Reference Hub1
Privacy-Preserving Orchestrated Web Service Composition with Untrusted Brokers

Privacy-Preserving Orchestrated Web Service Composition with Untrusted Brokers

Imen Khabou, Mohsen Rouached, Alexandre Viejo, David Sánchez
Copyright: © 2018 |Volume: 13 |Issue: 4 |Pages: 26
ISSN: 1554-1045|EISSN: 1554-1053|EISBN13: 9781522542971|DOI: 10.4018/IJITWE.2018100105
Cite Article Cite Article

MLA

Khabou, Imen, et al. "Privacy-Preserving Orchestrated Web Service Composition with Untrusted Brokers." IJITWE vol.13, no.4 2018: pp.78-103. http://doi.org/10.4018/IJITWE.2018100105

APA

Khabou, I., Rouached, M., Viejo, A., & Sánchez, D. (2018). Privacy-Preserving Orchestrated Web Service Composition with Untrusted Brokers. International Journal of Information Technology and Web Engineering (IJITWE), 13(4), 78-103. http://doi.org/10.4018/IJITWE.2018100105

Chicago

Khabou, Imen, et al. "Privacy-Preserving Orchestrated Web Service Composition with Untrusted Brokers," International Journal of Information Technology and Web Engineering (IJITWE) 13, no.4: 78-103. http://doi.org/10.4018/IJITWE.2018100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how by using web service composition to model different business processes is a usual tendency in the industry. More specifically, web service composition enables to separate a certain process in different activities that must be executed following a certain order. Each activity has its own set of inputs and outputs and is executed by a certain web service hosted by a service provider which can be completely independent. Among all the applications in which web service composition may be applied, this article focuses on a cloud-based scenario in which a business wishes to outsource the execution of a certain complex service in exchange for some economical compensation. It is for this reason, among the different composition approaches that exist in the literature, this article focuses on the orchestrated one, in which a broker coordinates the composition. One of the main issues of orchestrated systems is the fact that the broker receives and learns all the input data needed to perform the requested complex service. This behavior may represent a serious privacy problem depending on the nature of the business process to be executed. In this article, a new privacy-preserving orchestrated Web service composition system based on a symmetric searchable encryption primitive is proposed. The main target of this new scheme is to protect the privacy of the business that wish to outsource their operations using a cloud-based solution in which the broker is honest but curious, this is, this entity tries to analyze data and message flows in order to learn all the possible sensitive information from the rest of participants in the system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.