Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 11

Proceedings of the 2017 Federated Conference on Computer Science and Information Systems

Privacy Preserving BPMS for Collaborative BPaaS

, , , ,

DOI: http://dx.doi.org/10.15439/2017F330

Citation: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 11, pages 925934 ()

Full text

Abstract. Collaboration in business environments is an ongoing trend that is enabled by and based on cloud computing. It supports flexible and ad-hoc reconfiguration and integration of different services, which are provided and used via the internet, and implemented within business processes. This is an important competitive advantage for the participating stakeholders. However, trust, policy compliance, and data privacy are emerging issues that result from the distributed data handling in cloud-based business processes. Up to now, several architectures and technical systems that enable the cloud-based collaboration within business processes have been developed, but the selection of an appropriate business process management system (BPMS) is missing. An implemented BPMS has to meet certain requirements that result from the cloud-based characteristics and from the other implemented systems. This paper derives requirements for BPMSs in cloud-based environments, currently available BPMSs are evaluated against the derived requirements and the selected one is implemented subsequently.

References

  1. P. Mell and T. Grance, “The nist definition of cloud computing,” Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, 2011.
  2. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, p. 50, 2008, issn: 01464833. http://dx.doi.org/10.1145/1496091.1496100.
  3. D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing,” in International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, Piscataway, NJ: IEEE, 2012, pp. 647–651, isbn: 978-0-7695-4647-6. http://dx.doi.org/10.1109/ICCSEE.2012.193.
  4. B. Schwarzbach, M. Glöckner, A. Schier, M. Robak, and B. Franczyk, “User specific privacy policies for collaborative bpaas on the example of logistics,” in 2016 Federated Conference on Computer Science and Information Systems (FedCSIS), 2016, pp. 1205–1213.
  5. R. Woitsch and W. Utz, “Business process as a service: Model based business and it cloud alignment as a cloud offering,” in 2015 International Conference on Enterprise Systems (ES), IEEE, 2015, pp. 121–130, isbn: 978-1-4673-8005-8. http://dx.doi.org/10.1109/ES.2015.19.
  6. B. Schwarzbach, M. Glöckner, A. Pirogov, M. M. Röhling, and B. Franczyk, “Secure service interaction for collaborative business processes in the inter-cloud,” in 2015 Federated Conference on Computer Science and Information Systems, ser. Annals of Computer Science and Information Systems, IEEE, 2015, pp. 1377–1386. http://dx.doi.org/10.15439/2015F282.
  7. B. Schwarzbach, A. Pirogov, A. Schier, and B. Franczyk, “Inter-cloud architecture for privacy-preserving collaborative bpaas,” QUIS14, 2015.
  8. S. Strahringer, Ed., Business Engineering, ser. HMD. Heidelberg: Dpunkt-Verl., 2005, vol. 241, isbn: 9783898643139.
  9. P. Alpar, R. Alt, F. Bensberg, H. L. Grob, P. Weimann, and R. Winter, Anwendungsorientierte Wirtschaftsinformatik: Strategische Planung, Entwicklung und Nutzung von Informationssystemen, 7., aktual. u. erw. Aufl. Wiesbaden: Springer Vieweg, 2014, isbn: 978-3-658-00521-4. http://dx.doi.org/10 . 1007 / 978 - 3 - 658 - 00521 - 4. [Online]. Available: http://dx.doi.org/10.1007/978-3-658-00521-4.
  10. P. Mertens, F. Bodendorf, W. König, A. Picot, M. Schumann, and T. Hess, Grundzüge der Wirtschaftsinformatik, 11. Aufl. 2012, ser. Springer-Lehrbuch. Berlin and Heidelberg: Springer, 2012, isbn: 978-3642305146. http://dx.doi.org/10.1007/978-3-642-30515-3.
  11. H. J. Schmelzer and W. Sesselmann, Geschäftsprozess-management in der Praxis: Kunden zufriedenstellen, Produktivität steigern, Wert erhöhen : [das Standardwerk], 8., überarbeitete und erweiterte Auflage. München: Hanser, 2013, isbn: 978-3446434608.
  12. J. Becker, M. Kugeler, and M. Rosemann, Eds., Prozessmanagement: Ein Leitfaden zur prozessorientierten Organisationsgestaltung, Siebte, korrigierte und erweiterte Auflage. Berlin and Heidelberg: Springer Gabler, 2012, isbn: 978-3642338434.
