A view-based monitoring for usage control in web services
详细信息    查看全文
  • 作者:Hassina Meziane ; Salima Benbernou ; Mohand-Said Hacid…
  • 关键词:Privacy aware SLA ; Usage control ; Monitoring ; Usage flow view ; Query containment ; Compliance
  • 刊名:Distributed and Parallel Databases
  • 出版年:2016
  • 出版时间:June 2016
  • 年:2016
  • 卷:34
  • 期:2
  • 页码:145-178
  • 全文大小:3,018 KB
  • 参考文献:1.Amiri, K., Park, S., Tewari, R., Padmanabhan, S.: Scalable template-based query containment checking for web semantic caches. In: Proceedings of the 19th International Conference on Data Engineering. ICDE 2003, pp. 493–504. IEEE Computer Society, Bangalore (2003)
    2.Barbon, F., Traverso, P., Pistore, M., Trainotti, M.: Run-time monitoring of instances and classes of web service compositions. In: Proceedings of the IEEE International Conference on Web Services. ICWS 2006, pp. 63–71. IEEE Computer Society, Chicago, Illinois (2006)
    3.Baresi, L., Ghezzi, C., Guinea, S.: Smart monitors for composed services. In: Proceedings of the ICSOC 2004. Second International Conference on Service Oriented Computing, ICSOC 2004, pp. 193–202. ACM Press, New York (2004)
    4.Baresi, L., Guinea, S.: Towards dynamic monitoring of ws-bpel processes. In: Proceedings of the Third International Conference on Service Oriented Computing, ICSOC 2005, pp. 269–282. Springer, Amsterdam (2005)
    5.Beeri, C., Eyal, A., Milo, T., Pilberg, A.: Monitoring business processes with queries. In: Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB 2007, pp. 603–614. ACM, University of Vienna (2007)
    6.Beeri, C., Eyal, A., Milo, T.: A. Pilberg: Query-based monitoring of bpel business processes. In: Proceedings of the ACM SIGMOD International Conference on Management of Data. SIGMOD 2007, pp. 1122–1124. ACM, Beijing (2007)
    7.Beeri, C., Levy, A.Y., Rousset, M.C.: Rewriting queries using views in description logics. In: Proceedings of the Sixteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 99–108. ACM, Tucson (1997)
    8.Benbernou, S., Brandic, I., Cappiello, C., Carro, M., Comuzzi, M., Kertész, A., Kritikos, K., Parkin, M., Pernici, B., Plebani, P.: Modeling and negotiating service quality. In: S-CUBE Book, pp. 157–208. Springer, Berlin (2010)
    9.Benbernou, S., Cavallaro, L., Hacid, M.S., Kazhamiaki, R., Kecskemeti, G., Poizat, J., Silvestri, F., M. Uhlig, B.W.: State of the art report, gap analysis of knowledge on principles, techniques and methodologies for monitoring and adaptation of SBAs. S-Cube Deliverable PO-JRA 1(1) (2008)
    10.Benbernou, S., Meziane, H., Hacid, M.S.: Run-time monitoring for privacy-agreement compliance. In: Proceedings of the Fifth International Conference on Service Oriented Computing, ICSOC 2007, pp. 353–364. Springer, Vienna (2007)
    11.Benbernou, S., Meziane, H., Li, Y., Hacid, M.S.: A privacy agreement model for web services. In: Proceedings of the IEEE International Conference on Services Computing, SCC 2007, pp. 196–203. IEEE Computer Society, Salt Lake City (2007)
    12.Calvanese, D., Giacomo, G.D., Lenzerini, M.: Answering queries using views in description logics. In: Proceedings of the 6th International Workshop on Knowledge Representation meets Databases. KRDB 1999, pp. 6–10. CEUR-WS.org, Linkping (1999)
    13.Calvanese, D., Giacomo, G.D., Lenzerini, M.: Conjunctive query containment and answering under description logic constraints. TOCL 9(3), 22 (2008)MathSciNet CrossRef
    14.Calvanese, D., Giacomo, G.D., Lenzerini, M., Vardi, M.Y.: View-based query containment. In: Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. PODS 2003, pp. 56–67. ACM, San Diego (2003)
