=Paper= {{Paper |id=Vol-1360/paper11 |storemode=property |title=Privacy-Aware Scheduling for Inter-Organizational Processes |pdfUrl=https://ceur-ws.org/Vol-1360/paper11.pdf |volume=Vol-1360 |dblpUrl=https://dblp.org/rec/conf/zeus/Hochreiner15 }} ==Privacy-Aware Scheduling for Inter-Organizational Processes== https://ceur-ws.org/Vol-1360/paper11.pdf
                   Privacy-Aware Scheduling for
                  Inter-Organizational Processes

                                  Christoph Hochreiner

        Distributed Systems Group, Vienna University of Technology, Austria
                         c.hochreiner@infosys.tuwien.ac.at



       Abstract Due to the increasing specialization of companies in a global-
       ized world, inter-organizational process enactments have become increas-
       ingly relevant in recent years. Nevertheless there are hardly any scheduling
       approaches that meet the requirements of these inter-organizational pro-
       cesses, especially in terms of privacy aspects. In this paper we present a
       privacy-aware scheduling approach for hybrid clouds, which represents
       a vital starting point to design a holistic execution environment for
       inter-organizational process enactments.


Keywords: Cloud Computing, Business Process Management, Hybrid Clouds


1    Introduction
In the last couple of years Business Process Management (BPM) has become a well-
adopted approach for companies to provide value-added services to customers [8].
Business processes are composed of software- as well as human-based services and
their design ranges from simple sequences to complex structures involving loops,
splits or choices [11]. The process enactment is conducted by a Business Process
Management System (BPMS) [12] which is considered as a generic software
system that manages operational business processes [2]. The management of
operational business processes covers the assignment of the different process steps
to the designated services which are required to realize a process enactment and
schedules their instantiation. Apart from the process scheduling, a BPMS may also
manage the provisioning of computational resources to instantiate the software-
based services. Since BPMS are used to execute business processes, the BPMS as
well as the services are often deployed on fixed resources within the company’s
premises, where the companies may combine their computational resources to
implement a resource pool, i.e. a private cloud [7]. The most important reason for
this internal hosting solution are security and privacy restrictions, since services
may deal with sensitive information, e.g., health data or execute algorithms that
are considered as trade secrets [10].
    This paper proposes a privacy-aware scheduling approach for hybrid cloud
environments. To obtain an optimal and privacy-aware scheduling respectively re-
source provisioning approach, we extend the Service Instance Placement Problem
(SIPP) [4] which applies Mixed Integer Linear Programming (MILP).


T. S. Heinze, T. M. Prinz (Eds.): Services and their Composition, 7th Central European Workshop,
ZEUS 2015, Jena, Germany, 19-20 February 2015, Proceedings – published at http://ceur-ws.org
64      Christoph Hochreiner

   The remainder of this paper is structured as follows: In Sect. 2 we state the
motivation for our work and discuss some preliminaries in Sect. 3. We further
present our privacy-aware scheduling approach in Sect. 4 and Sect. 5 concludes
the paper with an outlook on our future work.



