skip to main content
10.1145/2837185.2837240acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Enhancing web services compositions with privacy capabilities

Published: 11 December 2015 Publication History

Abstract

Web service composition has been extensively studied in recent years. Although a lot of new models and mechanisms have been proposed, many issues in service composition still remain unsolved. Among them, privacy is one of the major concerns. Indeed, inheriting characteristics of Web services environments such as high dynamism and untrustworthiness often generate conflicting privacy specifications with respect to the data exchanged within a composition. Even existing technologies for managing and applying data privacy policies are unsuccessful when dealing with this kind of applications as they involve autonomous entities and continuously exchange huge amount of heterogeneous information. This made urgent to have in place effective technologies for data privacy management in service compositions. These technologies should (1) deal with the flexibility, scalability, and heterogeneity in the overall infrastructure in which data are exchanged; and (2) integrate privacy concerns into the development process of these compositions. In this context, this paper tackles the problem of modeling, managing and preserving privacy in Web service composition processes. More specifically, we propose a first step towards providing a privacy preserving Web service composition approach that enables to (i) model and specify privacy policies, preferences, and requirements both at the client and at the provider sides, (ii) enforce the privacy model and build privacy aware compositions, (iii) verify the compliance between users privacy requirements and providers privacy policies, (iv) rank the composite Web services with respect to the privacy level they offer, and (v) provide privacy aware recovery actions to deal with incompatibilities.

References

[1]
A. Abid, N. Messai, M. Rouached, T. Devogele, and M. Abid. IDECSE: A semantic integrated development environment for composite services engineering. In Joint Proceedings of the CAiSE 2014 Forum and CAiSE 2014 Doctoral Consortium co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), Thessaloniki, Greece, June 18-20, 2014., pages 105--112, 2014.
[2]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proceedings of the 28th International Conference on Very Large Data Bases, VLDB '02, pages 143--154. VLDB Endowment, 2002.
[3]
R. Agrawal and R. Srikant. Privacy-preserving data mining. SIGMOD Rec., 29(2):439--450, May 2000.
[4]
N. Ammar, Z. Malik, B. Medjahed, and M. Alodib. K-anonymity based approach for privacy-preserving web service selection. In 2015 IEEE International Conference on Web Services, ICWS 2015, New York, NY, USA, June 27 - July 2, 2015, pages 281--288, 2015.
[5]
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. H. Drielsma, P. C. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The avispa tool for the automated validation of internet security protocols and applications. In Proceedings of the 17th International Conference on Computer Aided Verification, CAV'05, pages 281--285, Berlin, Heidelberg, 2005. Springer-Verlag.
[6]
G. Baryannis, O. Danylevych, D. Karastoyanova, K. Kritikos, P. Leitner, F. Rosenberg, and B. Wetzstein. Service composition. In Service Research Challenges and Solutions for the Future Internet - S-Cube - Towards Engineering, Managing and Adapting Service-Based Systems, pages 55--84, 2010.
[7]
T. Berners-Lee and D. Connolly. Notation3 (n3): A readable rdf syntax. W3c team submission, W3C, January 2008.
[8]
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proceedings of the 4th Conference on Theory of Cryptography, TCC'07, pages 535--554, Berlin, Heidelberg, 2007. Springer-Verlag.
[9]
B. Carminati, E. Ferrari, and N. H. Tran. A privacy-preserving framework for constrained choreographed service composition. In 2015 IEEE International Conference on Web Services, ICWS 2015, New York, NY, USA, June 27 - July 2, 2015, pages 297--304, 2015.
[10]
B.-C. Chen, D. Kifer, K. LeFevre, and A. Machanavajjhala. Privacy-preserving data publishing. Found. Trends databases, 2(1-2):1--167, Jan. 2009.
[11]
E. Costante, F. Paci, and N. Zannone. Privacy-aware web service composition and ranking. In IEEE 20th International Conference on Web Services (ICWS), 2013, pages 131--138. IEEE, 2013.
[12]
L. Cranor, M. Langheinrich, and M. Marchiori. A p3p preference exchange language, 2002.
[13]
M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 1--19. Springer Berlin Heidelberg, 2004.
[14]
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv., 42(4):14:1--14:53, June 2010.
[15]
B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In Proceedings of the 21st International Conference on Data Engineering, ICDE '05, pages 205--216, Washington, DC, USA, 2005. IEEE Computer Society.
[16]
R. Hewett and P. Kijsanayothin. Privacy and recovery in composite web service transactions. International Journal for Infonomics, 3(2):240--248, 2010.
[17]
G. M. Kapitsaki. Reflecting user privacy preferences in context-aware web services. In Web Services (ICWS), 2013 IEEE 20th International Conference on, pages 123--130. IEEE, 2013.
[18]
G. Karjoth, M. Schunter, and E. Van Herreweghen. Translating privacy practices into privacy promises-how to promise what you can keep. In Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pages 135--146. IEEE, 2003.
[19]
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. DeWitt. Limiting disclosure in hippocratic databases. In Proceedings of the Thirtieth International Conference on Very Large Data Bases - Volume 30, VLDB '04, pages 108--119. VLDB Endowment, 2004.
[20]
L. Liu, Z. Huang, F. Xiao, G. Shen, and H. Zhu. Verification of privacy requirements in web services composition. In 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), 2010., pages 117--122. IEEE, 2010.
[21]
J. Lu, Z. Huang, and C. Ke. Verification of behavior-aware privacy requirements in web services composition. Journal of Software, 9(4), 2014.
[22]
Z. Ma, J. Manglery, C. Wagner, and T. Bleier. Enhance data privacy in service compositions through a privacy proxy. In Sixth International Conference on Availability, Reliability and Security (ARES), 2011, pages 615--620. IEEE, 2011.
[23]
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1), Mar. 2007.
[24]
N. Mohammed, B. Fung, K. Wang, and P. C. Hung. Privacy-preserving data mashup. In Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pages 228--239. ACM, 2009.
[25]
S. Mokarizadeh, N. Dokoohaki, M. Matskin, and P. Küngas. Trust and privacy enabled service composition using social experience. In 10th IFIP Conference on Software Services for e-World - e-Business, e-Services, and e-Society, I3E 2010, pages 226--236, 2010.
[26]
J. Reagle and L. F. Cranor. The platform for privacy preferences. Commun. ACM, 42(2):48--55, Feb. 1999.
[27]
B. Riedl, T. Neubauer, G. Goluch, O. Boehm, G. Reinauer, and A. Krumboeck. A secure architecture for the pseudonymization of medical data. In Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pages 318--324, 2007.
[28]
J. D. Roo. Euler yet another proof engine, 1999âĂŞ2013.
[29]
M. Rouached and N. Messai. Scome: A web services composition modeling and engineering framework. In 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, WI 2013, Atlanta, GA, USA, November 17-20, 2013, pages 481--486, 2013.
[30]
Q. Z. Sheng, X. Qiao, A. V. Vasilakos, C. Szabo, S. Bourne, and X. Xu. Web services composition: A decade overview. Information Sciences, 280(0):218--238, 2014.
[31]
A. Squicciarini, B. Carminati, and S. Karumanchi. A privacy-preserving approach for web service selection and provisioning. In IEEE International Conference on Web Services (ICWS), 2011, pages 33--40. IEEE, 2011.
[32]
L. Sweeney. K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557--570, Oct. 2002.
[33]
S.-E. Tbahriti, C. Ghedira, B. Medjahed, and M. Mrissa. Privacy-enhanced web service composition. IEEE Transactions on Services Computing, page 1, 2013.
[34]
E. I. Tim Moses. extensible access control markup language (xacml) version 2.0, 2005.
[35]
A. Tumer, A. Dogac, and I. H. Toroslu. A semantic-based user privacy protection framework for web services. In Intelligent Techniques for Web Personalization, pages 289--305. Springer, 2005.
[36]
R. Verborgh, V. Haerinck, T. Steiner, D. V. Deursen, S. V. Hoecke, J. D. Roo, R. V. de Walle, and J. Gabarró. Functional composition of sensor web apis. In Proceedings of the 5th International Workshop on Semantic Sensor Networks, SSN12, Boston, Massachusetts, USA, November 12, 2012, pages 65--80, 2012.
[37]
W. Xu, V. Venkatakrishnan, R. Sekar, and I. Ramakrishnan. A framework for building privacy-conscious composite web services. In International Conference on Web Services, ICWS'06. 2006., pages 655--662. IEEE, 2006.

