<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Patrick Bedué</institution>
        </aff>
      </contrib-group>
      <fpage>241</fpage>
      <lpage>248</lpage>
      <abstract>
        <p>With increasing growth of cloud services and the ability to choose from different cloud providers, we propose a new way to connect cooking workflows with a high security cloud storage. We use Activiti for workflow design and JavaScript Object Notation (JSON) for structured data interchange with a sealed cloud storage. This approach supports cooking workflows with instructions from multimedia data (e.g. videos, pictures) for special interest groups of the cooking domain like private communities or even chronically ill patients. The paper makes a contribution to current trends in information-systems related research such as scalability and experience reuse. Further, it connects Cloud Computing with Business Process Management.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        With growing globalization, information technology has become a key resource for
business success or failure. IT is often used to manage business processes in companies
and has become increasingly important, leading to a rise in new ways to organize
business processes
        <xref ref-type="bibr" rid="ref1">(Aalst, Benatallah et al. 2003)</xref>
        . Cloud Computing changes the way we
can develop and organize our resources and also enables a flexible and individual
allocation of resources
        <xref ref-type="bibr" rid="ref13 ref4">(Ciovică, Cristescu et al. 2014, Schulte, Janiesch et al. 2015)</xref>
        .
      </p>
      <p>
        Business processes are modelled as a collection of activities, dependencies between
activities and are technically supported by workflows
        <xref ref-type="bibr" rid="ref1">(Aalst, Benatallah et al. 2003)</xref>
        .
Regarding actual research topics, realizing business processes in a flexible and
costefficient way is on a rise
        <xref ref-type="bibr" rid="ref13">(Schulte, Janiesch et al. 2015)</xref>
        . There are some studies focusing
on workflow execution in the cloud investigating infrastructural challenges of elastic
Business Process Management or security issues
        <xref ref-type="bibr" rid="ref13 ref15">(Wang, Korambath et al. 2014,
Schulte, Janiesch et al. 2015)</xref>
        .
      </p>
      <p>To develop our research proposition, we concentrate our work on the
implementation of workflows in the cooking domain with a special focus on applying secure cloud
technology for multimedia data integration and data objects representing ingredients.</p>
      <p>To improve the user experience, we investigate the feasibility of using multimedia
data from a high security cloud storage and of integrating this data into workflows. The
user advantage is that she no longer needs to store big multimedia files on her device
and can execute workflows in a web interface. Secure cloud technology provides rapid
Copyright © 2015 for this paper by its authors. Copying permitted for private and
academic purposes. In Proceedings of the ICCBR 2015 Workshops. Frankfurt, Germany.
scalability as well as data protection. Both are beneficial properties for using
multimedia data in the cooking domain. With our proposed solution, the user is able to easily
create cooking recipes on a platform and store multimedia data. Having started the
workflow, the user is provided with cooking instructions including pictures or videos.
Using secure cloud technology addresses private communities which e.g. do not want
to publish content or appear in any videos accessible to the public, for instance
chronically ill persons or allergy sufferers who do not want to share their special recipes or
videos because their identity might be linked to serious diseases. For many people it is
not an option to simply store the content on scalable platforms like YouTube because
their children might be visible or because their employer might get knowledge about
their special concerns. Our solution combines scalability with additional security and
ensures that content is protected from persons who are not supposed to have access to
the recipes. The technical solution is based on IDGARD which allows to separate data
in different, sealed containers and to keep own videos or pictures confidential.</p>
      <p>With this new solution we address the open challenge of the Computer Cooking
Contest.</p>
      <p>The remainder of our paper is structured as follows. At first we will provide an
overview of our architecture and a sample of a workflow to ease comprehensibility. After
that we will present our implementation concept and workflows from the cooking
domain, which are based on cooking recipes of pasta. We conclude with a discussion of
our research contribution and the new prospects for both companies and researchers.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Fundamentals</title>
      <sec id="sec-2-1">
        <title>Sealed Cloud</title>
        <p>
          A broad range of providers offer different models for services at different layers. But
most of them do not guarantee security for the clients of a cloud provider or the privacy
of the d
          <xref ref-type="bibr" rid="ref3">ata (Santos, Gummadi et al. 2009</xref>
          ). Especially in Germany, data protection and
compliance issues require new technologies such as sealed cloud technology
          <xref ref-type="bibr" rid="ref9">(Rieken
2015)</xref>
          . A sealed cloud offers the technology to encrypt contents and meta data so that
the cloud provider itself is not able to access data contents. The monitoring of user
behavior and the possible access to protected content by providers is a big issue as part
of data privacy and anonymity in the internet. We implement a new architecture to
integrate multimedia data from the cloud using Activiti as a workflow engine and the
sealed cloud IDGARD.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Copyrighted Content</title>
        <p>From a user perspective, the access to files via the internet, for instance, by using