    15.Davidson, S., Khanna, S., Milo, T., Panigrahi, D., Roy, S.: Provenance views for module privacy. In: Proceedings of the 30th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. PODS 2011, pp. 175–186. ACM, Athens (2011)
    16.Davidson, S.B., Khanna, S., Roy, S., Stoyanovich, J., Tannen, V., Chen, Y.: On provenance and privacy. In: Proceedings of the Database Theory. 14th International Conference, ICDT 2011, pp. 3–10. ACM, Uppsala (2011)
    17.Davidson, S.B., Khanna, S., Tannen, V., Roy, S., Chen, Y., Milo, T., Stoyanovich, J.: Enabling privacy in provenance-aware workflow systems. In: Fifth Biennial Conference on Innovative Data Systems Research, CIDR 2011, pp. 215–218. Online Proceedings. www.​crdrdb.​org 2011, Asilomar, CA, USA (2011)
    18.Fabbri, D., LeFevre, K.: Explanation-based auditing. In: Proceedings of the 38th International Conference on Very Large Data Bases VLDB2012, Istanbul, pp. 1–12 (2012)
    19.Farre, C., Teniente, E., Urpi, T.: The constructive method for query containment checking. In: Proceedings of the 10th International Conference Database and Expert Systems Applications, DEXA 1999, pp. 583–593. Springer, Florence (1999)
    20.Farre, C., Teniente, E., Urpi, T.: Checking query containment with the CQC method. Data Knowl. Eng. 53(2), 163–223 (2005)CrossRef
    21.Ghanavati, S., Amyot, D., Peyton, L.: A requirements management framework for privacy compliance. In: Proceedings of the Workshop em Engenharia de Requisitos, WER 2007, Toronto, pp. 149–159 (2007)
    22.Halevy, A.Y.: Theory of answering queries using views. SIGMOD Rec. 29(4), 40–47 (2000)CrossRef
    23.Halevy, A.Y.: Answering queries using views: a survey. VLDB J. 10(4), 270–294 (2001)CrossRef MATH
    24.Kazhamiakin, R., Pandya, P., Pistore, M.: Representation, verification, and computation of timed properties in web. In: Proceedings of the IEEE International Conference on Web Services, ICWS 2006, pp. 497–504. IEEE Computer Society, Chicago (2006)
    25.Kolaitis, P., Vardi, M.Y.: Conjunctive-query containment and constraint satisfaction. In: Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 205–213. ACM, New York (1998)
    26.Korba, L., Wang, Y., Geng, L., Song, R., Yee, G., Patrick, A.S., Buffett, S., Liu, H., You, Y.: Private data discovery for privacy compliance in collaborative environments. In: Proceedings of the 5th International Conference Cooperative Design. Visualization, and Engineering, CDVE 2008, Lecture Notes in Computer Science, vol. 5220, pp. 142–150. Springer, Calvià (2008)
    27.Kritikos, K., Pernici, B., Plebani, P., Cappiello, C., Comuzzi, M., Benbernou, S., Brandic, I., Kertész, A., Parkin, M., Carro, M.: A survey on service quality description. ACM Comput. Surv. 46(1), 1 (2013)CrossRef
    28.Lazovik, A., Aiello, M., Papazoglou, M.: Associating assertions with business processes and monitoring their execution. In: Proceedings of the Second International Conference Service-Oriented Computing—ICSOC 2004, pp. 94–104. ACM, New York (2004)
    29.Levy, A.Y., Mendelzon, A.O., Sagiv, Y., Srivastava, D.: Answering queries using views. In: Proceedings of the Fourteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. PODS 1995, pp. 95–104. ACM, San Jose (1995)
    30.Mahbub, K., Spanoudakis, G.: Monitoring WS-agreement: an event calculus-based approach. In: Test and Analysis of Web Services, pp. 265–306. Springer, Berlin (2007)
    31.Mahbub, K., Spanoudakis, G.: Run-time monitoring of requirements for systems composed of web-services: Initial implementation and evaluation experience. In: Proceedings of the IEEE International Conference on Web Services, ICWS 2005, pp. 257–265. IEEE Computer Society, Orlando (2005)
