Clouds Coalition Detection for Business Processes Outsourcing

被引:0
|
作者
Nacer, Amina Ahmed [1 ]
Abdmeziem, Mohammed Riyadh [1 ]
Godart, Claude [1 ]
机构
[1] Univ Lorraine, Nancy, France
关键词
Cloud Computing; Decoy Process; Privacy Preserving; Coalition; Know-How Exposure;
D O I
10.5220/0011963400003464
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Companies outsourcing their BP (Business Processes) to the cloud must be sure that sensitive information included in their BP are protected. While there are several existing methods that include splitting the model into a collection of BP fragments before a multi-cloud deployment minimizing therefore the likelihood of a coalition, a risk still remains. We propose in this paper an approach for detecting malicious cloud providers that initiate or participate to a coalition. To do that, we rely on decoy processes having the same structure and number of data as a real process, but with decision strategy making as well as data sets that are completely different (fake) from the real one. Our objective is to detect unexpected exchanges of messages between malicious clouds, that may signify an attempt to initiate or participate to a coalition. The level of reputation of each cloud initiating or joining the coalition will be modified accordingly.
引用
收藏
页码:530 / 537
页数:8
相关论文
共 50 条