2    Motivation

Business process enactments are usually triggered by process requests. These
process requests are issued by external events, e.g., customer interactions, which
lead to alternating amounts of business process requests respectively changing
resource requirements. In peak-times, when external events issue an extraordinary
amount of process requests, a BPMS may run into an underprovisioning scenario,
since there are not enough resources to enact the process requests according to
their Service Level Agreements (SLAs) [9]. This leads to a lower Quality of Service
(QoS), e.g., longer response times and SLA violations may also trigger penalty
cost that increase the overall cost for process enactment. Besides the peak-times,
a system with fixed resources is also likely to run into overprovisioning scenarios,
since the computational resources will not be used adequately. This leads to
economically inefficient cost structures for the companies.
    Public clouds, e.g., Amazon EC2, offer a promising solution to the resource
usage challenges for varying process requests. A cloud-aware BPMS is able to
obtain the required resources on demand in an utility like fashion. This enables
the BPMS to obtain resource elasticity by scaling the computational resources up
and down, based on the changing requirements. Measured services further allow an
exact billing of the computational resources based on the actual resource usage [7].
This elastic resource provisioning strategy avoids underprovisioning scenarios,
since the public cloud provides enough resources to cover the peak-requirements.
A cloud environment also avoids overprovisioning scenarios, because not required
resources can be released as soon as they are not needed any more.
    Besides the resource allocation there are also other challenges for BPMS,
like privacy issues for service instantiations of inter-organizational processes, i.e.,
service choreographies. Inter-organizational processes are structured similarly to
business processes. The major difference is that their process steps are assigned
to software services which are provided by different companies instead of only one.
Therefore software services for inter-organizational processes can be executed
on a community cloud [7]. Nevertheless this common execution environment
is not acceptable for some software services due to privacy restrictions. The
most promising approach to tackle these issues is the creation of a hybrid cloud
which consists of a community cloud and dedicated private clouds for each
company [3]. Although resource scheduling for hybrid clouds already raised some
attention in terms of scheduling [1] as well as privacy aware deployments [13],
there are surprisingly little efforts towards privacy-aware scheduling approaches
for BPMSs [6].
                Privacy-Aware Scheduling for Inter-Organizational Processes               65


                                             Hybrid Cloud
                                           Community Cloud

                                                 Common                VM
                       BPMS                                           VM VM
                                                  Data               VM VM VM
                                                                    VM VM VM VM



                       Private Cloud 2                           Private Cloud 3

                      VM             Sensitive                  VM            Sensitive
                     VM VM                                     VM VM
                VM    VM VM            Data               VM    VM VM           Data




                               Figure 1: Cloud Landscape


3    Preliminaries

In our previous work we presented the Service Instance Placement Problem
(SIPP) [4], which provides a cost-optimized scheduling and resource provisioning
plan for multiple parallel process enactments. SIPP represents a multi-objective
scheduling strategy which is presented in Sect. 4.1. Up to now the SIPP only
considers a single cloud for process enactments. Therefore it does not consider
any security nor privacy related aspects which are relevant for process enactments
in hybrid cloud environments. Before we describe the privacy related concepts in
detail in Sect. 4.2, we define some preliminaries.
    The execution environment for inter-organizational processes consists of a a
community cloud and dedicated private clouds for privacy sensitive services, as
illustrated in Fig. 1. The community cloud hosts all non privacy sensitive services
as well as the BPMS. The BPMS schedules process steps, provisions resources
for the software-based services on the community cloud and also triggers the
deployment of the privacy sensitive services in the dedicated private clouds, based
on the privacy restrictions issued for the services. These restrictions are described
in detail in Sect. 4.2. In terms of computational resources, we assume that the
private clouds offer a limited amount of computational resources, which are only
sufficient to run the privacy sensitive services whereas the community cloud offers
theoretically unlimited resources.
    The inter-organizational processes are composed of multiple process steps that
represent the software-based services provided by the participating companies.
Fig. 2 represents an exemplary inter-organizational process, which shows the
collaboration among 3 companies. Step 3 and 5 are annotated as privacy sensitive
and must only be executed in the dedicated private clouds, whereas all other steps
can be executed in the community cloud. To execute a process step, the BPMS
triggers the deployment of the software-based service on a Virtual Machine (VM)
either on the community cloud or on a private cloud. This deployment results in
a service instance that can be invoked by the BPMS to execute the service and
therefore execute the process step.
66          Christoph Hochreiner




                    Company 1
                                Step 1                                privacy         Step 6
                                                                      sensitive




                    Company 2
                                                  Step 2         Step 3




                    Company 3
                                                  Step 4         Step 5