    32.Meziane, H., Benbernou, S.: A dynamic privacy model for web services. Comput. Stand. Interfaces 32(5–6), 288–304 (2010). ElsevierCrossRef
    33.Meziane, H., Benbernou, S., Zerdali, A., Hacid, M.S., Papazoglou, M.: A view-based monitoring for privacy-aware web services. In: Proceedings of the 26th International Conference on Data Engineering, ICDE 2010, pp. 1129–1132. IEEE computer society, Long Beach (2010)
    34.Mont, M.C., Pearson, S., Thyne, R.: A systematic approach to privacy enforcement and policy compliance checking in enterprises. In: Proceedings of the Third International Conference Trust and Privacy in Digital Business, TrustBus 2006, pp. 91–102. Springer, Krakow (2006)
    35.Pearson, S., Allison, D.: A model-based privacy compliance checker. Int. J. E-Bus. Res. 5(2), 63–83 (2009)CrossRef
    36.Pearson, S., Allison, D.: Privacy compliance checking using a model-based approach. E-Business Applications for Product Development and Competitive Growth: Emerging Technologies, IGI GLOBAL, pp. 199–220 (2011)
    37.Pernici, B., Siadat, S.H., Benbernou, S., Ouziri, M.: A penalty-based approach for qos dissatisfaction using fuzzy rules. In: Proceedings of the 9th International Conference on Service-Oriented Computing, ICSOC 2011, pp. 574–581. Springer, Berlin (2011)
    38.Peyton, L., Nozin, M.: Tracking privacy compliance in b2b networks. In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, pp. 376–381. ACM, Delft (2004)
    39.Pistore, M., Traverso, P.: Assumption-based composition and monitoring of web services. In: Test and Analysis of Web Services, pp. 307–335. Springer, Berlin (2007)
    40.Pottinger, R., Halevy, A.Y.: Minicon: a scalable algorithm for answering queries using views. VLDB J. 10(2–3), 182–198 (2001)MATH
    41.Rahmouni, H.B., Solomonides, T., Mont, M.C., Shiu, S.: Privacy compliance in european healthgrid domains: an ontology-based approach. In: Proceedings of the Twenty-Second IEEE International Symposium on Computer-Based Medical Systems, CBMS 2009, pp. 1–8. IEEE Computer Society, Albuquerque (2009)
    42.Sebahi, S., Hacid, M.S.: Business process monitoring with BPath. In: Proceedings of the International Conferences on On the Move to Meaningful Internet Systems: OTM 2010—Confederated, CoopIS, IS, DOA and ODBASE, pp. 446–453. Springer, Berlin (2010)
    43.Simmonds, J., Gan, Y., Chechik, M., Nejati, S., O’Farrell, B., Litani, E., Waterhouse, J.: Runtime monitoring of web service conversations. IEEE Trans. Serv. Comput. 2(3), 223–244 (2009)CrossRef
    44.Song, R., Korba, L., Yee, G.: Privacy rights management for privacy compliance systems. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications, AINA 2007, pp. 620–625. IEEE Computer Society, Niagara Falls (2007)
    45.Spanoudakis, G., Mahbub, K.: Non-intrusive monitoring of service-based systems. IJCIS 15(3), 325–358 (2006)
    46.Squicciarini, A.C., Carminati, B., Karumanchi, S.: A privacy-preserving approach for web service selection and provisioning. In: Proceedings of the IEEE International Conference on Web Services, ICWS 2011, pp. 33–40. IEEE Computer Society, Washington (2011)
    47.Squicciarini, A.C., Casassa-Mont, M., Bertino, E., Bhargav-Spantzel, A.: Automatic compliance of privacy policies in federated digital identity management. Tech. Rep. HPL-2008-8, HP Laboratories Bristol (2008)
    48.Squicciarini, A.C., Mont, M.C., Spantzel, A.B., Bertino, E.: Automatic compliance of privacy policies in federated digital identity management. In: Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2008, pp. 89–92. IEEE Computer Society, New York (2008)
