Skip to main content
Log in

Log-based mining techniques applied to Web service composition reengineering

  • Special Issue Paper
  • Published:
Service Oriented Computing and Applications Aims and scope Submit manuscript

Abstract

Web service compositions are becoming more and more complex, involving numerous interacting ad-hoc services. These services are often implemented as business processes themselves. By analysing such complex web service compositions one is able to better understand, control and eventually re-design them. Our contribution to this problem is a mining algorithm, based on a statistical technique to discover composite web service patterns from execution logs. Our approach is characterised by a “local” pattern’s discovery that covers partial results through a dynamic programming algorithm. Those locally discovered patterns are then composed iteratively until the composite Web service is discovered. The analysis of the disparities between the discovered model and the initial ad-hoc composite model (delta-analysis) enables initial design gaps to be detected and thus to re-engineer the initial Web service composition.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Gombotz R, Baïna K, Dustdar S (2005) Towards web services interaction mining architecture for e-commerce applications analysis. In: International conference on e-business and e-learning (EBEL’05), Amman, Jordan

  2. Fauvet MC, Dumas M, Benatallah B (2002) Collecting and querying distributed traces of composite service executions. In: On the move to meaningful Internet systems, 2002—DOA/CoopIS/ODBASE 2002 Confederated international conferences DOA, CoopIS and ODBASE 2002, Springer, Heidelberg, pp 373–390

  3. Rouached M, Gaaloul W, van der Aalst WMP, Bhiri S, Godart C (2006) Web service mining and verification of properties: an approach based on event calculus. In: Meersman R, Tari Z (eds) OTM conferences (1). Lecture Notes in Computer Science, vol 4275. Springer, Heidelberg, pp 408–425

  4. Punin J, Krishnamoorthy M, Zaki M (2001) Web usage mining: Languages and algorithms. In: Studies in classification, data analysis, and knowledge organization. Springer, Heidelberg

  5. Baglioni M, Ferrara U, Romei A, Ruggieri S, Turini F (2002) Use soap-based intermediaries to build chains of web service functionality

  6. van der Aalst WMP, Weijters T, Maruster L (2004) Workflow mining: discovering process models from event logs. IEEE Trans Knowl Data Eng 16(9): 1128–1142

    Article  Google Scholar 

  7. Gamma E, Helm R, Johnson R, Vlissides J (1994) Design patterns, elements of reusable object-oriented software. Addison-Wesley, MA

  8. vander Aalst WMP, Ter Hofstede AHM, Kiepuszewski B, Barros AP (2003) Workflow patterns. Distrib Parallel Datab 14(1): 5–51

    Article  Google Scholar 

  9. Cook JE, Wolf AL (1998) Event-based detection of concurrency. In: sixth ACM SIGSOFT international symposium on foundations of software engineering. ACM Press, New York

  10. Mannila H, Toivonen H, Verkamo AI (1997) Discovery of frequent episodes in event sequences. Data Min Knowl Discov 1(3): 259–289

    Article  Google Scholar 

  11. Cook JE, Wolf AL (1999) Software process validation: quantitatively measuring the correspondence of a process to a model. ACM Trans Softw Eng Methodol (TOSEM) 8(2): 147–176

    Article  Google Scholar 

  12. v Glabbeek RJ, Weijland WP (1996) Branching time and abstraction in bisimulation semantics. J ACM 43(3): 555–600

    Article  MathSciNet  Google Scholar 

  13. Basten T, van der Aalst WMP (2001) Inheritance of behavior. J Log Algebr Program 47(2): 47–145

    Article  MATH  MathSciNet  Google Scholar 

  14. van der Aalst WMP, Basten T (2001) Identifying commonalities and differences in object life cycles using behavioral inheritance. In: ICATPN ’01 Proceedings of the 22nd international conference on application and theory of petri nets. Springer, London, pp 32–52

  15. van der Aalst WMP (2001) Exterminating the dynamic change bug: a concrete approach to support workflow change. Info Syst Front 3(3): 297–317

    Article  Google Scholar 

  16. Ellis CA, Keddara K, Rozenberg G (1995) Dynamic change within workflow systems. In: COOCS, pp 10–21

  17. van der Aalst WMP, van Dongen BF, Günther CW, Mans RS, de Medeiros AKA, Rozinat A, Rubin V, Song M, Verbeek HMWE, Weijters AJMM (2007) Prom 4.0: Comprehensive support for eal process analysis. In: Kleijn J, Yakovlev A (eds) ICATPN. Lecture Notes in Computer Science, vol 4546. Springer, Heidelberg, pp 484–494

  18. Gaaloul W, Godart C (2006) A workflow mining tool based on logs statistical analysis. In: Zhang K, Spanoudakis G, Visaggio G (eds) SEKE, pp 595–600

  19. Baïna K, Gaaloul W, Khattabi RE, Mouhou A (2006) Workflowminer: a new workflow patterns and performance analysis tool. In: 18th international conference on advanced information systems engineering (CAiSE’06) forum, Luxembourg, Grand-Duchy of Luxembourg

  20. van der Aalst WMP, van Dongen BF (2002) Discovering workflow performance models from timed logs. In: First international conference on engineering and deployment of cooperative information systems. Springer, Heidelberg, pp 45–63

  21. Weijters AJMM, van der Aalst WMP (2002) Workflow mining: discovering workflow models from event-based data. In: ECAI workshop on knowledge discovery and spatial Data, pp 78–84