        Figure 2: Inter-organizational Process Incorporating 3 Companies


4     Privacy-Aware Scheduling
4.1    Service Instance Placement Problem
The SIPP is represented by a set of different constraints and equations, which are
described in detail in [4]. In Eq. 1 the objective for the SIPP optimization model,
i.e., the minimization of the overall execution cost, is shown. This objective
comprises four terms, where the first term represents the overall leasing cost of
the computational resources by summing up the amount of leased VMs γ(v,t)
multiplied by their cost cv . The second term shows the penalty cost, which arise,
if a process is not finished within the given time. Hereby it sums up all delayed
process instances epip and multiplies them with predefined penalty cost cpip . In
order to keep the overall cost as low as possible, the optimization model penalizes
idle resources (CPU (fkCv ) and RAM (fkRv )) which are multiplied by the constants
ωfC and ωfR . The last term is designed to prioritize process steps x(jip ,kv ,t) , so
that steps with a closer deadline DLip are executed first.

             X                     X X                              X X
      min          cv · γ(v,t) +                 cpip · epip +                    (ωfC · fkCv + ωfR · fkRv )
            v∈V                    p∈P ip ∈Ip                       v∈V kv ∈Kv
                 X X            X            1                                                                 (1)
             −                                             x(jip ,kv ,t)
                                         DLip − τt
                 p∈P ip ∈Ip jip ∈Ji∗
                                    p




4.2    Privacy Extensions
Since SIPP is designed for a single cloud, we introduced additional constraints and
additional SLA policies to enable the enactment of inter-organizational processes
while respecting the privacy constraints of the services.
   We extended the set of VM types to distinguish between different deployment
locations with their different privacy policies.
                                                             [
                                             V =                      Vloc                                     (2)
                                                           loc∈Loc
                                                             [
                                             K=                      Kloc                                      (3)
                                                       loc∈Loc
                 Privacy-Aware Scheduling for Inter-Organizational Processes          67

    This differentiation is possible by introducing the identifier loc (loc ∈ Loc),
which represents the type of the cloud, e.g., community cloud or 1 of the private
clouds. The new set of available VMs is then defined by the union of all VMs,
which can be instantiated in the different clouds (Eq. 2). Analogously we also
extended the set of all currently instantiated VMs (Eq. 3).
    In terms of privacy restrictions, there are 2 specification possibilities to restrict
the execution of services regarding the type of the cloud. The first approach
is blacklisting: the SLA lists for every process all services, which must not be
executed on specific clouds. The major downside of this approach is that the
SLA needs to be updated when additional clouds are added.
    The alternative approach is whitelisting, i.e., the SLA for each process lists all
service instantiation possibilities in the different clouds. Since this SLA pursues
a defensive permission approach, there is no need to update the SLA in contrast
to the blacklisting approach, when the cloud environment grows by additional
private or community clouds. Eq. 4 shows an exemplary SLA for the process
presented in Fig. 2.
                   
                   communityCloud (Service 1, Service 2, Service 4)
                   
          SLAP = privateCloud1             (Service 3)                               (4)
                   
                     privateCloud2         (Service 5)
                   

    Based on this SLA for services, a MILP-solver for the optimization problem is
able to generate the instantiation possibilities according to Eq. 5. The constraints
in Eq. 5 evaluate whether a specific process step jip can be instantiated on a
specific VM kvloc by querying whether the process step is listed on the whitelist
for the given cloud loc. If the SLA does not explicitly allow the instantiation
of the process step on the specific VM, the constraint rules out the deployment
option. Otherwise the MILP-solver decides based on other constraints whether the
service is deployed on the specific VM (1) or not (0) as stated in the alternative
branch of the constraint.
                                  (
                                    0      , if jip ∈
                                                    / SLAPloc , loc ∈ Loc
               x(jip ,kvloc ,t) =                                                (5)
                                    {0, 1} , else


