Abstract
In this paper, a Workflow-net based mathematical framework called Secure Workflow-net is proposed to enhance security attributes of service-specific overlays (SSO). The framework checks for resource accessibility privileges on an overlay node and grants access whenever credible. A formal method is provided to determine the accessibility and availability of resources intended for service subscribers. Additionally, a closed form theorem for framework soundness and lemmas to study the characteristics of the framework are introduced. Simulation results demonstrate how task coverage can still be achieved in an adequate timely manner when considering security issues to construct service composition workflows.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lua E, Crowcroft J, Pias M et al (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7:72–93
Masip-Bruin X, MarÃn-Tordera E, Tashakor G et al (2016) Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems. IEEE Wirel Commun 23:120–128
Zhu J, Chan D, Prabhu M, Natarajan P, Hu H, Bonomi F (2013) Improving web sites performance using edge servers in fog computing architecture. In: Proceedings IEEE 7th international symposium on service-oriented system engineering, Redwood City
Jalali F, Hinton K, Ayre R et al (2016) Fog computing may help to save energy in cloud computing. IEEE J Sel Areas Commun 34:1728–1739
Xia Y, Luo X, Li J, Zhu Q (2013) A Petri-net-based approach to reliability determination of ontology-based service compositions. IEEE Trans Syst Man Cybern Syst 43:1240–1247
Kotb Y, Badreddin E (2005) Synchronization among activities in a workflow using extended workflow Petri nets. In: Proceedings 7th IEEE international conference on e-commerce technology
Salah K, Calero JMA, Zeadally S et al (2012) Using cloud computing to implement a security overlay network. IEEE Secur Priv Mag 11:45–53
Mikolajczak B, Joshi S (2004) Modeling of information systems security features with colored Petri nets. In: Proceedings of 2004 IEEE international conference on systems, man and cybernetics, The Hague, vol 5, pp 4879–4884
Kassmi I, Jarir Z (2016) Security requirements in web service composition: formalization, integration, and verification. In: Proceedings 25th IEEE international conference on enabling technologies: infrastructure for collaborative enterprises, Paris
Kassmi I, Jarir Z (2015) Towards security and privacy in dynamic web service composition. In: Proceedings third world conference on complex systems, Marrakech
Amini M, Osanloo F (2016) Purpose-based privacy preserving access control for secure service provision and composition. IEEE Trans Serv Comput 55:1
Xi N, Sun C, Ma J, Shen Y, Lu D (2016) Distributed secure service composition with declassification in mobile network. In: Proceedings international conference on networking and network applications, Hakodate
Varadharajan V (1990) Petri net based modelling of information flow security requirements. In: The computer security foundations workshop, Franconia, NH
Castano S, Samarati P, Villa C (1993) Verifying system security using Petri nets. In: Proceedings IEEE international carnahan conference on security technology, Ottawa, ON
Sakib K, Tari Z, Bertok P (2014) Petri nets. In: Verification of communication protocols in web services: model-checking service compositions. Wiley-IEEE Press, p 272
Knorr K (2000) Dynamic access control through Petri net workflows. In: Proceedings 16th annual conference on computer security applications, New Orleans, LA
Juszczyszyn K (2003) Verifying enterprise’s mandatory access control policies with coloured Petri nets. In: Proceedings 12th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises
Kotb Y, Beauchemin S, Barron J (2012) Workflow nets for multiagent cooperation. IEEE Trans Autom Sci Eng 9:198–203
Tantitharanukul N, Natwichai J, Boonma P (2013) Workflow-based composite job scheduling for decentralized distributed systems. In: Proceedings 16th international conference on network-based information systems, Gwangju
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media Singapore
About this paper
Cite this paper
Al Ridhawi, I., Kotb, Y. (2018). A Secure Workflow-Net Model for Service-Specific Overlay Networks. In: Kim, K., Joukov, N. (eds) Mobile and Wireless Technologies 2017. ICMWT 2017. Lecture Notes in Electrical Engineering, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-10-5281-1_42
Download citation
DOI: https://doi.org/10.1007/978-981-10-5281-1_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5280-4
Online ISBN: 978-981-10-5281-1
eBook Packages: EngineeringEngineering (R0)