Business process outsourcing to the cloud: Balancing costs with security risks

被引:23
作者
Nacer, Amina Ahmed [1 ,2 ]
Godart, Claude [2 ]
Rosinosky, Guillaume [2 ]
Tari, Abdelkamel [1 ]
Youcef, Samir [2 ]
机构
[1] Univ Bejaia, Fac Exact Sci, LIMED Lab, Bejaia 06000, Algeria
[2] Univ Lorraine, LORIA Lab, F-54506 Vandoeuvre Les Nancy, France
关键词
BP modelling; Security risk; Know-how privacy; Cloud Computing; Deployment cost; OPTIMIZATION; FRAMEWORK;
D O I
10.1016/j.compind.2018.10.003
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The cloud computing introduced security risks which make companies reluctant to adopt it. Some means exist for reducing these risks while deploying a business process (BP) in the cloud. Among them, a technique largely used is to split the BP model in a choreography of BP fragments so that a cloud has only a partial view of the model. Unfortunately, reducing security risks with this approach implies the increase of BP fragments and of hosting clouds, and corollary the increase of costs. To overcome this issue, we present two heuristics managing separation/co-location constraints for risk versus cost optimization: the first optimizes the risk while respecting a cost threshold, the second optimizes the cost while respecting a risk threshold. These heuristics are experimented with a risk model, whose characteristics is to use only client-side data, and a more traditional cost model. Finally, the heuristics are validated against an exact optimization solution. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:59 / 74
页数:16
相关论文
共 54 条
[1]  
Abdel-Hafez A, 2014, 16TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS 2014), P79
[2]  
Agrawal D., EVOLUTIONARY APPROAC
[3]  
Ahmed Nacer A., 2017, ENTR COMP C EDOC
[4]  
Ahmed Nacer A., 2016, IEEE INT C SERV SERV, P8
[5]   Cloud Computing Pricing Models: A Survey [J].
Al-Roomi, May ;
Al-Ebrahim, Shaikha ;
Buqrais, Sabika ;
Ahmad, Imtiaz .
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2013, 6 (05) :93-106
[6]  
[Anonymous], 2002, RISK MANAGEMENT VOCA
[7]  
[Anonymous], P CAISE 13 FOR 25 IN
[8]  
[Anonymous], 2013, P 5 INT C TANG EMB E
[9]  
[Anonymous], P 2013 IEEE ACM 6 IN
[10]   Supporting Secure Business Process Design via Security Process Patterns [J].
Argyropoulos, Nikolaos ;
Mouratidis, Haralambos ;
Fish, Andrew .
ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2017 AND EMMSAD 2017, 2017, 287 :19-33