5    Outlook

In this paper we focused on the formalization of privacy constraints for the
deployment and enactment of inter-organizational processes in hybrid cloud
environments. Although these privacy extensions are relevant for process en-
actment, they only represent a small step towards a holistic process scheduling
and resource allocation approach for inter-organizational processes in hybrid
cloud environments. Other relevant topics are data transfer aspects among the
different clouds, which become increasingly relevant for big data applications or a
cost-efficient resource allocation across the cloud environment. In our future work
we will evaluate the proposed privacy constraints in a hybrid cloud environment
68      Christoph Hochreiner

based on the Vienna Platform for Elastic Processes (ViePEP) [5]. Here we plan
to evaluate our approach against other privacy ensuring methods, e.g., encryption
of privacy-sensitive data in terms of performance and cost-efficiency. Further we
will also investigate other areas, like data transfer aspects or pricing policies for
hybrid clouds to enable the enactment of inter-organizational processes in an
economically efficient manner.

Acknowledgments This paper is partially supported by TU Vienna research
funds and supported by the European Union within the SIMPLI-CITY FP7-ICT
project (Grant agreement no. 318201).

References
 1. van den Bossche, R., Vanmechelen, K., Broeckhove, J.: Cost-optimal scheduling in
    hybrid iaas clouds for deadline constrained workloads. In: 2010 IEEE 3rd Interna-
    tional Conference on Cloud Computing (CLOUD). pp. 228–235. IEEE (2010)
 2. van Der Aalst, W.M., Ter Hofstede, A.H., Weske, M.: Business process management:
    A survey. In: Business process management, pp. 1–12. Springer (2003)
 3. Goyal, P.: Enterprise usability of cloud computing environments: issues and chal-
    lenges. In: 2010 19th IEEE International Workshop on Enabling Technologies:
    Infrastructures for Collaborative Enterprises (WETICE). pp. 54–59. IEEE (2010)
 4. Hoenisch, P., Schuller, D., Hochreiner, C., Schulte, S., Dustdar, S.: Elastic process
    optimization - the service instance placement problem. Tech. Rep. TUV-1841-
    2014-01, Distributed Systems Group, Vienna University of Technology (October
    2014)
 5. Hoenisch, P., Schulte, S., Dustdar, S., Venugopal, S.: Self-Adaptive Resource Allo-
    cation for Elastic Process Execution. In: 6th International Conference on Cloud
    Computing (CLOUD 2013). pp. 220–227. IEEE (2013)
 6. Huang, Z., van der Aalst, W.M.P., Lu, X., Duan, H.: Reinforcement learning based
    resource allocation in business process management. Data & Knowledge Engineering
    70(1), 127–145 (2011)
 7. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Recommendations
    of the National Institute of Standards and Technology (2011)
 8. Rosemann, M., vom Brocke, J.: The Six Core Elements of Business Process Man-
    agement. In: Handbook on Business Process Management 1, pp. 107–122. Springer
    (2010)
 9. Schulte, S., Janiesch, C., Venugopal, S., Weber, I., Hoenisch, P.: Elastic Business
    Process Management: State of the Art and Open Challenges for BPM in the Cloud.
    Future Generation Computer Systems 46, 36–50 (2015)
10. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models
    of cloud computing. Journal of Network and Computer Applications 34(1), 1 – 11
    (2011)
11. van der Aalst, W.M.P., ter Hofstede, A.H.M., Kiepuszewski, B., Barros, A.P.:
    Workflow Patterns. Distributed and Parallel Databases 14(1), 5–51 (2003)
12. Weske, M.: Business Process Management: Concepts, Languages, Architectures.
    Springer, 2nd edn. (2012)
13. Zhang, K., Zhou, X., Chen, Y., Wang, X., Ruan, Y.: Sedic: privacy-aware data
    intensive computing on hybrid clouds. In: Proceedings of the 18th ACM conference
    on Computer and communications security. pp. 515–526. ACM (2011)