scholarly journals CORRECTNESS CONTROL OF PRIVACY-PRESERVING DECENTRALIZED CONSTRAINED WEB SERVICE COMPOSITIONS THROUGH AUDITING

2016 ◽  
Vol 4 (3) ◽  
pp. 29-44
Author(s):  
Leila Bahri ◽  
◽  
Barbara Carminati ◽  
Elena Ferrari ◽  
Ngoc Hong Tran ◽  
...  
Author(s):  
Shahriar Badsha ◽  
Xun Yi ◽  
Ibrahim Khalil ◽  
Dongxi Liu ◽  
Surya Nepal ◽  
...  

Author(s):  
Zhengping Wu ◽  
Alfred C. Weaver

Web services are increasingly utilized in people’s daily lives to achieve various functionalities. Trustworthiness has become a critical factor for service provision and governance. The lack of effective trust establishment mechanisms impedes the deployment of diverse trust models for web services. One important issue is that collaborating organizations need mechanisms to bridge extant relationships among cooperating parties. Meanwhile, a trust establishment mechanism for web services must ensure privacy and owner control at all times due to the subjectivity of trust relationships. As an alternative and complementary approach to direct trust establishment, we describe an indirect trust establishment mechanism to bridge and build new trust relationships from extant trust relationships with privacy protection. Another issue is the lack of mechanisms that can directly establish trust relationships with privacy-preserving capabilities for web services. Current web service technologies encourage a service requester to reveal all its private attributes in a pre-packaged digital credential to the service provider to fulfill the requirements for verification. This may lead to privacy leakage. We propose a mechanism whereby the service requester discovers the service provider’s requirements from a web service policy document, then formulates a trust primitive by associating a set of attributes in a pre-packaged credential with a semantic name, signed with the requester’s digital signature, to negotiate a trust relationship. Thus the service requester’s privacy is preserved because only those attributes required to build a trust relationship are revealed.


Author(s):  
Imen Khabou ◽  
Mohsen Rouached ◽  
Alexandre Viejo ◽  
David Sánchez

This article describes how by using web service composition to model different business processes is a usual tendency in the industry. More specifically, web service composition enables to separate a certain process in different activities that must be executed following a certain order. Each activity has its own set of inputs and outputs and is executed by a certain web service hosted by a service provider which can be completely independent. Among all the applications in which web service composition may be applied, this article focuses on a cloud-based scenario in which a business wishes to outsource the execution of a certain complex service in exchange for some economical compensation. It is for this reason, among the different composition approaches that exist in the literature, this article focuses on the orchestrated one, in which a broker coordinates the composition. One of the main issues of orchestrated systems is the fact that the broker receives and learns all the input data needed to perform the requested complex service. This behavior may represent a serious privacy problem depending on the nature of the business process to be executed. In this article, a new privacy-preserving orchestrated Web service composition system based on a symmetric searchable encryption primitive is proposed. The main target of this new scheme is to protect the privacy of the business that wish to outsource their operations using a cloud-based solution in which the broker is honest but curious, this is, this entity tries to analyze data and message flows in order to learn all the possible sensitive information from the rest of participants in the system.


Author(s):  
Imen Khabou ◽  
Mohsen Rouached ◽  
Alexandre Viejo ◽  
David Sánchez

This article describes how by using web service composition to model different business processes is a usual tendency in the industry. More specifically, web service composition enables to separate a certain process in different activities that must be executed following a certain order. Each activity has its own set of inputs and outputs and is executed by a certain web service hosted by a service provider which can be completely independent. Among all the applications in which web service composition may be applied, this article focuses on a cloud-based scenario in which a business wishes to outsource the execution of a certain complex service in exchange for some economical compensation. It is for this reason, among the different composition approaches that exist in the literature, this article focuses on the orchestrated one, in which a broker coordinates the composition. One of the main issues of orchestrated systems is the fact that the broker receives and learns all the input data needed to perform the requested complex service. This behavior may represent a serious privacy problem depending on the nature of the business process to be executed. In this article, a new privacy-preserving orchestrated Web service composition system based on a symmetric searchable encryption primitive is proposed. The main target of this new scheme is to protect the privacy of the business that wish to outsource their operations using a cloud-based solution in which the broker is honest but curious, this is, this entity tries to analyze data and message flows in order to learn all the possible sensitive information from the rest of participants in the system.


Sign in / Sign up

Export Citation Format

Share Document