Skip to main content
Log in

Preserving privacy information flow security in composite service evolution

  • Published:
Frontiers of Information Technology & Electronic Engineering Aims and scope Submit manuscript

Abstract

After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. We propose an approach to preserve privacy information flow security in composite service evolution. First, a privacy data item dependency analysis method based on a Petri net model is presented. Then the set of privacy data items collected by each component service is derived through a privacy data item dependency graph, and the security scope of each component service is calculated. Finally, the evolution operations that preserve privacy information flow security are defined. By applying these evolution operations, the re-verification process is avoided and the evolution efficiency is improved. To illustrate the effectiveness of our approach, a case study is presented. The experimental results indicate that our approach has high evolution efficiency and can greatly reduce the cost of evolution compared with re-verifying the entire composite service.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Accorsi R, Lehmann A, Lohmann N, 2015. Information leak detection in business process models: theory, application, and tool support. Inform Syst, 47:244–257. https://doi.org/10.1016/j.is.2013.12.006

    Article  Google Scholar 

  • Alam KA, Ahmad R, Akhunzada A, et al., 2015. Impact analysis and change propagation in service-oriented enterprises: a systematic review. Inform Syst, 54:43–73. https://doi.org/10.1016/j.is.2015.06.003

    Article  Google Scholar 

  • Andrikopoulos V, Benbernou S, Papazoglou MP, 2012. On the evolution of services. IEEE Trans Softw Eng, 38(3):609–628. https://doi.org/10.1109/TSE.2011.22

    Article  Google Scholar 

  • Bacon J, Eyers D, Pasquier TFJM, et al., 2014. Information flow control for secure cloud computing. IEEE Trans Netw Serv Manag, 11(1):76–89. https://doi.org/10.1109/TNSM.2013.122313.130423

    Article  Google Scholar 

  • Bell DE, LaPadula LJ, 1973. Secure computer systems: mathematical foundations. Technical Report, No. 2547. MITRE Corporation, Massachusetts, USA.

    Google Scholar 

  • Bishop M, 2002. Computer Security: Art and Science. Addison Wesley, New Jersey, USA.

    Google Scholar 

  • Denning DE, 1976. A lattice model of secure information flow. Commun ACM, 19(5):236–243. https://doi.org/10.1145/360051.360056

    Article  MathSciNet  MATH  Google Scholar 

  • Fokaefs M, Mikhaiel R, Tsantalis N, et al., 2011. An empirical study on web service evolution. 9th IEEE Int Conf on Web Services, p.49–56. https://doi.org/10.1109/ICWS.2011.114

    Google Scholar 

  • Knorr K, 2001. Multilevel security and information flow in Petri net workflows. 9th Int Conf on Telecommunication Systems, p.613–615.

    Google Scholar 

  • Liu C, Duan H, Zeng Q, et al., 2016. Towards comprehensive support for privacy preservation cross-organization business process mining. IEEE Trans Serv Comput, in press. https://doi.org/10.1109/TSC.2016.2617331

    Google Scholar 

  • Liu G, Reisig W, Jiang C, et al., 2016. A branching-processbased method to check soundness of workflow systems. IEEE Access, 4:4104–4118. https://doi.org/10.1109/ACCESS.2016.2597061

    Article  Google Scholar 

  • Liu L, Zhu H, Huang Z, 2011. Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms. Expert Syst Appl, 38(4):4540–4549. https://doi.org/10.1016/j.eswa.2010.09.128

    Article  Google Scholar 

  • Lohmann N, Massuthe P, Stahl C, et al., 2006. Analyzing interacting BPEL processes. 4th Int Conf on Business Process Management, p.17–32. https://doi.org/10.1007/11841760_3

    Chapter  Google Scholar 

  • Peng HF, Huang ZQ, Liu LY, et al., 2017. Static analysis method of secure privacy information flow for service composition. J Softw, in press.

