Privacy enhanced and web based service composition

Bandaru Swamy Sri, U Vinod Kumar

Abstract


Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers. Most existing service selection schemas only focus on the functional QoS properties of services such as throughput, latency and response time, or on their trust and reputation level. By contrast, the risk of privacy breaches arising from the selection of component services whose privacy policy is not compliant with customers’ privacy preferences is largely ignored. In this paper, we propose a novel privacy-preserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users’ privacy requirements and providers’ privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer. We demonstrate our approach using a travel agency Web service as an example of service composition.


Keywords


Service composition, DaaS services, privacy, negotiation

References


M. Alrifai, T. Risse, and W. Nejdl, “A hybrid approach for efficient web service composition with end-to-end qos constraints,†TWEB, vol. 6, no. 2, pp. 7:1–7:31, 2012.

K.-M. Chao, M. Younas, C.-C. Lo, and T.-H. Tan, “Fuzzy matchmaking for web services,†in Proc. of AINA. IEEE, 2005, pp. 721–726.

B. Jeong, H. Cho, and C. Lee, “On the functional quality of service (fqos) to discover and compose interoperable web services,†Expert Syst. Appl., vol. 36, no. 3, pp. 5411–5418, 2009.

V. X. Tran and H. Tsuji, “QoS Based Ranking for Web Services: Fuzzy Approaches,†in Proc. of NWeSP, 2008, pp. 77–82.

P. Wang, K.-M. Chao, C.-C. Lo, C.-L. Huang, and Y. Li, “A Fuzzy Model for Selection of QoS-Aware Web Services,†in Proc. of ICEBE. IEEE, 2006, pp. 585–593.

E. M. Maximilien and M. P. Singh, “Toward autonomic web services trust and selection,†in Proc. of SOC. ACM, 2004, pp. 212–221.

S. Paradesi, P. Doshi, and S. Swaika, “Integrating behavioral trust in web service compositions,†in Proc. of ICWS. IEEE, 2009, pp. 453–460.

P. Wang, K.-M. Chao, C.-C. Lo, R. Farmer, and P.-T. Kuo, “A reputationbased service selection scheme,†in Proc. of ICEBE. IEEE, 2009, pp. 501–506.

Z. Xu, P. Martin, W. Powley, and F. Zulkernine, “Reputation-Enhanced QoS-based Web Services Discovery,†in Proc. of ICWS. IEEE, 2007, pp. 249–256.

F. Massacci, J. Mylopoulos, and N. Zannone, “Hierarchical Hippocratic databases with minimal disclosure for virtual organizations,†VLDB J., vol. 15, no. 4, pp. 370–387, 2006.

A. Squicciarini, B. Carminati, and S. Karumanchi, “A privacy-preserving approach for web service selection and provisioning,†in Proc. of ICWS. IEEE, 2011, pp. 33–40.

S.-E. Tbahriti, M. Mrissa, B. Medjahed, C. Ghedira, M. Barhamgi, and J. Fayn, “Privacy-Aware DaaS Services Composition,†in Database and Expert Systems Applications, ser. LNCS 6860. Springer, 2011, pp. 202–216.

R. Hewett and P. Kijsanayothin, “Privacy and recovery in composite web service transactions,†International Journal for Infonomics, vol. 3, no. 2, pp. 240–248, 2010.

W. Xu, V. N. Venkatakrishnan, R. Sekar, and I. V. Ramakrishnan, “A framework for building privacy-conscious composite web services,†in Proc. of ICWS. IEEE, 2006, pp. 655–662.

OASIS, “Web Services Business Process Execution Language Version 2.0,†OASIS Standard, 2007.

H. Foster, S. Uchitel, J. Magee, and J. Kramer, “Ws-engineer: A model-based approach to engineering web service compositions and choreography,†in Test and Analysis of Web Services. Springer, 2007, pp. 87–119.

R. Hamadi and B. Benatallah, “A Petri net-based model for web service composition,†in Proc. of ADC. Australian Computer Society, Inc., 2003, pp. 191–200.

X. Fu, T. Bultan, and J. Su, “Formal verification of e-services and workflows,†in Web Services, E-Business, and the Semantic Web, ser. LNCS 2512. Springer, 2002, pp. 188–202.

D. Berardi, G. D. Giacomo, M. Lenzerini, M. Mecella, and D. Calvanese, “Synthesis of underspecified composite e-services based on automated.


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â