A Secure Workflow-Net Model for Service-Specific Overlay Networks
In this paper, a Workflow-net based mathematical framework called Secure Workflow-net is proposed to enhance security attributes of service-specific overlays (SSO). The framework checks for resource accessibility privileges on an overlay node and grants a
- PDF / 338,107 Bytes
- 11 Pages / 439.37 x 666.14 pts Page_size
- 24 Downloads / 188 Views
ollege of Engineering and Technology, American University of the Middle East (AUM), Eqaila, Kuwait {Ismaeel.Al-Ridhawi,Yehia.Kotb}@aum.edu.kw
Abstract. In this paper, a Workflow-net based mathematical framework called Secure Workflow-net is proposed to enhance security attributes of servicespecific overlays (SSO). The framework checks for resource accessibility privi‐ leges on an overlay node and grants access whenever credible. A formal method is provided to determine the accessibility and availability of resources intended for service subscribers. Additionally, a closed form theorem for framework soundness and lemmas to study the characteristics of the framework are intro‐ duced. Simulation results demonstrate how task coverage can still be achieved in an adequate timely manner when considering security issues to construct service composition workflows. Keywords: Petri-net · Workflow-net · Security · Overlay network · Servicespecific overlay · Fog-to-cloud
1
Introduction
Overlay networks are created as an abstraction layer to the underlying physical network using software to run multiple virtualized network layers to provide application, networking, or security benefits [1]. With the emergence of the fog-to-cloud (F2C) computing paradigm [2], edge nodes such as mobile devices are used to provide computing, storage and networking services to achieve load balance among clouds and fogs, reduced network bandwidth usage, and energy efficiency for data centers [3, 4]. The composition of service-specific overlays (SSO) still plays an important role to achieve the requirements of F2C computing systems. Services are composed using edge nodes to provide composite and enhanced services needed for cloud subscribers. Petri-net provides a solution towards service composition in which the available capabilities of edge nodes are merged together to achieve the requested task [5]. Work‐ flow-net provides an extension to Petri-net and has been adopted lately for service composition to produce a more robust and sound solution [6]. Information system security has been a hot topic for many decades, e.g. [7]. An information system is considered to be secure if it has well-defined security measures and characteristics such as authenticity, confidentiality and integrity [8]. Security in service composition has been considered in the literature [9, 10], but has been overlooked when Workflow-nets are used to compose services. In this paper, a closed form Workflow-net based © Springer Science+Business Media Singapore 2018 K.J. Kim and N. Joukov (eds.), Mobile and Wireless Technologies 2017, Lecture Notes in Electrical Engineering 425, DOI 10.1007/978-981-10-5281-1_42
390
I. Al Ridhawi and Y. Kotb
mathematical model is proposed that ensures such security characteristics are satisfied both structurally and behaviorally. The solution is an extension to Workflow-nets in which we call it Secure Workflow-net. This paper is organized as follows: Sect. 2 outlines some of the previous work in information security for service composition. Section 3 provides an
Data Loading...