    Google Scholar 

  • Qi SS, Li BX, Liu CC, et al., 2012. A trust impact analysis model for composite service evolution. 19th IEEE Asia-Pacific Software Engineering Conf, p.73–78. https://doi.org/10.1109/APSEC.2012.30

    Google Scholar 

  • She W, Yen IL, Thuraisingham B, et al., 2011. Rule-based run-time information flow control in service cloud. 9th IEEE Int Conf on Web Services, p.524–531. https://doi.org/10.1109/ICWS.2011.35

    Google Scholar 

  • Song W, Ma XX, Cheung SC, et al., 2010. Preserving data flow correctness in process adaptation. 7th IEEE Int Conf on Services Computing, p.9–16. https://doi.org/10.1109/SCC.2010.24

    Google Scholar 

  • Tan W, Fan YS, Zhou MC, 2009. A Petri net-based method for compatibility analysis and composition of web services in business process execution language. IEEE Trans Autom Sci, 6(1):94–106. https://doi.org/10.1109/TASE.2008.916747

    Article  Google Scholar 

  • van der Aalst WMP, 1997. Verification of workflow nets. 18th Int Conf on Application and Theory of Petri Nets, p.407–426. https://doi.org/10.1007/3-540-63139-9_48

    Google Scholar 

  • Wang SY, Capretz MAM, 2009. A dependency impact analysis model for web services evolution. 7th IEEE Int Conf on Web Services, p.359–365. https://doi.org/10.1109/ICWS.2009.62

    Google Scholar 

  • Wang SY,Capretz MAM, 2011. Dependency and entropy based impact analysis for service-oriented system evolution. 10th IEEE/WIC/ACM Int Conf on Web Intelligence and Intelligent Agent Technology, p.412–417. https://doi.org/10.1109/WI-IAT.2011.196

    Google Scholar 

  • Wang Y, Wang Y, 2013. A survey of change management in service-based environments. Serv Orient Comput Appl, 7(4):259–273. https://doi.org/10.1007/s11761-013-0128-4

    Article  Google Scholar 

  • Wang Y, Yang J, Zhao WL, et al., 2012. Change impact analysis in service-based business processes. Serv Orient Comput Appl, 6(2):131–149. https://doi.org/10.1007/s11761-011-0093-8

    Article  Google Scholar 

  • Xi N, Sun C, Ma JF, et al., 2015. Secure service composition with information flow control in service clouds. Fut Gener Comput Syst, 49:142–148. https://doi.org/10.1016/j.future.2014.12.009

    Article  Google Scholar 

  • Yu WY, Yan CG, Ding ZJ, et al., 2014. Modeling and validating e-commerce business process based on Petri nets. IEEE Trans Syst Man Cybern Syst, 44(3):327–341. https://doi.org/10.1109/TSMC.2013.2248358

    Article  Google Scholar 

  • Yu WY, Yan CG, Ding ZJ, et al., 2016. Modeling and verification of online shopping business processes by considering malicious behavior patterns. IEEE Trans Autom Sci Eng, 13(2):647–662. https://doi.org/10.1109/TASE.2014.2362819

    Article  Google Scholar 

  • Zeng J, Sun HL, Liu XD, et al., 2010. PRV: an approach to process model refactoring in evolving process-aware information systems. 7th IEEE Int Conf on Services Computing, p.441–448. https://doi.org/10.1109/SCC.2010.19

    Google Scholar 

  • Zeng W, Koutny M, Watson P, et al., 2016. Formal verification of secure information flow in cloud computing. J Inform Secur Appl, 27:103–116. https://doi.org/10.1016/j.jisa.2016.03.002

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi-qiu Huang.

Additional information

Project supported by the National Natural Science Foundation of China (Nos. 61562087 and 61772270), the National High-Tech Ramp;D Program (863) of China (No. 2015AA015303), the Natural Science Foundation of Jiangsu Province, China (No. BK20130735), the Universities Natural Science Foundation of Jiangsu Province, China (No. 13KJB520011), and the Science Foundation of Nanjing Institute of Technology, China (No. YKJ201420)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peng, Hf., Huang, Zq., Liu, Ly. et al. Preserving privacy information flow security in composite service evolution. Frontiers Inf Technol Electronic Eng 19, 626–638 (2018). https://doi.org/10.1631/FITEE.1700359

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/FITEE.1700359

Key words

CLC number

Navigation