Abstract
The use of business process standards to model and execute business needs is growing rapidly. In addition, Service-oriented Computing has been adopted to realize business processes, which basically consists of executing the process activities using services available in the Internet. In this context, the importance of security is apparent, because sensitive data sent over the Internet may be accessed by unauthorized third-parties. To prevent security problems, users may associate security requirements that must be enforced in essential tasks of the business process. This fact leads to the need of automation, because both functional and security requirements should be modeled, at high-level, and enforced, at execution level. This work proposes a cloud-based solution named BPA-Sec4Cloud that supports all phases of the security-aware business process automation, from its modeling to its deployment. The use of a cloud-based solution facilitates the deployment process because all needed resources are available in the cloud and ready to be used. In addition, the cloud is also used as a platform in order to provide specific services, such as translators, to support the automation process. In order to evaluate the BPA-Sec4Cloud, the solution was compared against existing solutions through the use of metrics related to the quality of generated artifacts.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Activiti (2013) Activiti 5.15 User Guide. http://activiti.org/userguide/index.html. Last visit at 18 June 2014
Altuhhova O, Matulevicius R, Ahmed N (2013) An extension of business process model and notation for security risk management. Technical report. http://www.techrepublic.com/resource-library/whitepapers. Last visit at 08 June 2014
Apache Software Foundation (2009) Apache Rampart—Axis2 Security Model. http://ws.apache.org/rampart/. Last visit at 3 May 2012
Apache Software Foundation (2008) Apache Orchestration Director Engine (ODE). http://ode.apache.org/. Last visit at 3 May 2013
Appian (2014) Delivering value, security, and speed with BPM in the Cloud. http://www.appian.com/bpm-software/cloud-bpm.jsp. Last visit 14 July 2014
Bertino E et al (2010) Security for Web services and service-oriented architectures. Springer, Berlin
Bohli J et al (2013) Security and privacy-enhancing multicloud architectures. IEEE Trans Dependable Secur Comput 10(4):212–224
Brucker AD (2013) Integrating security aspects into business process models. Inf Technol 55(6):239–246
Charfi A, Schmeling B, Mezini M (2012) An aspect-oriented framework for specification and enforcement of non-functional concerns in WS-BPEL. Int J Web Grid Serv 8(4):386–424
Eclipse Foundation (2008) The BPMN Modeler. http://www.eclipse.org/bpmn. Last visit 5 Feb 2012
Eucalyptus Systems (2009) Eucalyptus open-source Cloud computing infrastructure—an overview. http://www.eucalyptus.com/whitepapers
Fan G et al (2010) Aspect oriented approach to building secure service composition. In: Proceedings of the 17th Asia Pacific software engineering conference (APSEC), pp 176–185
Giner P, Torres V, Pelechano V (2007) Bridging the Gap between BPMN and WS-BPEL: M2M transformations in practice. Technical report. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6295. Last visit 20 Oct 2013
Huang J, Nicol DM (2013) Trust mechanisms for cloud computing. J Cloud Comput 2(9):1–14
IBM (2012) IBM Business Process Manager on Cloud. http://www-03.ibm.com/software/products/en/business-process-manager-cloud. Last visit 14 July 2014
ITU-T (1991) Security architecture for open system interconnection for CCITT applications. Recommendation X.800. Geneva, Switzerland
ITU-T (2008) Recommendation Z.150 (02/03): User Requirements Notation (URN)—Language definition. Geneva, Switzerland
Jboss Community (2014) JBoss jBPM User Guide v. 6.1. http://docs.jboss.org/jbpm/v6.1.0.CR1/userguide/. Last visit at 10 July 2014
Leitner M et al (2013) An experimental study on the design and modeling of security concepts in business processes. In: Proceedings of the 6th IFIP WG 8.1 working conference on the practice of enterprise modeling. LNBIP, vol. 165. Springer, Berlin, pp 236–250
Menzel M et al (2010) The Service Security Lab: a model-driven platform to compose and explore service security in the Cloud. In: Proceedings of the IEEE international world congress of services, pp 115–122
Menzel M, Warschofsky R, Meinel C (2010) A pattern-driven generation of security policies for service-oriented architectures. In: Proceddings of the IEEE international conference on Web services (ICWS 2010), pp 243–250
Mell P, Grance T (2011) The NIST definition of Cloud computing. Recommendations of the National Institute of Standards and Technology, Special Publication 800-145
OASIS (2007) Web Services Security: SOAP Message Security 1.1. http://www.oasis-open.org/committees/download.php/16790/wss-v1.1-spec-os-SOAPMessageSecurity.pdf. Last visit 27 March 2015
OMG (2011) Business process model and notation v 2.0. http://www.omg.org/spec/BPMN/2.0/PDF/. Last visit 24 Feb 2012
Ouyang C et al (2009) From business process models to process-oriented software systems. ACM Trans Softw Eng Methodol 19(1):1–37
Paja E et al (2012) Security requirements engineering for secure business processes. Lect Notes Bus Inf Process 106:77–89
Papazoglou M, Heuvel W (2007) Service oriented architectures: approaches, technologies and research issues. VLDB J 16:389–415
Rodriguez A, Fernndez-Medina E, Trujillo J, Piattini M (2011) Secure business process model specification through a UML 2.0 activity diagram profile. Decis Support Syst 51:446–465
Rosa NS, Justo GRR, Cunha PRF (2004) An approach for reasoning and refining non-functional requirements. J Braz Comput Soc 10(1):59–77
Rosa NS et al (2014) Enforcement of security requirements for a business model. US Patent 8,732,094, 2014
Schmeling B et al (2011) Composing non-functional concerns in composite Web services. In: 2011 IEEE international conference on Web services, pp 331–338
Stollberg M et al (2004) WSMO use case modeling and testing. http://www.wsmo.org/2004/d3/d3.2/20041004. Last visit 29 May 2013
Stango A, Prasad NR, Kyriazanos DM (2009) A threat analysis methodology for security evaluation and enhancement planning. In: Third international conference on emerging security information, systems and technologies, pp 262–267
Turki SH et al (2012) Modeling security requirements in service based business processes. Lect Notes Bus Inf Process 113:76–90
Varela-Vaca AJ et al (2013) A security pattern-driven approach toward the automation of risk treatment in business processes. Adv Intell Syst Comput 189:13–23
Wolter C et al (2009) Model-driven business process security requirement specification. J Syst Archit 55:211–223
Yahia I, Turki SH, Charfi A, Kallel S, Bouaziz R (2013) International conference on service oriented computing workshops (ICSOC Workshops), pp 344–355
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lins, F., Damasceno, J., Medeiros, R. et al. Automation of service-based security-aware business processes in the Cloud. Computing 98, 847–870 (2016). https://doi.org/10.1007/s00607-015-0476-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-015-0476-3