Privacy-Preserving Behavioral Correctness Verification of Cross-Organizational Workflow With Task Synchronization Patterns

Workflow management technology has become a key means to improve enterprise productivity. More and more workflow systems are crossing organizational boundaries and may involve multiple interacting organizations. This article focuses on a type of loosely coupled workflow architecture with collaborative tasks, i.e., each business partner owns its private business process and is able to operate independently, and all involved organizations need to be synchronized at a certain point to complete certain public tasks. Because of each organization's privacy consideration, they are unwilling to share the business details with others. In this way, traditional correctness verification approaches via reachability analysis are not practical as a global business process model is unavailable for privacy preservation. To ensure its globally correct execution, this work establishes a correctness verification approach for the cross-organizational workflow with task synchronization patterns. Its core idea is to use local correctness of each suborganizational workflow process to guarantee its global correctness. We prove that the proposed approach can be used to investigate the behavioral property preservation when synthesizing suborganizational workflows via collaborative tasks. A medical diagnosis running case is used to illustrate the applicability of the proposed approaches.

[1]  MengChu Zhou,et al.  Modeling, Simulation, and Control of Flexible Manufacturing Systems - A Petri Net Approach , 1999, Series in Intelligent Control and Intelligent Automation.

[2]  MengChu Zhou,et al.  Preserving Languages and Properties in Stepwise Refinement-Based Synthesis of Petri Nets , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[3]  W. V. Der PROCESS-ORIENTED ARCHITECTURES FOR ELECTRONIC COMMERCE AND INTERORGANIZATIONAL WORKFLOW , 2000 .

[4]  MengChu Zhou,et al.  A hybrid methodology for synthesis of Petri net models for manufacturing systems , 1992, IEEE Trans. Robotics Autom..

[5]  Qingtian Zeng,et al.  Resource conflict detection and removal strategy for nondeterministic emergency response processes using Petri nets , 2016, Enterp. Inf. Syst..

[6]  MengChu Zhou,et al.  Interactive Petri Nets , 2013, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[7]  Wil M. P. van der Aalst,et al.  Business Process Management, Models, Techniques, and Empirical Studies , 2000 .

[8]  Qingtian Zeng,et al.  Modeling and Verification for Cross-Department Collaborative Business Processes Using Extended Petri Nets , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[9]  Cong Liu,et al.  Automatic Discovery of Behavioral Models From Software Execution Data , 2018, IEEE Transactions on Automation Science and Engineering.

[10]  Wolfgang Reisig Associative composition of components with double-sided interfaces , 2018, Acta Informatica.

[11]  Wil M. P. van der Aalst,et al.  Loosely coupled interorganizational workflows: : modeling and analyzing workflows crossing organizational boundaries , 2000, Inf. Manag..

[12]  Rong Su,et al.  Polynomial approach to optimal one-wafer cyclic scheduling of treelike hybrid multi-cluster tools via Petri nets , 2018, IEEE/CAA Journal of Automatica Sinica.

[13]  Qingtian Zeng,et al.  Cross-organizational collaborative workflow mining from a multi-source log , 2013, Decis. Support Syst..

[14]  Rik Eshuis,et al.  Constructing customized process views , 2008, Data Knowl. Eng..

[15]  MengChu Zhou,et al.  A Petri Net Approach to Analysis and Composition of Web Services , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[16]  Qingtian Zeng,et al.  A Two-Layered Framework for the Discovery of Software Behavior: A Case Study , 2018, IEICE Trans. Inf. Syst..

[17]  Cong Liu,et al.  Hierarchical Business Process Discovery: Identifying Sub-processes Using Lifecycle Information , 2020, 2020 IEEE International Conference on Web Services (ICWS).

[18]  Qingtian Zeng,et al.  Towards Comprehensive Support for Privacy Preservation Cross-Organization Business Process Mining , 2019, IEEE Transactions on Services Computing.

[19]  Jun Li,et al.  Collision-free scheduling of multi-bridge machining systems: a colored traveling salesman problem-based approach , 2018, IEEE/CAA Journal of Automatica Sinica.

[20]  Qingtian Zeng,et al.  Formulating the Data-Flow Modeling and Verification for Workflow: A Petri Net based Approach , 2014 .

[21]  Wil M. P. van der Aalst,et al.  Verification of Workflow Nets , 1997, ICATPN.

