Advertisement

Automation of Privacy Preserving BPMS in Collaborative Cloud-Based Business Processes

  • Sergei Makarov
  • Björn Schwarzbach
  • Michael Glöckner
  • Bogdan Franczyk
  • André Ludwig
Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 311)

Abstract

Collaboration in business environments is an ongoing trend that is enabled by and based on cloud computing. It supports flexible and ad-hoc reconfiguration and integration of different services, which are provided and used via the internet, and implemented within business processes. This is an important competitive advantage for the participating stakeholders. However, trust, policy compliance, and data privacy are emerging issues that result from the distributed data handling in cloud-based business processes. In an earlier paper, we have discussed the requirements that a Business Process Management System (BPMS) should meet in order to enable privacy preserving business process as a service. This paper presents the necessary steps for implementing such a BPMS for an architecture to enable management of privacy-preserving collaborative business process.

Keywords

Privacy Business process BPMS Cloud Implementation 

References

  1. 1.
    Schwarzbach, B., Franczyk, B., Petrich, L., Schier, A., Hompel, M.T.: Cloud based privacy preserving collaborative business process management. In: 2016 IEEE International Conference on Computer and Information Technology (CIT), pp. 716–723. IEEE (2016)Google Scholar
  2. 2.
    Schier, A., Petrich, L., ten Hompel, M., Schwarzbach, B., Franczyk, B.: Cloud-Architektur für Privacy-Management in kollaborativen Logistikprozessen. Logist. J. 2192, 1 (2016)Google Scholar
  3. 3.
    Schmelzer, H.J., Sesselmann, W.: Geschäftsprozessmanagement in der Praxis. Kunden zufriedenstellen, Produktivität steigern, Wert erhöhen: [das Standardwerk]. Hanser, München (2013)Google Scholar
  4. 4.
    Li, Z., Keung, J.: Software cost estimation framework for service-oriented architecture systems using divide-and-conquer approach. In: Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE), Proceedings, 4–5 June 2010, Nanjing, China, pp. 47–54. IEEE, Piscataway (2010)Google Scholar
  5. 5.
    Becker, J., Kugeler, M., Rosemann, M. (eds.): Prozessmanagement. Ein Leitfaden zur prozessorientierten Organisationsgestaltung. Springer Gabler, Berlin (2012).  https://doi.org/10.1007/b138686 Google Scholar
  6. 6.
    Hugos, M.H., Hulitzky, D.: Business in the Cloud. What Every Business Needs to Know About Cloud Computing. Wiley, Hoboken (2011)Google Scholar
  7. 7.
    Schwarzbach, B., Glöckner, M., Makarov, S., Franczyk, B., Ludwig, A.: Privacy preserving BPMS for collaborative BPaaS, pp. 925–934. IEEE (2017)Google Scholar
  8. 8.
    Mertens, P., Bodendorf, F., König, W., Picot, A., Schumann, M., Hess, T.: Grundzüge der Wirtschaftsinformatik. Springer, Berlin (2012).  https://doi.org/10.1007/978-3-642-30515-3 CrossRefGoogle Scholar
  9. 9.
    Euting, S., Janiesch, C., Fischer, R., Tai, S., Weber, I.: Scalable business process execution in the cloud. In: 2014 International Conference on Communications and Networking (ComNet), 19–22 March 2014, Hammamet, Tunisia, pp. 175–184. IEEE, Piscataway (2014)Google Scholar
  10. 10.
    Megersa, B.T., Zhu, W.: Cloud-enabled business process management. Int. J. Comput. Theory Eng. 4, 690 (2012)CrossRefGoogle Scholar
  11. 11.
    Woitsch, R., Utz, W.: Business process as a service. Model based business and IT cloud alignment as a cloud offering. In: 2015 International Conference on Enterprise Systems (ES), pp. 121–130. IEEE (2015)Google Scholar
  12. 12.
    Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, Zhejiang, China, 23–25 March 2012, pp. 647–651. IEEE, Piscataway (2012)Google Scholar
  13. 13.
    Rodriguez, A., Fernandez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. E90-D, 745–752 (2007)CrossRefGoogle Scholar
  14. 14.
    Backes, M., Pfitzmann, B., Waidner, M.: Security in business process engineering. In: van der Aalst, W.M.P., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 168–183. Springer, Heidelberg (2003).  https://doi.org/10.1007/3-540-44895-0_12 CrossRefGoogle Scholar
  15. 15.
    Herrmann, G., Pernul, G.: Viewing business-process security from different perspectives. Int. J. Electron. Commer. 3, 89–103 (2015)CrossRefGoogle Scholar
  16. 16.
    Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)CrossRefGoogle Scholar
  17. 17.
    Venable, J., Pries-Heje, J., Baskerville, R.: FEDS: a framework for evaluation in design science research. Eur. J. Inf. Syst., 1–13 (2014)Google Scholar
  18. 18.
    Hevner, A., March, S., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28, 75–105 (2004)CrossRefGoogle Scholar
  19. 19.
    Wiliam, D., Black, P.: Meanings and consequences: a basis for distinguishing formative and summative functions of assessment? Br. Educ. Res. J. 22, 537–548 (1996)CrossRefGoogle Scholar
  20. 20.
    Sun, Y., Kantor, P.B.: Cross-evaluation: a new model for information system evaluation. J. Am. Soc. Inf. Sci. Technol. 57, 614–628 (2006)CrossRefGoogle Scholar
  21. 21.
    Mathiassen, L., Munk-Madsen, A., Nielsen, P.A., Stage, J., Jacksen, M.: Object-Oriented Analysis & Design. Marko, Aalborg (2000)Google Scholar
  22. 22.
    Smithson, S., Hirschheim, R.: Analysing information systems evaluation: another look at an old problem. Eur. J. Inf. Syst. 7, 158–174 (1998)CrossRefGoogle Scholar
  23. 23.
    Stufflebeam, D.L.: The CIPP model for evaluation. In: Kellaghan, T., Stufflebeam, D.L. (eds.) International Handbook of Educational Evaluation, vol. 9, pp. 31–62. Springer, Dordrecht (2003).  https://doi.org/10.1007/978-94-010-0309-4_4 CrossRefGoogle Scholar
  24. 24.
    jboss.org. Community Documentation: jBPM Documentation. https://docs.jboss.org/jbpm/release/6.4.0.Final/jbpm-docs/html_single/
  25. 25.
    Fiorini, S.: Mastering jBPM6. Design, Build, and Deploy Business Process-Centric Applications Using the Cutting-Edge jBPM Technology Stack. Packt Publishing, Birmingham (2015)Google Scholar
  26. 26.
    Berenson, H., Bernstein, P., Gray, J., Melton, J., O’Neil, E., O’Neil, P.: A critique of ANSI SQL isolation levels. SIGMOD Rec. 24, 1–10 (1995)CrossRefGoogle Scholar
  27. 27.
    Subramaniam, V., Hogan, B.P. (eds.): Programming Concurrency on the JVM. Mastering Synchronization, STM, and Actors. Pragmatic Bookshelf, Raleigh (2011)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Sergei Makarov
    • 1
  • Björn Schwarzbach
    • 1
  • Michael Glöckner
    • 1
  • Bogdan Franczyk
    • 1
  • André Ludwig
    • 2
  1. 1.Information Systems InstituteLeipzig UniversityLeipzigGermany
  2. 2.Kühne Logistics UniversityHamburgGermany

Personalised recommendations