  22. Herbst J, Karagiannis D (2004) Workflow mining with inwolve. Comput Ind 53(3): 245–264

    Article  Google Scholar 

  23. Schimm G (2002) Process miner—a tool for mining process schemes from event-based Data. In: European conference on logics in AI. Springer, Heidelberg, pp 525–528

  24. Gaaloul W, Baïna K, Godart C (2005) Towards mining structural workflow patterns. In: Andersen KV, Debenham JK, Wagner R (eds) DEXA. LNCS, vol 3588. Springer, Heidelberg, pp 24–33

  25. Bultan T, Fu X, Hull R, Su J (2003) Conversation specification: a new approach to design and analysis of e-service composition. In: Proceedings of the twelfth international conference on World Wide Web. ACM Press, NewYork, pp 403–410

  26. Hamadi R, Benatallah B (2003) A petri net-based model for web service composition. In: Proceedings of the Fourteenth Australasian database conference on database technologies 2003. Australian Computer Society, Inc., pp 191–200

  27. Sayal M, Casati F, Shan M, Dayal U (2002) Business process cockpit. In: Proceedings of 28th international conference on very large data Bases (VLDB’02), pp 880–883

  28. Grigori D, Casati F, Castellanos M, Dayal U, Sayal M, Shan MC (2004) Business process intelligence. Comput Ind 53(3): 321–343

    Article  Google Scholar 

  29. van der Aalst W, Dumas M, Ouyang C, Rozinat A, Verbeek H (2007) Conformance checking of service behavior. ACM Trans Internet Technol (TOIT). Special issue on Middleware for Service-Oriented Computing

  30. van der Aalst WMP (2004) Business alignment: Using process mining as a tool for delta analysis. In: CAiSE Workshops, vol 2, pp 138–145

  31. Benatallah B, Casati F, Toumani F (2004) Analysis and management of web service protocols. In: ER, pp 524–541

  32. Baïna K, Benatallah B, Casati F, Toumani F (2004) Model-driven web service development. In: CAiSE, pp 290–306

  33. Agrawal R, Gunopulos D, Leymann F (1998) Mining process models from workflow logs. Lect Notes Comput Sci 1377: 469–498

    Google Scholar 

  34. Cook JE, Wolf AL (1998) Discovering models of software processes from event-based data. ACM Trans Softw Eng Methodol (TOSEM) 7(3): 215–249

    Article  Google Scholar 

  35. Cook JE, Wolf AL (1998) Event-based detection of concurrency. In: Proceedings of the 6th ACM SIGSOFT international symposium on foundations of software engineering, ACM Press, NewYork, pp 35–45

  36. van der Aalst WMP, van Dongen BF, Herbst J, Maruster L, Schimm G, Weijters AJMM (2003) Workflow mining: a survey of issues and approaches. Data Knowl Eng 47(2): 237–267

    Article  Google Scholar 

  37. de Medeiros AKA, Weijters AJMM, van der Aalst WMP (2007) Genetic process mining: an experimental evaluation. Data Min Knowl Discov 14(2): 245–304

    Article  MathSciNet  Google Scholar 

  38. Bergenthum R, Desel J, Lorenz R, Mauser S (2007) Process mining based on regions of languages. In: Alonso G, Dadam P, Rosemann M (eds) BPM. Lecture Notes in Computer Science, vol 4714. Springer, Heidelberg, pp 375–383

  39. van der Aalst WMP, Reijers HA, Song M (2005) Discovering social networks from event logs. Comput Support Coop Work 14(6): 549–593

    Article  Google Scholar 

  40. van der Aalst WMP, de Beer HT, van Dongen BF (2005) Process mining and verification of properties: An approach based on temporal logic. In: Meersman R, Tari Z, Hacid MS, Mylopoulos J, Pernici B, Babaoglu Ö, Jacobsen HA, Loyall JP, Kifer M, Spaccapietra S (eds) OTM conferences (1). Lecture Notes in Computer Science, vol 3760. Springer, Heidelberg, pp 130–147

  41. Wen L, van der Aalst WMP, Wang J, Sun J (2007) Mining process models with non-free-choice constructs. Data Min Knowl Discov 15(2): 145–180

    Article  Google Scholar 

  42. Gaaloul W, Bhiri S, Godart C (2004) Discovering workflow transactional behaviour event-based log. In: 12th International conference on cooperative information systems (CoopIS’04). LNCS, Larnaca, Cyprus. Springer, Heidelberg

  43. Gaaloul W, Godart C (2005) Mining workflow recovery from event based logs. In: Bus process manage 3649:169–185

  44. Bhiri S, Gaaloul W, Godart C (2006) Discovering and improving recovery mechanisms of compositeweb services. In: ICWS. IEEE Computer Society, NewYork, pp 99–110

  45. Gaaloul W, Hauswirth M, Rouached M, Godart C (2007) Verifying composite service recovery mechanisms: a transactional approach based on event calculus. In: 15th International conference on cooperative information systems CoopIS07

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid Gaaloul.

Additional information

The work presented in this paper was partially supported by the EU funding under the SUPER project (FP6-026850) and by the Lion project supported by Science Foundation Ireland under Grant No. SFI/02/CE1/I131.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gaaloul, W., Baïna, K. & Godart, C. Log-based mining techniques applied to Web service composition reengineering. SOCA 2, 93–110 (2008). https://doi.org/10.1007/s11761-008-0023-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11761-008-0023-6

Keywords

Navigation