Runtime self-monitoring approach of business process compliance in cloud environments

被引:10
作者
Barnawi, Ahmed [1 ]
Awad, Ahmed [2 ]
Elgammal, Amal [3 ]
El Shawi, Radwa [4 ]
Almalaise, Abdullah [1 ]
Sakr, Sherif [5 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 21413, Saudi Arabia
[2] Cairo Univ, Fac Comp & Informat, Informat Syst, Giza, Egypt
[3] Cairo Univ, Fac Comp & Informat, Giza, Egypt
[4] Princess Nourah Bint Abdulrahman Univ, Coll Comp Sci & Informat Technol, Riyadh, Saudi Arabia
[5] King Saud bin Abdulaziz Univ Hlth Sci, Dept Hlth Informat, Riyadh, Saudi Arabia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2015年 / 18卷 / 04期
关键词
Cloud computing; Cloud monitoring; Business process compliance;
D O I
10.1007/s10586-015-0494-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several industrial studies have concluded that compliance management is one of the major challenges companies face nowadays. In practice, runtime compliance monitoring is of utmost importance for compliance assurance as during the design-time compliance checking phase, only a subset of the imposed compliance requirements can be statically checked due to the absence of required variable instantiation and contextual information. Furthermore, the fact that a business process model has been statically checked for compliance during design-time does not guarantee that the corresponding running business process instances are usually compliant due to human and machine errors. The problem of runtime monitoring of business process compliance becomes more challenging when business processes are executed in cloud computing environments. In this context, the compliance process can not rely on external components as the whole execution environment is mainly controlled by the cloud providers. In this article, we propose a novel approach to tackle this problem by adopting and configuring the business process models into a form that augment the associated compliance rules so that they can be monitored without the need to rely on external monitoring components. Compared to approaches that depend on an external monitoring component, our approach requires less sophisticated infrastructure when hosted on the cloud as well as less traffic footprint as communication with an external component for monitoring is no longer needed.
引用
收藏
页码:1503 / 1526
页数:24
相关论文
共 61 条
[1]   An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art [J].
Alhamazani, Khalid ;
Ranjan, Rajiv ;
Mitra, Karan ;
Rabhi, Fethi ;
Jayaraman, Prem Prakash ;
Khan, Samee Ullah ;
Guabtni, Adnene ;
Bhatnagar, Vasudha .
COMPUTING, 2015, 97 (04) :357-377
[2]  
[Anonymous], 2010, P 19 INT C WORLD WID
[3]  
[Anonymous], 2011, UNDERSTANDING REGULA, DOI DOI 10.1093/ACPROF:OSOBL/9780199576081.001.0001
[4]  
[Anonymous], 2008, P 28 IARCS C FDN SOF, DOI [DOI 10.4230/LIPICS.FSTTCS.2008.1740, 10.4230/LIPIcs.FSTTCS.2008.1740]
[5]  
[Anonymous], 2002, The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems
[6]  
[Anonymous], 2009, TECHNICAL REPORT
[7]  
Awad A., 2010, EMISA FOR, V30
[8]   Runtime Detection of Business Process Compliance Violations: An Approach based on Anti Patterns [J].
Awad, Ahmed ;
Barnawi, Ahmed ;
Elgammal, Amal ;
Elshawi, Radwa ;
Almalaise, Abduallah ;
Sakr, Sherif .
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, :1203-1210
[9]  
Awad Ahmed, 2008, BPM
[10]  
Awad Ahmed, 2009, BPM WORKSH