Enhancing Secured Service Interoperability with Decentralized Orchestration

Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled processes to be exchanged between different organizations and executed without major architectural constraints. With the existence of services that are invokable with processes rather than their regular input, it is very inexpensive to provide decentralized execution settings where services can establish direct interconnections following the logic of their processes. This paper describes and exemplifies our initial ideas about a method that derives such processes. We are interested to satisfy different information flow policies of involved services and privacy requirements of process designers that run counter to default decentralizations. We show how decentralized executions can be effective for service oriented processes that cannot be realized with centralized executions.

[1]  Gene Tsudik,et al.  A Privacy-Preserving Index for Range Queries , 2004, VLDB.

[2]  Sushil Jajodia,et al.  Secure mediated databases , 1996, Proceedings of the Twelfth International Conference on Data Engineering.

[3]  Alberto Ceselli,et al.  Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.

[4]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[5]  Yi-Ting Chiang,et al.  Information Theoretical Analysis of Two-Party Secret Computation , 2006, DBSec.

[6]  Moni Naor,et al.  Adaptively secure multi-party computation , 1996, STOC '96.

[7]  Kincho H. Law,et al.  CHAOS: An Active Security Mediation System , 2000, CAiSE.

[8]  Alexandre V. Evfimievski,et al.  Information sharing across private databases , 2003, SIGMOD '03.

[9]  Gultekin Özsoyoglu,et al.  Anti-Tamper Databases: Querying Encrypted Databases , 2003, DBSec.

[10]  Gene Tsudik,et al.  Aggregation Queries in the Database-As-a-Service Model , 2006, DBSec.

[11]  Sheng Zhong,et al.  Privacy-Preserving Queries on Encrypted Data , 2006, ESORICS.

[12]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[13]  Joachim Biskup,et al.  Explicit Representation of Constrained Schema Mappings for Mediated Data Integration , 2002, DNIS.

[14]  Ronald Cramer,et al.  A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .

[15]  Elisa Bertino,et al.  Securing XML data in third-party distribution systems , 2005, CIKM '05.

[16]  Hakan Hacigümüs,et al.  Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.

[17]  Gultekin Özsoyoglu,et al.  Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).

[18]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[19]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[20]  Michael R. Genesereth,et al.  The Conceptual Basis for Mediation Services , 1997, IEEE Expert.

[21]  Joachim Biskup,et al.  Secure Mediation with Mobile Code , 2005, DBSec.

[22]  Joachim Biskup,et al.  Secure Mediation: Requirements, Design, and Architecture , 2003, J. Comput. Secur..

[23]  Dawn Xiaodong Song,et al.  Privacy-Preserving Set Operations , 2005, CRYPTO.

[24]  Doerte K. Rappe Homomorphic cryptosystems and their applications , 2005, IACR Cryptol. ePrint Arch..