[22]  Boudewijn F. van Dongen,et al.  Component behavior discovery from software execution data , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).

[23]  Qingtian Zeng,et al.  Modeling and Analysis of Subway Fire Emergency Response: An Empirical Study , 2016 .

[24]  Jiujun Cheng,et al.  Automatic Composition of Semantic Web Services Based on Fuzzy Predicate Petri Nets , 2015, IEEE Transactions on Automation Science and Engineering.

[25]  Jiujun Cheng,et al.  Time Performance Optimization and Resource Conflicts Resolution for Multiple Project Management , 2016, IEICE Trans. Inf. Syst..

[26]  Qingtian Zeng,et al.  E-Net Modeling and Analysis of Emergency Response Processes Constrained by Resources and Uncertain Durations , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[27]  Qingtian Zeng,et al.  Invariant Decomposition Conditions for Petri Nets Based on the Index of Transitions , 2012 .

[28]  Nikolay Mehandjiev,et al.  Privacy-Aware Business Processes Modeling Notation (PrvBPMN) in the Context of Distributed Mobile Applications , 2013 .

[29]  Changjun Jiang,et al.  Refinement of Petri Nets in Workflow Integration , 2006, CSCWD.

[30]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[31]  Peter Linz,et al.  An Introduction to Formal Languages and Automata , 1997 .

[32]  Qingtian Zeng,et al.  Petri Net Based Data-Flow Error Detection and Correction Strategy for Business Processes , 2020, IEEE Access.

[33]  Jacques Wainer,et al.  Proclets: A Framework for Lightweight Interacting Workflow Processes , 2001, Int. J. Cooperative Inf. Syst..

[34]  James L. Peterson,et al.  Petri Nets , 1977, CSUR.

[35]  Cong Liu,et al.  Petri Net Based Modeling and Correctness Verification of Collaborative Emergency Response Processes , 2016 .

[36]  Wolfgang Reisig,et al.  Petri Nets , 1985, EATCS Monographs on Theoretical Computer Science.

[37]  Qingtian Zeng,et al.  Refinement-Based Hierarchical Modeling and Correctness Verification of Cross-Organization Collaborative Emergency Response Processes , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[38]  Hua Duan,et al.  Petri Net Based Behavior Description of Cross-Organization Workflow with Synchronous Interaction Pattern , 2014 .

[39]  Chungang Yan,et al.  Detecting Data Inconsistency Based on the Unfolding Technique of Petri Nets , 2017, IEEE Transactions on Industrial Informatics.

[40]  Maria E. Orlowska,et al.  Analyzing Process Models Using Graph Reduction Techniques , 2000, Inf. Syst..

[41]  Akhil Kumar,et al.  XRL/Woflan: Verification and Extensibility of an XML/Petri-Net-Based Language for Inter-Organizational Workflows , 2004, Inf. Technol. Manag..

[42]  Da Ruan,et al.  Integrating data envelopment analysis and analytic hierarchy for the facility layout design in manufacturing systems , 2006, Inf. Sci..

[43]  Samir Tata,et al.  The view-based approach to dynamic inter-organizational workflow cooperation , 2006, Data Knowl. Eng..

[44]  Johann Eder,et al.  Privacy Preservation Through Process Views , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[45]  MengChu Zhou,et al.  Design and implementation of a petri net based supervisor for a flexible manufacturing system , 1992, Autom..

[46]  Wil M. P. van der Aalst,et al.  The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..

[47]  Spyros Reveliotis Real-time management of resource allocation systems : a discrete event systems approach , 2004 .

[48]  Karama Kanoun,et al.  Construction and stepwise refinement of dependability models , 2004, Perform. Evaluation.

[49]  Maria E. Orlowska,et al.  Facilitating cross-organisational workflows with a workflow view approach , 2004, Data Knowl. Eng..

[50]  Nikolay Mehandjiev,et al.  Modeling of privacy-aware business processes in BPMN to protect personal data , 2014, SAC.

[51]  Qingtian Zeng,et al.  A Package Reduction Approach To Modeling and Analysis of Cross-Organization Emergency Response Processes With Privacy Protected , 2018, IEEE Access.

[52]  Qingtian Zeng,et al.  Top-Down Process Mining From Multi-Source Running Logs Based on Refinement of Petri Nets , 2020, IEEE Access.