Obfuscating a Business Process by Splitting its Logic with Fake Fragments for Securing a Multi-Cloud Deployment

被引:8
作者
Nacer, Amina Ahmed [1 ,2 ]
Goettelmann, Elio [2 ,3 ]
Youcef, Samir [2 ]
Tari, Abdelkamel [1 ]
Godart, Claude [2 ]
机构
[1] Univ Bejaia, Fac Exact Sci, LIMED, Bejaia, Algeria
[2] Univ Lorraine, LORIA, Nancy, France
[3] Luxembourg Inst Technol, LIST, Luxembourg, Luxembourg
来源
PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016 | 2016年
关键词
Fake Fragments; Security Risk Management; Cloud Collusion;
D O I
10.1109/SERVICES.2016.9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Companies are ready to outsource their business process to the cloud to enjoy its benefits. However they must be sure that their business know-how is preserved. Although some solutions already exist and consist in splitting the model into a collaboration of BP fragments for a deployment in a muticloud context, none of them takes into account the possibility of collusion between the clouds executing the different fragments. To address this issue, we propose in this paper a solution consisting in adding fake BP fragments at specific locations in the process, so as to complicate its structure and hide the direct interaction between clouds executing sensitive fragments. Therefore, the discovery of the process by malicious cloud providers is delayed. The approach is validated against an introduced metric. It demonstrates that our approach is better in the worst case than previous approaches in best cases.
引用
收藏
页码:18 / 25
页数:8
相关论文
共 22 条
[1]  
Ahmed Nacer A., 2015, INT J WEB SERV UNPUB, P13
[2]  
[Anonymous], 2013, P 5 INT C TANG EMB E
[3]   On the possibility of practically obfuscating programs towards a unified perspective of code protection [J].
Beaucamps, Philippe ;
Filiol, Eric .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (01) :3-21
[4]  
Bentounsi M., 2012, Cloud-I, P9
[5]   A CONCEPTUAL-MODEL OF COGNITIVE-COMPLEXITY OF ELEMENTS OF THE PROGRAMMING PROCESS [J].
CANT, SN ;
JEFFERY, DR ;
HENDERSONSELLERS, B .
INFORMATION AND SOFTWARE TECHNOLOGY, 1995, 37 (07) :351-362
[6]  
Cardoso J, 2006, LECT NOTES COMPUT SC, V4103, P117
[7]   PARETO OPTIMALITY IN MULTIOBJECTIVE PROBLEMS [J].
CENSOR, Y .
APPLIED MATHEMATICS AND OPTIMIZATION, 1977, 4 (01) :41-59
[8]  
Conforti Raffaele, 2013, Advanced Information Systems Engineering. 25th International Conference, CAiSE 2013. Proceedings: LNCS 7908, P116, DOI 10.1007/978-3-642-38709-8_8
[9]   A Transformation-Based Approach to Business Process Management in the Cloud [J].
Duipmans, Evert Ferdinand ;
Pires, Luis Ferreira ;
Santos, Luiz Olavo Bonino da Silva .
JOURNAL OF GRID COMPUTING, 2014, 12 (02) :191-219
[10]   A flexible approach for automatic process decentralization using dependency tables [J].
Fdhila, Walid ;
Yildiz, Ustun ;
Godart, Claude .
2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, 2009, :847-+