Imen Khabou, M. Rouached, Alexandre Viejo, David Sánchez
{"title":"使用可搜索加密的隐私感知编排Web服务组合","authors":"Imen Khabou, M. Rouached, Alexandre Viejo, David Sánchez","doi":"10.1109/CIS.2017.00073","DOIUrl":null,"url":null,"abstract":"Among all the applications in which Web service composition may be applied, this paper focuses on a cloud-based scenario in which a business targets to outsource the execution of a certain complex service in exchange for some economical compensation. It propose a privacy-preserving orchestrated Web service compositions system using a symmetric searchable encryption primitive. The new proposal ensures that the composer is not able to access the data of the users as well as any information on invoked activities, whereas service providers are able to access only the portions of user preferences and service parameters needed for the correct execution of the specific and atomic assigned activities.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Using Searchable Encryption for Privacy-Aware Orchestrated Web Service Composition\",\"authors\":\"Imen Khabou, M. Rouached, Alexandre Viejo, David Sánchez\",\"doi\":\"10.1109/CIS.2017.00073\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Among all the applications in which Web service composition may be applied, this paper focuses on a cloud-based scenario in which a business targets to outsource the execution of a certain complex service in exchange for some economical compensation. It propose a privacy-preserving orchestrated Web service compositions system using a symmetric searchable encryption primitive. The new proposal ensures that the composer is not able to access the data of the users as well as any information on invoked activities, whereas service providers are able to access only the portions of user preferences and service parameters needed for the correct execution of the specific and atomic assigned activities.\",\"PeriodicalId\":304958,\"journal\":{\"name\":\"2017 13th International Conference on Computational Intelligence and Security (CIS)\",\"volume\":\"216 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 13th International Conference on Computational Intelligence and Security (CIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2017.00073\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 13th International Conference on Computational Intelligence and Security (CIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2017.00073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using Searchable Encryption for Privacy-Aware Orchestrated Web Service Composition
Among all the applications in which Web service composition may be applied, this paper focuses on a cloud-based scenario in which a business targets to outsource the execution of a certain complex service in exchange for some economical compensation. It propose a privacy-preserving orchestrated Web service compositions system using a symmetric searchable encryption primitive. The new proposal ensures that the composer is not able to access the data of the users as well as any information on invoked activities, whereas service providers are able to access only the portions of user preferences and service parameters needed for the correct execution of the specific and atomic assigned activities.