Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 8

Proceedings of the 2016 Federated Conference on Computer Science and Information Systems

Business Process Optimization with Big Data Analytics Under Consideration of Privacy

, ,

DOI: http://dx.doi.org/10.15439/2016F542

Citation: Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 8, pages 1199–1204 ()

Full text

Abstract. €” One of the contemporary problems, and at the same time a big opportunity, in business networks of supply chains are the issues associated with the vast amounts of data arising there. The data may be utilized by the decision support systems in supply chains; nevertheless, often there are information privacy problems. The supply chains in cloud will need appropriate administration for support of privacy aspects of cooperating business units existing in big data ecosystems. In this paper we analyze the possibility of utilizing the big data technology for supporting business processes optimization with respect of the privacy regulations in supply chains under the usage of the big data analytics lifecycle. We present our approach on an example of a business process in logistics

References

  1. H. Baumgarten, Das beste der Logistik. Springer Verlag, Berlin 2008, http://dx.doi.org/10.1007/978-3-540-78405-0.
  2. S. Robak, B. Franczyk, and M. Robak, Applying Linked Data concepts in BPM, FedCIS 2012, IT4L. IEEE Conference Publications pp. 1105-1110.
  3. S. Robak, B. Franczyk, and M. Robak, Applying Linked Data concepts in Supply Chains Management, FedCIS 2013 IEEE Conference Publications pp. 1215-1221.
  4. S. Robak, B. Franczyk, and M. Robak, Research Problems Associated with Big Data Utilization in Logistics and Supply Chains Design and Management. FedCSIS 2014. Warsaw: Polish Information Processing Society, 2014. Annals of Computer Science and Information Systems, Vol. 3, pp. 92-93, http://dx.doi.org/10.15439/2014F472.
  5. M. P. Papazoglou, and P. M. A Ribbes, E-business: organizational and technical foundations, John Wiley and sons. London 2006, pp.88-90.
  6. D. Agrawal, S. Das and A. E. Abbadi, Big data and cloud computing: current state and future opportunities. EDBT 2011, March 22-24, 2011, Uppsala, Sweden. ACM 978-1-4503-0528-0/11/0003, http://dx.doi.org/10.1145/1951365.1951432.
  7. E. Dumbill, What is big data? An introduction to the big data landscape, Strata O’Reilly, 11 January 2012, http://strata.oreilly.com/2012/01/what-is-big-data.html
  8. S. Wrobel, Big Data – Vorsprung durch Wissen, Fraunhofer-Institut für Intelligente Analyse- und Informationsverarbeitungssysteme IAIS. Presentation, http://www.iais.fraunhofer.de
  9. I. Mitchell and M. Wilson, Linked Data. Connecting and exploiting big data, Fujitsu Services Limited, March 2012, http://www.fujitsu.com.uk.
  10. N. Marz and J. Warren, Big data. Principles and best practices of scalable realtime data systems. Manning Publications, MEAP Edition, Manning Early Access Program Big Data version 7, 2012.
  11. Data Science and Big Data Analytics. Discovering, Analysing, Visualizing and Presenting Data. EMC Education Services – Ed. Wiley 2014.
  12. The Apache Hadoop Project. http://hadoop.apache.org/, 2009.
  13. Schwarzbach, B., Glockner, M., Pirogov, A., Rohling, M. M., & Franczyk, B., Secure service interaction for collaborative business processes in the inter-cloud. In Computer Science and Information Systems (FedCSIS), 2015 Federated Conference pp.1377-1386), http://dx.doi.org/10.15439/2015F282.
  14. Brucker, A. D., Malmignati, F., Merabti, M., Shi, Q., & Zhou, B. A framework for secure service composition. In Social Computing (SocialCom), 2013 Int. Conference pp. 647-652, http://doi.ieeecomputersociety.org/10.1109/SocialCom.2013.97.
  15. Pearson, S., Taking account of privacy when designing cloud computing services In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing pp. 44-52, http://doi.ieeecomputersociety.org/10.1109/CLOUD.2009.5071532.
  16. Mülle, J., Von Stackelberg, S., & Böhm, K. Modelling and transforming security constraints in privacy-aware business processes. In Service-Oriented Computing and Applications (SOCA), 2011 IEEE International Conference pp. 1-4, http://dx.doi.org/10.1109/SOCA.2011.6166257.
  17. OMG Consortium, Documents Associated with Business Process Model and Notation (BPMN) Version 2.0, Release date: January 2011, http://www.omg.org/spec/BPMN/2.0.