 292
  • [42] A new approach to mitigate security threats in cloud environment
    Saadi, Chaimae
    Chaoui, Habiba
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [43] An Approach to Security-SLA in Cloud Computing Environment
    da Silva, Carlos Alberto
    de Geus, Paulo Licio
    2014 IEEE LATIN-AMERICA CONFERENCE ON COMMUNICATIONS (LATINCOM), 2014,
  • [44] A hybrid solution for privacy preserving medical data sharing in the cloud environment
    Yang, Ji-Jiang
    Li, Jian-Qiang
    Niu, Yu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 43-44 : 74 - 86
  • [45] A Review on Security Issues and their Impact on Hybrid Cloud Computing Environment
    Raza, Mohsin
    Imtiaz, Ayesha
    Shoaib, Umar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (03) : 353 - 357
  • [46] Survey on Security and Privacy Preserving Public Auditing for Content Storage in Cloud Environment
    Kumar, Arun K.
    Gnanadeepa, S.
    John, Hepzibha
    Janani, G. K.
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [47] Management of Security and Privacy Issues of Application Development in Mobile Cloud Environment: A Survey
    Lana, Debasish
    Bandyopadhyay, Debasis
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [48] A PRIVACY-PRESERVING STORAGE SECURITY FOR SPATIAL DATA IN DYNAMICS CLOUD ENVIRONMENT
    Sakthivel, S.
    Dhiyanesh, B.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [49] A Hybrid Approach to Enhance Data Security in Cloud Storage
    Udendhran, R.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [50] A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements
    Argyropoulos, Nikolaos
    Shei, Shaun
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Delaney, Aidan
    Fish, Andrew
    Gritzalis, Stefanos
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 4827 - 4836