Using Searchable Encryption for Privacy-Aware Orchestrated Web Service Composition

Imen Khabou, Mohsen Rouached, Alexandre Viejo, David Sanchez

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Among all the applications in which Web service composition may be applied, this paper focuses on a cloud-based scenario in which a business targets to outsource the execution of a certain complex service in exchange for some economical compensation. It propose a privacy-preserving orchestrated Web service compositions system using a symmetric searchable encryption primitive. The new proposal ensures that the composer is not able to access the data of the users as well as any information on invoked activities, whereas service providers are able to access only the portions of user preferences and service parameters needed for the correct execution of the specific and atomic assigned activities.

Original languageEnglish
Title of host publicationProceedings - 13th International Conference on Computational Intelligence and Security, CIS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages307-311
Number of pages5
Volume2018-January
ISBN (Electronic)9781538648223
DOIs
Publication statusPublished - Feb 8 2018
Event13th International Conference on Computational Intelligence and Security, CIS 2017 - Hong Kong, Hong Kong
Duration: Dec 15 2017Dec 18 2017

Other

Other13th International Conference on Computational Intelligence and Security, CIS 2017
Country/TerritoryHong Kong
CityHong Kong
Period12/15/1712/18/17

Keywords

  • Composition
  • orchestration
  • Privacy
  • Web services

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Signal Processing
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Using Searchable Encryption for Privacy-Aware Orchestrated Web Service Composition'. Together they form a unique fingerprint.

Cite this