Privacy-preserving orchestrated web service composition with untrusted brokers

Imen Khabou, Mohsen Rouached, Alexandre Viejo, David Sánchez

Research output: Contribution to journalArticle

Abstract

This article describes how by using web service composition to model different business processes is a usual tendency in the industry. More specifically, web service composition enables to separate a certain process in different activities that must be executed following a certain order. Each activity has its own set of inputs and outputs and is executed by a certain web service hosted by a service provider which can be completely independent. Among all the applications in which web service composition may be applied, this article focuses on a cloud-based scenario in which a business wishes to outsource the execution of a certain complex service in exchange for some economical compensation. It is for this reason, among the different composition approaches that exist in the literature, this article focuses on the orchestrated one, in which a broker coordinates the composition. One of the main issues of orchestrated systems is the fact that the broker receives and learns all the input data needed to perform the requested complex service. This behavior may represent a serious privacy problem depending on the nature of the business process to be executed. In this article, a new privacy-preserving orchestrated Web service composition system based on a symmetric searchable encryption primitive is proposed. The main target of this new scheme is to protect the privacy of the business that wish to outsource their operations using a cloud-based solution in which the broker is honest but curious, this is, this entity tries to analyze data and message flows in order to learn all the possible sensitive information from the rest of participants in the system.

Original languageEnglish
Pages (from-to)78-103
Number of pages26
JournalInternational Journal of Information Technology and Web Engineering
Volume13
Issue number4
DOIs
Publication statusPublished - Oct 1 2018

Fingerprint

Web services
Chemical analysis
Industry
Cryptography

Keywords

  • Orchestration
  • Privacy
  • Searchable Encryption
  • Web Service Composition

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Privacy-preserving orchestrated web service composition with untrusted brokers. / Khabou, Imen; Rouached, Mohsen; Viejo, Alexandre; Sánchez, David.

In: International Journal of Information Technology and Web Engineering, Vol. 13, No. 4, 01.10.2018, p. 78-103.

Research output: Contribution to journalArticle

@article{1e114e03351e4abb80bd3560ea84c8bc,
title = "Privacy-preserving orchestrated web service composition with untrusted brokers",
abstract = "This article describes how by using web service composition to model different business processes is a usual tendency in the industry. More specifically, web service composition enables to separate a certain process in different activities that must be executed following a certain order. Each activity has its own set of inputs and outputs and is executed by a certain web service hosted by a service provider which can be completely independent. Among all the applications in which web service composition may be applied, this article focuses on a cloud-based scenario in which a business wishes to outsource the execution of a certain complex service in exchange for some economical compensation. It is for this reason, among the different composition approaches that exist in the literature, this article focuses on the orchestrated one, in which a broker coordinates the composition. One of the main issues of orchestrated systems is the fact that the broker receives and learns all the input data needed to perform the requested complex service. This behavior may represent a serious privacy problem depending on the nature of the business process to be executed. In this article, a new privacy-preserving orchestrated Web service composition system based on a symmetric searchable encryption primitive is proposed. The main target of this new scheme is to protect the privacy of the business that wish to outsource their operations using a cloud-based solution in which the broker is honest but curious, this is, this entity tries to analyze data and message flows in order to learn all the possible sensitive information from the rest of participants in the system.",
keywords = "Orchestration, Privacy, Searchable Encryption, Web Service Composition",
author = "Imen Khabou and Mohsen Rouached and Alexandre Viejo and David S{\'a}nchez",
year = "2018",
month = "10",
day = "1",
doi = "10.4018/IJITWE.2018100105",
language = "English",
volume = "13",
pages = "78--103",
journal = "International Journal of Information Technology and Web Engineering",
issn = "1554-1045",
publisher = "IGI Publishing",
number = "4",

}

TY - JOUR

T1 - Privacy-preserving orchestrated web service composition with untrusted brokers

AU - Khabou, Imen

AU - Rouached, Mohsen

AU - Viejo, Alexandre

AU - Sánchez, David

PY - 2018/10/1

Y1 - 2018/10/1

N2 - This article describes how by using web service composition to model different business processes is a usual tendency in the industry. More specifically, web service composition enables to separate a certain process in different activities that must be executed following a certain order. Each activity has its own set of inputs and outputs and is executed by a certain web service hosted by a service provider which can be completely independent. Among all the applications in which web service composition may be applied, this article focuses on a cloud-based scenario in which a business wishes to outsource the execution of a certain complex service in exchange for some economical compensation. It is for this reason, among the different composition approaches that exist in the literature, this article focuses on the orchestrated one, in which a broker coordinates the composition. One of the main issues of orchestrated systems is the fact that the broker receives and learns all the input data needed to perform the requested complex service. This behavior may represent a serious privacy problem depending on the nature of the business process to be executed. In this article, a new privacy-preserving orchestrated Web service composition system based on a symmetric searchable encryption primitive is proposed. The main target of this new scheme is to protect the privacy of the business that wish to outsource their operations using a cloud-based solution in which the broker is honest but curious, this is, this entity tries to analyze data and message flows in order to learn all the possible sensitive information from the rest of participants in the system.

AB - This article describes how by using web service composition to model different business processes is a usual tendency in the industry. More specifically, web service composition enables to separate a certain process in different activities that must be executed following a certain order. Each activity has its own set of inputs and outputs and is executed by a certain web service hosted by a service provider which can be completely independent. Among all the applications in which web service composition may be applied, this article focuses on a cloud-based scenario in which a business wishes to outsource the execution of a certain complex service in exchange for some economical compensation. It is for this reason, among the different composition approaches that exist in the literature, this article focuses on the orchestrated one, in which a broker coordinates the composition. One of the main issues of orchestrated systems is the fact that the broker receives and learns all the input data needed to perform the requested complex service. This behavior may represent a serious privacy problem depending on the nature of the business process to be executed. In this article, a new privacy-preserving orchestrated Web service composition system based on a symmetric searchable encryption primitive is proposed. The main target of this new scheme is to protect the privacy of the business that wish to outsource their operations using a cloud-based solution in which the broker is honest but curious, this is, this entity tries to analyze data and message flows in order to learn all the possible sensitive information from the rest of participants in the system.

KW - Orchestration

KW - Privacy

KW - Searchable Encryption

KW - Web Service Composition

UR - http://www.scopus.com/inward/record.url?scp=85050742546&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85050742546&partnerID=8YFLogxK

U2 - 10.4018/IJITWE.2018100105

DO - 10.4018/IJITWE.2018100105

M3 - Article

VL - 13

SP - 78

EP - 103

JO - International Journal of Information Technology and Web Engineering

JF - International Journal of Information Technology and Web Engineering

SN - 1554-1045

IS - 4

ER -