期刊文献+

A Cloud-Based BPM Architecture with User-End Distribution of Non-Compute-Intensive Activities and Sensitive Data 被引量:4

A Cloud-Based BPM Architecture with User-End Distribution of Non-Compute-Intensive Activities and Sensitive Data
原文传递
导出
摘要 While cloud-based BPM(Business Process Management) shows potentials of inherent scalability and expenditure reduction,such issues as user autonomy,privacy protection and efficiency have popped up as major concerns.Users may have their own rudimentary or even full-edged BPM systems,which may be embodied by local EAI systems,at their end,but still intend to make use of cloud-side infrastructure services and BPM capabilities,which may appear as PaaS(Platform-as-a-Service) services,at the same time.A whole business process may contain a number of non-compute-intensive activities,for which cloud computing is over-provision.Moreover,some users fear data leakage and loss of privacy if their sensitive data is processed in the cloud.This paper proposes and analyzes a novel architecture of cloud-based BPM,which supports user-end distribution of non-compute-intensive activities and sensitive data.An approach to optimal distribution of activities and data for synthetically utilizing both user-end and cloud-side resources is discussed.Experimental results show that with the help of suitable distribution schemes,data privacy can be satisfactorily protected,and resources on both sides can be utilized at lower cost. While cloud-based BPM(Business Process Management) shows potentials of inherent scalability and expenditure reduction,such issues as user autonomy,privacy protection and efficiency have popped up as major concerns.Users may have their own rudimentary or even full-edged BPM systems,which may be embodied by local EAI systems,at their end,but still intend to make use of cloud-side infrastructure services and BPM capabilities,which may appear as PaaS(Platform-as-a-Service) services,at the same time.A whole business process may contain a number of non-compute-intensive activities,for which cloud computing is over-provision.Moreover,some users fear data leakage and loss of privacy if their sensitive data is processed in the cloud.This paper proposes and analyzes a novel architecture of cloud-based BPM,which supports user-end distribution of non-compute-intensive activities and sensitive data.An approach to optimal distribution of activities and data for synthetically utilizing both user-end and cloud-side resources is discussed.Experimental results show that with the help of suitable distribution schemes,data privacy can be satisfactorily protected,and resources on both sides can be utilized at lower cost.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1157-1167,共11页 计算机科学技术学报(英文版)
基金 Supported by the National Basic Research 973 Program of China under Grant No.2007CB310805 the National Natural Science Foundation of China under Grant Nos. 90412010,60970131 and 60903048 the National High-Tech Research and Development 863 Program of China under Grant No.2006AA01A106 the Beijing Natural Science Foundation under Grant No.4092046
关键词 cloud-based BPM user-end autonomy data privacy cloud-based BPM,user-end autonomy,data privacy
  • 相关文献

参考文献2

二级参考文献40

  • 1梁英,虎嵩林,李厚福,韩燕波.面向网络化制造的网格应用平台及其核心技术研究[J].计算机研究与发展,2004,41(12):2060-2065. 被引量:19
  • 2赵卓峰,韩燕波,喻坚,王建武.一种支持业务用户编程的服务虚拟化技术——VINCA聚合服务机制[J].计算机研究与发展,2004,41(12):2224-2230. 被引量:14
  • 3Jain A.K., Aparicio IV M., Singh M.P. Agents for process coherence in virtual enterprises. Communications of the ACM, 1999, 42(3): 62~69
  • 4Tambe Milind, Pynadath David V., Chauvat Nicolas. Building dynamic agent organizations in cyberspace. IEEE Internet Computing, 2000, 65~73
  • 5Benbernou S., Canaud E. et al. Resolution and constraint propagation for semantic Web services discovery. In: Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications (RIDE'04), Boston, Massachusetts, 2004, 23~30
  • 6de Moor Aldo, van den Heuvel, Willem-Jan. Web service selection in virtual communities. In: Proceedings of the 37th HICSS Conference, Big Island, Hawaii, 2004, 1~10
  • 7Gao Xiang, Yang Jian, Papazoglou M.P. The capability matching of Web services. In: Proceedings of IEEE Fourth International Symposium on Multimedia Software Engineering (MSE'02), 2002, 56~63
  • 8Rosenblum David S., Wolf Alexander L. A design framework for Internet-scale event observation and notification. ACM SIGSOFT Software Engineering Notes Archive, 1997, 22(6): 344~360
  • 9Han Y., Geng H., Li H., Xiong J. et al. VINCA--A visual and personalized Business-level composition language for chaining Web-based services. In: Proceedings of International Conference on Service Oriented Computing, Italy, 2003, (2910): 165~177
  • 10Guerraoui, Anne-Marie Kermarrec. The many faces of publish/subscribe. ACM Computing Surveys (CSUR), 2003, 35(2): 114~131

共引文献26

同被引文献32

  • 1王菁,张利永,韩燕波.Client-Centric Adaptive Scheduling of Service-Oriented Applications[J].Journal of Computer Science & Technology,2006,21(4):537-546. 被引量:4
  • 2韩燕波,王洪翠,王建武,闫淑英,张程.一种支持最终用户探索式组合服务的方法[J].计算机研究与发展,2006,43(11):1895-1903. 被引量:15
  • 3Youakim B. Service-oriented workflow [J]. Journal of Digital Information Management, 2008, 6(1): 119.
  • 4Li Guoli, Muthusamy V, Jacobsen H A. A distributed service-oriented architecture for business process execution [J]. ACM Trans on the Web, 2010, 4(1): 1-33.
  • 5Vaquero I. M, Rodero-Merino in the clouds: Towards a L, Caceres J, et al. A break cloud definition [J]. ACM SIGCOMM Computer Communication Review, 2008, 39 (1): 50-55.
  • 6Krafzig D, Banke K, Slama D. Enterprise SOA: Service- Oriented Architecture Best Practices [M]. Upper Saddle River, NJ, Prentice Hall, 2004:1-17.
  • 7Rings T, Caryer G, Gallop J, et al. Grid and cloud computing: Opportunities for integration with the next generation network [J]. Journal of Grid Computing, 2009, 7 (3) : 375-393.
  • 8Liu K, Jin H, Chen J, et al. A compromised-time-cost scheduling algorithm in SwinDeW-C for instance-intensive cost-constrained workflows on cloud computing platform [J]. International Journal of High Performance Computing Applications, 2010, 24(4): 445.
  • 9Navathe S, Ceri S, Wiederhold G, et al. Vertical partitioning algorithms for database design [J]. ACM Trans on Database Systems, 1984, 9(4): 680-710.
  • 10Ozsu M T, Valduriez P. Principles of distributed database systems [M]. Upper Saddle River, NJ, Prentice Hall PTR, 1991.

引证文献4

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部