    49.Yee, G.: Visualization for privacy compliance. In: Proceedings of the 3rd Workshop on Visualization for Computer Security, VizSEC 2006, pp. 117–122. ACM, Alexandria (2006)
    50.Yee, G.: Visual analysis of privacy risks in web services. In: Proceedings of the IEEE International Conference on Web Services, ICWS 2007, pp. 671–678. IEEE Computer Society, Salt Lake City (2007)
    51.Yee, G.O.M.: Towards designing e-services that protect privacy. Int. J. Secur. Softw. Eng. 1(2), 18–34 (2010)CrossRef
    52.Yee, G., Korba, L.: Privacy policy compliance for web services. In: Proceedings of the IEEE International Conference on Web Services, ICWS 2004, pp. 158–165. IEEE Computer Society, San Diego (2004)
    53.Yee, G., Korba, L., Song, R.: Assessing the likelihood of privacy policy compliance. In: Proceedings of the IFIP TC-11 23rd International Information Security Conference IFIP 20th World Computer Congress, pp. 723–727. Springer, Milano (2008)
    54.Zemni, M.A., Benbernou, S., Carro, M.: A soft constraint-based approach to qos-aware service selection. In: Proceedings of the 8th International Conference on Service-Oriented Computing, ICSOC 2010, pp. 596–602. Springer, Berlin (2010)
  • 作者单位:Hassina Meziane (1) (2)
    Salima Benbernou (2)
    Mohand-Said Hacid (3)
    Zaki Malik (4)
    Mike Papazoglou (5)

    1. University of Oran, Es Senia, Algeria
    2. Université Paris Descartes, Paris, France
    3. Université Claude Bernard Lyon 1, Villeurbanne, France
    4. Wayne State University, Detroit, USA
    5. Tilburg University, Tilburg, The Netherlands
  • 刊物类别:Computer Science
  • 刊物主题:Database Management
    Data Structures
    Information Systems Applications and The Internet
    Operating Systems
    Memory Structures
  • 出版者:Springer Netherlands
  • ISSN:1573-7578
文摘
Quality of service (QoS) can be a critical element for achieving the business goals of a service provider, and accepting a service by the customer. The criticality is more pronounced when the service provider handles the non-functional QoS attribute of privacy, i.e., privacy related to the customer’s personal data. In this regard, the customer needs some guarantee(s) from the service provider about confidentiality management, leading to overall quality characterization of the provided service. A service level agreement (SLA) is primarily intended to specify (in terms of clauses) the level of such non-functional QoS delivered to the customer. The aim is to provide customers with tools that show the fulfillment of QoS guarantees, through SLA monitoring process. In this paper, we address the problem of usage control of private data in service based applications ensuring end-to-end QoS capabilities. We propose a query containment based approach to support the monitoring of privacy-aware SLA compliance, that spells out a customer’s privacy rights, and shows how the customer’s private information must be handled by a Web service provider. We introduce the private data usage flow model upon which the monitoring is performed to observe the data usage flow, and capture the privacy vulnerabilities that may lead to non-compliance. The model is built on top of (i) properties and time-related privacy requirements to be monitored, and (ii) a set of identified privacy violations. As proof of concept, a privacy aware SLA monitoring system, which is an easy-to-use, and efficient tool for observing the dynamic private data usage flow is developed. Experiment results indicate the relevance and applicability of the proposed approach.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700