Cited By

View all
  • (2021)Web Service Composition SecurityInternational Journal of Service Science, Management, Engineering, and Technology10.4018/IJSSMET.202105010912:3(154-174)Online publication date: 1-May-2021
  • (2021)Privacy-Preserving Orchestrated Web Service Composition with Untrusted BrokersResearch Anthology on Privatizing and Securing Data10.4018/978-1-7998-8954-0.ch047(1023-1050)Online publication date: 2021
  • (2020)Privacy-Preserving Service Composition with Enhanced Flexibility and EfficiencyTrust, Privacy and Security in Digital Business10.1007/978-3-030-58986-8_8(109-124)Online publication date: 14-Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
iiWAS '15: Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services
December 2015
704 pages
ISBN:9781450334914
DOI:10.1145/2837185
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 December 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. compliance
  2. composition
  3. privacy
  4. web services

Qualifiers

  • Research-article

Conference

iiWAS '15

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Web Service Composition SecurityInternational Journal of Service Science, Management, Engineering, and Technology10.4018/IJSSMET.202105010912:3(154-174)Online publication date: 1-May-2021
  • (2021)Privacy-Preserving Orchestrated Web Service Composition with Untrusted BrokersResearch Anthology on Privatizing and Securing Data10.4018/978-1-7998-8954-0.ch047(1023-1050)Online publication date: 2021
  • (2020)Privacy-Preserving Service Composition with Enhanced Flexibility and EfficiencyTrust, Privacy and Security in Digital Business10.1007/978-3-030-58986-8_8(109-124)Online publication date: 14-Sep-2020
  • (2019)Multimedia Data Archive Application in Cloud EnvironmentProceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017)10.1007/978-981-13-7279-7_8(61-68)Online publication date: 28-Mar-2019
  • (2018)Privacy-Preserving Orchestrated Web Service Composition with Untrusted BrokersInternational Journal of Information Technology and Web Engineering10.4018/IJITWE.201810010513:4(78-103)Online publication date: 1-Oct-2018
  • (2018)REST web service composition: A survey of automation and techniques2018 International Conference on Information Networking (ICOIN)10.1109/ICOIN.2018.8343096(116-121)Online publication date: Jan-2018
  • (2017)Using Searchable Encryption for Privacy-Aware Orchestrated Web Service Composition2017 13th International Conference on Computational Intelligence and Security (CIS)10.1109/CIS.2017.00073(307-311)Online publication date: Dec-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media