Skip to main content

A Secure Workflow-Net Model for Service-Specific Overlay Networks

  • Conference paper
  • First Online:
Mobile and Wireless Technologies 2017 (ICMWT 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 425))

Included in the following conference series:

Abstract

In this paper, a Workflow-net based mathematical framework called Secure Workflow-net is proposed to enhance security attributes of service-specific overlays (SSO). The framework checks for resource accessibility privileges on an overlay node and grants access whenever credible. A formal method is provided to determine the accessibility and availability of resources intended for service subscribers. Additionally, a closed form theorem for framework soundness and lemmas to study the characteristics of the framework are introduced. Simulation results demonstrate how task coverage can still be achieved in an adequate timely manner when considering security issues to construct service composition workflows.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lua E, Crowcroft J, Pias M et al (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7:72–93

    Article  Google Scholar 

  2. Masip-Bruin X, Marín-Tordera E, Tashakor G et al (2016) Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems. IEEE Wirel Commun 23:120–128

    Article  Google Scholar 

  3. Zhu J, Chan D, Prabhu M, Natarajan P, Hu H, Bonomi F (2013) Improving web sites performance using edge servers in fog computing architecture. In: Proceedings IEEE 7th international symposium on service-oriented system engineering, Redwood City

    Google Scholar 

  4. Jalali F, Hinton K, Ayre R et al (2016) Fog computing may help to save energy in cloud computing. IEEE J Sel Areas Commun 34:1728–1739

    Article  Google Scholar 

  5. Xia Y, Luo X, Li J, Zhu Q (2013) A Petri-net-based approach to reliability determination of ontology-based service compositions. IEEE Trans Syst Man Cybern Syst 43:1240–1247

    Article  Google Scholar 

  6. Kotb Y, Badreddin E (2005) Synchronization among activities in a workflow using extended workflow Petri nets. In: Proceedings 7th IEEE international conference on e-commerce technology

    Google Scholar 

  7. Salah K, Calero JMA, Zeadally S et al (2012) Using cloud computing to implement a security overlay network. IEEE Secur Priv Mag 11:45–53

    Google Scholar 

  8. Mikolajczak B, Joshi S (2004) Modeling of information systems security features with colored Petri nets. In: Proceedings of 2004 IEEE international conference on systems, man and cybernetics, The Hague, vol 5, pp 4879–4884

    Google Scholar 

  9. Kassmi I, Jarir Z (2016) Security requirements in web service composition: formalization, integration, and verification. In: Proceedings 25th IEEE international conference on enabling technologies: infrastructure for collaborative enterprises, Paris

    Google Scholar 

  10. Kassmi I, Jarir Z (2015) Towards security and privacy in dynamic web service composition. In: Proceedings third world conference on complex systems, Marrakech

    Google Scholar 

  11. Amini M, Osanloo F (2016) Purpose-based privacy preserving access control for secure service provision and composition. IEEE Trans Serv Comput 55:1

    Article  Google Scholar 

  12. Xi N, Sun C, Ma J, Shen Y, Lu D (2016) Distributed secure service composition with declassification in mobile network. In: Proceedings international conference on networking and network applications, Hakodate

    Google Scholar 

  13. Varadharajan V (1990) Petri net based modelling of information flow security requirements. In: The computer security foundations workshop, Franconia, NH

    Google Scholar 

  14. Castano S, Samarati P, Villa C (1993) Verifying system security using Petri nets. In: Proceedings IEEE international carnahan conference on security technology, Ottawa, ON

    Google Scholar 

  15. Sakib K, Tari Z, Bertok P (2014) Petri nets. In: Verification of communication protocols in web services: model-checking service compositions. Wiley-IEEE Press, p 272

    Google Scholar 

  16. Knorr K (2000) Dynamic access control through Petri net workflows. In: Proceedings 16th annual conference on computer security applications, New Orleans, LA

    Google Scholar 

  17. Juszczyszyn K (2003) Verifying enterprise’s mandatory access control policies with coloured Petri nets. In: Proceedings 12th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises

    Google Scholar 

  18. Kotb Y, Beauchemin S, Barron J (2012) Workflow nets for multiagent cooperation. IEEE Trans Autom Sci Eng 9:198–203

    Article  Google Scholar 

  19. Tantitharanukul N, Natwichai J, Boonma P (2013) Workflow-based composite job scheduling for decentralized distributed systems. In: Proceedings 16th international conference on network-based information systems, Gwangju

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ismaeel Al Ridhawi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media Singapore

About this paper

Cite this paper

Al Ridhawi, I., Kotb, Y. (2018). A Secure Workflow-Net Model for Service-Specific Overlay Networks. In: Kim, K., Joukov, N. (eds) Mobile and Wireless Technologies 2017. ICMWT 2017. Lecture Notes in Electrical Engineering, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-10-5281-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5281-1_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5280-4

  • Online ISBN: 978-981-10-5281-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics