Skip to main content

Automation of Privacy Preserving BPMS in Collaborative Cloud-Based Business Processes

  • Conference paper
  • First Online:
Information Technology for Management. Ongoing Research and Development (ISM 2017, AITM 2017)

Abstract

Collaboration in business environments is an ongoing trend that is enabled by and based on cloud computing. It supports flexible and ad-hoc reconfiguration and integration of different services, which are provided and used via the internet, and implemented within business processes. This is an important competitive advantage for the participating stakeholders. However, trust, policy compliance, and data privacy are emerging issues that result from the distributed data handling in cloud-based business processes. In an earlier paper, we have discussed the requirements that a Business Process Management System (BPMS) should meet in order to enable privacy preserving business process as a service. This paper presents the necessary steps for implementing such a BPMS for an architecture to enable management of privacy-preserving collaborative business process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Schwarzbach, B., Franczyk, B., Petrich, L., Schier, A., Hompel, M.T.: Cloud based privacy preserving collaborative business process management. In: 2016 IEEE International Conference on Computer and Information Technology (CIT), pp. 716–723. IEEE (2016)

    Google Scholar 

  2. Schier, A., Petrich, L., ten Hompel, M., Schwarzbach, B., Franczyk, B.: Cloud-Architektur für Privacy-Management in kollaborativen Logistikprozessen. Logist. J. 2192, 1 (2016)

    Google Scholar 

  3. Schmelzer, H.J., Sesselmann, W.: Geschäftsprozessmanagement in der Praxis. Kunden zufriedenstellen, Produktivität steigern, Wert erhöhen: [das Standardwerk]. Hanser, München (2013)

    Google Scholar 

  4. Li, Z., Keung, J.: Software cost estimation framework for service-oriented architecture systems using divide-and-conquer approach. In: Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE), Proceedings, 4–5 June 2010, Nanjing, China, pp. 47–54. IEEE, Piscataway (2010)

    Google Scholar 

  5. Becker, J., Kugeler, M., Rosemann, M. (eds.): Prozessmanagement. Ein Leitfaden zur prozessorientierten Organisationsgestaltung. Springer Gabler, Berlin (2012). https://doi.org/10.1007/b138686

    Google Scholar 

  6. Hugos, M.H., Hulitzky, D.: Business in the Cloud. What Every Business Needs to Know About Cloud Computing. Wiley, Hoboken (2011)

    Google Scholar 

  7. Schwarzbach, B., Glöckner, M., Makarov, S., Franczyk, B., Ludwig, A.: Privacy preserving BPMS for collaborative BPaaS, pp. 925–934. IEEE (2017)

    Google Scholar 

  8. Mertens, P., Bodendorf, F., König, W., Picot, A., Schumann, M., Hess, T.: Grundzüge der Wirtschaftsinformatik. Springer, Berlin (2012). https://doi.org/10.1007/978-3-642-30515-3

    Book  Google Scholar 

  9. Euting, S., Janiesch, C., Fischer, R., Tai, S., Weber, I.: Scalable business process execution in the cloud. In: 2014 International Conference on Communications and Networking (ComNet), 19–22 March 2014, Hammamet, Tunisia, pp. 175–184. IEEE, Piscataway (2014)

    Google Scholar 

  10. Megersa, B.T., Zhu, W.: Cloud-enabled business process management. Int. J. Comput. Theory Eng. 4, 690 (2012)

    Article  Google Scholar 

  11. Woitsch, R., Utz, W.: Business process as a service. Model based business and IT cloud alignment as a cloud offering. In: 2015 International Conference on Enterprise Systems (ES), pp. 121–130. IEEE (2015)

    Google Scholar 

  12. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, Zhejiang, China, 23–25 March 2012, pp. 647–651. IEEE, Piscataway (2012)

    Google Scholar 

  13. Rodriguez, A., Fernandez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. E90-D, 745–752 (2007)

    Article  Google Scholar 

  14. Backes, M., Pfitzmann, B., Waidner, M.: Security in business process engineering. In: van der Aalst, W.M.P., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 168–183. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-44895-0_12

    Chapter  Google Scholar 

  15. Herrmann, G., Pernul, G.: Viewing business-process security from different perspectives. Int. J. Electron. Commer. 3, 89–103 (2015)

    Article  Google Scholar 

  16. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)

    Article  Google Scholar 

  17. Venable, J., Pries-Heje, J., Baskerville, R.: FEDS: a framework for evaluation in design science research. Eur. J. Inf. Syst., 1–13 (2014)

    Google Scholar 

  18. Hevner, A., March, S., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28, 75–105 (2004)

    Article  Google Scholar 

  19. Wiliam, D., Black, P.: Meanings and consequences: a basis for distinguishing formative and summative functions of assessment? Br. Educ. Res. J. 22, 537–548 (1996)

    Article  Google Scholar 

  20. Sun, Y., Kantor, P.B.: Cross-evaluation: a new model for information system evaluation. J. Am. Soc. Inf. Sci. Technol. 57, 614–628 (2006)

    Article  Google Scholar 

  21. Mathiassen, L., Munk-Madsen, A., Nielsen, P.A., Stage, J., Jacksen, M.: Object-Oriented Analysis & Design. Marko, Aalborg (2000)

    Google Scholar 

  22. Smithson, S., Hirschheim, R.: Analysing information systems evaluation: another look at an old problem. Eur. J. Inf. Syst. 7, 158–174 (1998)

    Article  Google Scholar 

  23. Stufflebeam, D.L.: The CIPP model for evaluation. In: Kellaghan, T., Stufflebeam, D.L. (eds.) International Handbook of Educational Evaluation, vol. 9, pp. 31–62. Springer, Dordrecht (2003). https://doi.org/10.1007/978-94-010-0309-4_4

    Chapter  Google Scholar 

  24. jboss.org. Community Documentation: jBPM Documentation. https://docs.jboss.org/jbpm/release/6.4.0.Final/jbpm-docs/html_single/

  25. Fiorini, S.: Mastering jBPM6. Design, Build, and Deploy Business Process-Centric Applications Using the Cutting-Edge jBPM Technology Stack. Packt Publishing, Birmingham (2015)

    Google Scholar 

  26. Berenson, H., Bernstein, P., Gray, J., Melton, J., O’Neil, E., O’Neil, P.: A critique of ANSI SQL isolation levels. SIGMOD Rec. 24, 1–10 (1995)

    Article  Google Scholar 

  27. Subramaniam, V., Hogan, B.P. (eds.): Programming Concurrency on the JVM. Mastering Synchronization, STM, and Actors. Pragmatic Bookshelf, Raleigh (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergei Makarov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Makarov, S., Schwarzbach, B., Glöckner, M., Franczyk, B., Ludwig, A. (2018). Automation of Privacy Preserving BPMS in Collaborative Cloud-Based Business Processes. In: Ziemba, E. (eds) Information Technology for Management. Ongoing Research and Development. ISM AITM 2017 2017. Lecture Notes in Business Information Processing, vol 311. Springer, Cham. https://doi.org/10.1007/978-3-319-77721-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-77721-4_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-77720-7

  • Online ISBN: 978-3-319-77721-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics