Projects per year
Abstract
Service compositions are implemented through the interplay
between actors of different organizations. Many composition systems use
a middleware, which coordinates the service calls according to specified
workflows. These middlewares pose a certain privacy issue, since they may
read all the exchanged data. Furthermore, service compositions may require
that only selected subsets of data that was initially supplied by the user are
disclosed to the receiving actors. Traditional public key encryption only
allows encryption for a particular party and lack of the ability to efficiently
define more expressive access controls for a one-to-many communication.
Besides privacy-preserving requirements, it may be necessary for participants
in service compositions to be able to verify which actor has modified or
added data during a process to ensure accountability of performed actions.
This paper introduces a concept for efficient, privacy-preserving service
composition using attribute-based encryption in combination with outsourced
decryption as well as collaborative key management. Our concept enables
end-to-end confidentiality and integrity in a one-to-many communication using
fine-grained access controls, while minimizing the decryption effort for devices
with low calculation capacity, which enables to use smartphones at the
client side. The feasibility of the proposed solution is demonstrated by an
implemented proof-of-concept including a performance evaluation.
between actors of different organizations. Many composition systems use
a middleware, which coordinates the service calls according to specified
workflows. These middlewares pose a certain privacy issue, since they may
read all the exchanged data. Furthermore, service compositions may require
that only selected subsets of data that was initially supplied by the user are
disclosed to the receiving actors. Traditional public key encryption only
allows encryption for a particular party and lack of the ability to efficiently
define more expressive access controls for a one-to-many communication.
Besides privacy-preserving requirements, it may be necessary for participants
in service compositions to be able to verify which actor has modified or
added data during a process to ensure accountability of performed actions.
This paper introduces a concept for efficient, privacy-preserving service
composition using attribute-based encryption in combination with outsourced
decryption as well as collaborative key management. Our concept enables
end-to-end confidentiality and integrity in a one-to-many communication using
fine-grained access controls, while minimizing the decryption effort for devices
with low calculation capacity, which enables to use smartphones at the
client side. The feasibility of the proposed solution is demonstrated by an
implemented proof-of-concept including a performance evaluation.
Original language | English |
---|---|
Title of host publication | Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Proceedings |
Subtitle of host publication | 17th International Conference, TrustBus 2020 Bratislava, Slovakia, September 14–17, 2020 Proceedings |
Editors | Stefanos Gritzalis, Edgar R. Weippl, Gabriele Kotsis, Ismail Khalil, A Min Tjoa |
Publisher | Springer |
Pages | 109-124 |
Number of pages | 16 |
ISBN (Electronic) | 978-3-030-58986-8 |
ISBN (Print) | 978-3-030-58985-1 |
DOIs | |
Publication status | Published - 14 Sept 2020 |
Event | 17th International Conference on Trust, Privacy and Security in Digital Business: TrustBus 2020 - Virtuell, Virtuell, Slovakia Duration: 14 Sept 2020 → 17 Sept 2020 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 12395 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 17th International Conference on Trust, Privacy and Security in Digital Business |
---|---|
Country/Territory | Slovakia |
City | Virtuell |
Period | 14/09/20 → 17/09/20 |
Other | TrustBus 2020 Bratislava, Slovakia, September 14–17, 2020 Proceedings |
Keywords
- Confidentiality
- Efficiency
- Integrity
- Privacy
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science(all)
Projects
- 1 Active
-
A-SIT - Secure Information Technology Center Austria
Stranacher, K., Dominikus, S., Leitold, H., Marsalek, A., Teufl, P., Bauer, W., Aigner, M. J., Rössler, T., Neuherz, E., Dietrich, K., Zefferer, T., Mangard, S., Payer, U., Orthacker, C., Lipp, P., Reiter, A., Knall, T., Bratko, H., Bonato, M., Suzic, B., Zwattendorfer, B., Kreuzhuber, S., Oswald, M. E., Tauber, A., Posch, R., Bratko, D., Feichtner, J., Ivkovic, M., Reimair, F., Wolkerstorfer, J. & Scheibelhofer, K.
21/05/99 → 6/08/20
Project: Research area