Reference Hub3
A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation

A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation

Amina Ahmed Nacer, Elio Goettelmann, Samir Youcef, Abdelkamel Tari, Claude Godart
Copyright: © 2018 |Volume: 15 |Issue: 4 |Pages: 21
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781522542476|DOI: 10.4018/IJWSR.2018100104
Cite Article Cite Article

MLA

Nacer, Amina Ahmed, et al. "A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation." IJWSR vol.15, no.4 2018: pp.61-81. http://doi.org/10.4018/IJWSR.2018100104

APA

Nacer, A. A., Goettelmann, E., Youcef, S., Tari, A., & Godart, C. (2018). A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation. International Journal of Web Services Research (IJWSR), 15(4), 61-81. http://doi.org/10.4018/IJWSR.2018100104

Chicago

Nacer, Amina Ahmed, et al. "A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation," International Journal of Web Services Research (IJWSR) 15, no.4: 61-81. http://doi.org/10.4018/IJWSR.2018100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

To enjoy the benefits of cloud computing, organizations managing complex business processes want to outsource their processes. However, as such processes express their know-how and because of the nature of the cloud, they are still reluctant to do so. To prevent such a know-how exposure, this article proposes a design-time approach for obfuscating a BP model by splitting its model into a collaboration of BP fragments semantically equivalent to the initial BP. This breaking down renders the discovery by cloud providers of-the-deep content of a critical fragment, and more of the whole process, much harder when these fragments are deployed in a multi-cloud context. While existing contributions on the topic of BP obfuscation remain at the level of principles, the authors propose an algorithm supporting automatically such a BP model transformation. The approach is validated against an obfuscation metric introduced in the article. The obtained results show that the authors' algorithm generates BP fragment with a high obfuscation level, contributing to protect BP know-how when deployed in a multi-cloud context.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.