  13. H. Österle, W. Brenner, and K. Hilbers, Unternehmensführung und Informationssystem: Der Ansatz des St. Galler Informationssystem-Managements, ser. Informatik und Unternehmensführung. Stuttgart: Teubner, 1992, isbn: 978-3-519-12184-8.
  14. F. Bayer and H. Kühn, Prozessmanagement für Experten: Impulse für aktuelle und wiederkehrende Themen, ser. SpringerLink. Berlin, Heidelberg and s.l.: Springer Berlin Heidelberg, 2013, isbn: 978-3642369940. http://dx.doi.org/10.1007/978-3-642-36995-7
  15. T. Allweyer, BPMN - Business Process Modeling Notation: Einführung in den Standard für die Geschäftsprozessmodellierung. Norderstedt: Books on Demand, 2008, isbn: 978-3837070040.
  16. J. Freund and B. Rücker, Praxishandbuch BPMN 2.0, 4., aktualisierte Aufl. München: Hanser, 2014, isbn: 978-3446442559. http://dx.doi.org/10.3139/9783446442924.
  17. OMG, Business process model and notation (bpmn): Version 2.0, USA, 2011. [Online]. Available: http://www.omg.org/spec/BPMN/2.0/PDF/.
  18. M. H. Hugos and D. Hulitzky, Business in the cloud: What every business needs to know about cloud computing. Hoboken, N.J: Wiley, 2011, isbn: 978-0470616239. [Online]. Available: http://www.eblib.com/patron/FullRecord.aspx?p=624431.
  19. S. Euting, C. Janiesch, R. Fischer, S. Tai, and I. Weber, “Scalable business process execution in the cloud,” in 2014 International Conference on Communications and Networking (ComNet), Piscataway, NJ: IEEE, 2014, pp. 175–184, isbn: 978-1-4799-3766-0. http://dx.doi.org/10.1109/IC2E.2014.13.
  20. B. T. Megersa and W. Zhu, “Cloud-enabled business process management,” International Journal of Computer Theory and Engineering, vol. 4, no. 5, p. 690, 2012.
  21. G. Herrmann and G. Pernul, “Viewing business-process security from different perspectives,” International Journal of Electronic Commerce, vol. 3, no. 3, pp. 89–103, 2015, issn: 1086-4415. http://dx.doi.org/10.1080/10864415.1999.11518343.
  22. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583–592, 2012, issn: 0167739X. http://dx.doi.org/10.1016/j.future.2010.12.006.
  23. L. C. Silva, T. Poleto, V. D. H. de Carvalho, and A. P. C. S. Costa, “Selection of a business process management system: An analysis based on a multicriteria problem,” in IEEE International Conference on Systems, Man and Cybernetics (SMC), 2014, Piscataway, NJ: IEEE, 2014, pp. 295–299, isbn: 978-1-4799-3840-7. http://dx.doi.org/10.1109/SMC.2014.6973923.
  24. H. Balzert, Lehrbuch der Softwaretechnik: Basiskonzepte und Requirements-Engineering, 3. Aufl., ser. Lehrbücher der Informatik. Heidelberg: Spektrum Akad. Verl., 2009, isbn: 978-3827417053.
  25. C. Rupp, Requirements-Engineering und -Management: Professionelle, iterative Anforderungsanalyse für die Praxis, 4., aktualisierte und erw. Aufl. München: Hanser, 2007, isbn: 3446405097. [Online]. Available: http://deposit.d- nb.de/cgi- bin/dokserv?id=2850705&prov=M&dok_var=1&dok_ext=htm.
  26. M. Glöckner, C. Augenstein, and A. Ludwig, “Metamodel of a logistics service map,” in Business Information Systems, ser. Lecture Notes in Business Information Processing, W. van der Aalst, J. Mylopoulos, M. Rosemann, M. J. Shaw, C. Szyperski, W. Abramowicz, and A. Kokkinaki, Eds., vol. 176, Cham: Springer International Publishing, 2014, pp. 185–196, isbn: 978-3-319-06694-3. http://dx.doi.org/10.1007/978-3-319-06695-0_16.
  27. C. Li, H. Cui, G. Ma, and Z. Wang, “A bpm software evaluation method,” in Second International Conference on Intelligent System Design and Engineering Application (ISDEA), 2012, Piscataway, NJ: IEEE, 2012, pp. 1–4, isbn: 978-1-4577-2120-5. http://dx.doi.org/10.1109/ISdea.2012.681.
  28. C. Hahn, F. Friedrich, T. J. Winkler, G. Tamm, and K. Petruch, “How to choose the right bpm tool: A maturity-centric decision framework with a case evaluation in the european market,” in EMISA 2012, ser. GI-Edition lecture notes in informatics proceedings, S. Rinderle-Ma and M. Weske, Eds., Bonn: Ges. für Informatik, 2012, pp. 109–122, isbn: 9783885796008. [Online]. Available: http://subs.emis.de/LNI/Proceedings/Proceedings206/article6770.html.
  29. Wikipedia, List of bpel engines, 2017. [Online]. Available: https://en.wikipedia.org/wiki/List_of_BPEL_engines.
  30. Wikipedia, List of bpmn 2.0 engines, 2017. [Online]. Available: https://en.wikipedia.org/wiki/List_of_BPMN_2.0_ engines.