A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing

Service composition is a fundamental feature of pervasive computing middleware. It enables users to leverage available computing power by using existing services as building blocks for creating new composite services. In open and dynamic environments, service composition must be flexible enough to admit realization by different executable workflows that have similar functionalities but that present different partitions of tasks among available services. This flexibility, however, raises new privacy issues e.g., a single service performing all tasks of a workflow has access to more data than different services executing parts of the workflow. In this paper we propose a model that enables users to reason about the impact on privacy of executing a composite service. The model is based on an extension of Fuzzy Cognitive Maps, and considers the impact of the composition as a whole according to the partition of tasks. We introduce our extension called Fuzzy Cognitive Maps with Causality Feedback, describe how they can be used to model the relationship among different personal data and the privacy impact of their disclosure, and give an example of how the model can be applied to a composition scenario.

[1]  Valérie Issarny,et al.  COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support , 2007, J. Syst. Softw..

[2]  Philippe Golle,et al.  Revisiting the uniqueness of simple demographics in the US population , 2006, WPES '06.

[3]  Rino Falcone,et al.  A Fuzzy Approach to a Belief-Based Trust Computation , 2002, Trust, Reputation, and Security.

[4]  Jan H. P. Eloff,et al.  Separation of duties for access control enforcement in workflow environments , 2001, IBM Syst. J..

[5]  Amit P. Sheth,et al.  Enhancing Web Services Description and Discovery to Facilitate Composition , 2004, SWSWPC.

[6]  Robert O'Harrow,et al.  No place to hide , 1997, Science.

[7]  Bart Kosko,et al.  Fuzzy Cognitive Maps , 1986, Int. J. Man Mach. Stud..

[8]  Michael N. Vrahatis,et al.  A first study of fuzzy cognitive maps learning using particle swarm optimization , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[9]  Jiho Choi,et al.  Using fuzzy cognitive map for the relationship management in airline service , 2004, Expert Syst. Appl..

[10]  C. Carlsson,et al.  Adaptive Fuzzy Cognitive Maps for Hyperknowledge Representation in Strategy Formation Process , 1996 .

[11]  Masafumi Hagiwara Extended Fuzzy Cognitive Maps , 1994 .

[12]  Karl Perusich,et al.  Fuzzy cognitive maps for policy analysis , 1996, 1996 International Symposium on Technology and Society Technical Expertise and Public Decisions. Proceedings.

[13]  Wil M.P. van der Aalst,et al.  YAWL: yet another workflow language , 2005, Inf. Syst..

[14]  Munindar P. Singh,et al.  Service-Oriented Computing: Semantics, Processes, Agents , 2010 .

[15]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[16]  Bart Kosko,et al.  Virtual Worlds as Fuzzy Cognitive Maps , 1993, Presence: Teleoperators & Virtual Environments.

[17]  Bart Kosko,et al.  Neural networks and fuzzy systems: a dynamical systems approach to machine intelligence , 1991 .

[18]  Henrik Stormer,et al.  Modeling and Analyzing Separation of Duties in Workflow Environments , 2001, SEC.

[19]  James A. Hendler,et al.  Semi-automatic Composition ofWeb Services using Semantic Descriptions , 2003, WSMAI.

[20]  Ting Yu,et al.  An identifiability-based access control model for privacy protection in open systems , 2004, WPES '04.

[21]  Sunil Chandra,et al.  Orchestrating composite Web services under data flow constraints , 2005, IEEE International Conference on Web Services (ICWS'05).

[22]  Chrysostomos D. Stylios,et al.  Fuzzy Cognitive Maps in modeling supervisory control systems , 2000, J. Intell. Fuzzy Syst..