Partitioning and Cloud Deployment of Composite Web Services under Security Constraints

In this paper, we propose an approach for deploying business processes on the cloud supporting security constraints, thereby ensuring sensitive data exchange. This approach uses partitionning techniques for fulfilling security requirements and optimizing communication costs. The partitions are deployed independently on different cloud platforms. Subsequently, these partitions depend on message exchange synchronization, which defines our choreography on the cloud. Moreover, we consider additional requirements related to data-dependencies and Quality of Service (QoS) disparities to optimize the execution of the outsourced process. Our approach is motivated by an insurance case study and implemented within an open source cloud platform.

[1]  Claude Godart,et al.  Toward synchronization between decentralized orchestrations of composite web services , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[2]  Marlon Dumas,et al.  Heuristics for composite Web service decentralization , 2014, Software & Systems Modeling.

[3]  Gerhard Weikum,et al.  The Mentor project: steps towards enterprise-wide workflow management , 1996, Proceedings of the Twelfth International Conference on Data Engineering.

[4]  Gerhard J. Woeginger,et al.  The Quadratic Assignment Problem with a Monotone Anti-Monge and a Symmetric Toeplitz Matrix: Easy and Hard Cases , 1996, IPCO.

[5]  Angélica Caro,et al.  A BPMN Extension for Including Data Quality Requirements in Business Process Modeling , 2012, BPMN.

[6]  Bernd Freisleben,et al.  Greedy and Local Search Heuristics for Unconstrained Binary Quadratic Programming , 2002, J. Heuristics.

[7]  Marlon Dumas,et al.  Optimized decentralization of composite web services , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[8]  Sunil Chandra,et al.  Orchestrating composite Web services under data flow constraints , 2005, IEEE International Conference on Web Services (ICWS'05).

[9]  Paul Watson A multi-level security model for partitioning workflows over federated clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[10]  Claude Godart,et al.  A Flexible Approach for Automatic Process Decentralization Using Dependency Tables , 2009, 2009 IEEE International Conference on Web Services.

[11]  Stefan Tai,et al.  Cloud Computing - Web-Based Dynamic IT Services , 2011 .

[12]  Shazia Wasim Sadiq,et al.  Model Driven Distribution of Collaborative Business Processes , 2006, 2006 IEEE International Conference on Services Computing (SCC'06).

[13]  David Elliott Bell,et al.  Secure Computer Systems: A Mathematical Model, Volume II , 1996, J. Comput. Secur..

[14]  Barbara Carminati,et al.  Security Conscious Web Service Composition , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[15]  Jörg Schwenk,et al.  Security Prospects through Cloud Computing by Adopting Multiple Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[16]  Rafik Bouaziz,et al.  Modeling Security Requirements in Service Based Business Processes , 2012, BMMDS/EMMSAD.

[17]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[18]  Christoph Meinel,et al.  Modelling Security Goals in Business Processes , 2008, Modellierung.

[19]  Claude Godart,et al.  Information Flow Control with Decentralized Service Compositions , 2007, IEEE International Conference on Web Services (ICWS 2007).

[20]  Sunil Chandra,et al.  Decentralized orchestration of composite web services , 2004, WWW Alt. '04.

[21]  Oliver Kopp,et al.  Maintaining Data Dependencies across BPEL Process Fragments , 2008, Int. J. Cooperative Inf. Syst..

[22]  Jana Koehler,et al.  The refined process structure tree , 2008, Data Knowl. Eng..