mobile devices can be risky, because some information can be spied out by
unauthorized persons. If some potential attackers retrieve user information while data is sent
over the wire they may gain full access to the data storage. To prevent these attacks the
usage of security tokens or passcodes (received via SMS) is necessary. IDGARD
provides some of these additional security mechanisms.</p>
        <p>
          From the provider perspective it is also difficult to secure data and protect it from
unauthorized access or illegal sharing. Providers want to ensure that only one user or a
specific user group is able to access data with the registered devices. By sending the
unique keys to the registered devices, content providers can prevent the unauthorized
sharing of data (e.g. by using a sealed cloud). There are similar examples in the nutrition
domain where images or videos are already protected, for instance
mycoachnutrition.com
          <xref ref-type="bibr" rid="ref8">(MyCoachNutrition 2015)</xref>
          . Like our approach, these services offer user
individual content. In contrast to our work, they do not provide rapid scalability.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Definition of Workflows</title>
        <p>
          Work is often organized as a sequence of individual tasks in which the progress can
be observed
          <xref ref-type="bibr" rid="ref6">(Hammer and Champy 1994)</xref>
          . These individual tasks are linked to each
other and they underlie a business objective or a policy goal
          <xref ref-type="bibr" rid="ref5">(Workflow Management
Coalition 1998)</xref>
          . The automation of business processes is called workflow. According
to the definition of the Workflow Management Coalition, a workflow is: “The
automation of a business process, in whole or part, during which documents, information or
tasks are passed from one participant to another for action, according to a set of
procedural rules.”
          <xref ref-type="bibr" rid="ref5">(Workflow Management Coalition 1998)</xref>
          . In the remainder of this paper,
we will use the term “workflow” as synonym for “business process”. For our project,
we model different cooking instructions using Activiti as a workflow engine. A simple
workflow consists of a start event, a task with a data object and an end event (see Figure
1). A task or an activity describes a piece of work that forms a logical step in a process.
To support the process execution the workflow activity requires human and/or machine
resources for process execution
          <xref ref-type="bibr" rid="ref5">(Workflow Management Coalition 1998)</xref>
          . We use
different tasks and data objects to describe a cooking control flow.
        </p>
        <p>Rice</p>
        <p>Task (cook)</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Architecture</title>
      <sec id="sec-3-1">
        <title>General overview</title>
        <p>As illustrated in Figure 2, the introduced architecture consists of three layers:
From the perspective of the user, the first layer or sub-component is based on the so
called Ninja Web-Framework, which is required in order to handle the graphical
interaction with the user by initiating a workflow instance.</p>
        <p>Below the Web Framework, the Business Process Management (BPM) platform
Activiti initially receives the user commands and controls the processing of the
corresponding instance. The Activity engine requests relevant information from the data
source (IDGARD) and hands them over to the user.</p>
        <p>IDGARD, as the third or bottom layer of the architecture, is not just an external
database but a sealed cloud solution. Therefore, it does not only store the data but
provides API functions that ensure secure retrieval.</p>
        <p>Worklist/ User</p>
        <p>Interaction
Resource Access (Data</p>
        <p>Interaction)
Submission Handling
(Flow Control)</p>
        <p>Since the goal is to develop and execute (cooking) workflows it is required to use
Business Process Management and a solution to save the corresponding multimedia
data. As a result, it is pre-determined to stage a 2-Layer-Architecure at minimum. Since
it is a typical demand that users have not just local access to the workflows, a
browserbased solution is reasonable. This kind of functionality is not offered by the already
mentioned layers and therefore asks for an additional one.</p>
        <p>Starting from the bottom layer, there is the complex question of how to save an
application’s data or where to put it. As Cloud Computing nowadays has already
overcome just being a trend, it is appropriate and scientifically valuable to embed this idea
into various contexts.</p>
        <p>IDGARD´s sealed cloud is specifically designed to enhance security. Because
protecting own content like graphically supported cooking steps or even whole recipes can
be important, such a cloud service might be beneficial. This especially applies to
companies that want to distribute such services via Internet and protect themselves against
copyright infringements.</p>
        <p>Concerning the choice of a workflow engine, there is a huge range of open source
technologies available. In terms of basic functionality (e.g. integration in an IDE or
graphically establishing workflows) they usually show similarities. To address our
requirements properly we decided to use two different GUI’s for our project. Activiti as
the modelling GUI and the Ninja Web-Framework for the user worklist. However,
Activiti convinces with a distinct manual, a large community and a clear, browser based
testing environment.</p>
        <p>To provide the worklist, the Ninja Web-Framework is useful because, as an
integrated software stack, it already comprises many important libraries.</p>
        <p>By using a MongoDB database, we save standardized keywords for each possible
instruction and ingredient on the one hand, as well as the recipes with already assigned
processing times, instructions and information on the other hand. We are planning to
use time information for the retrieval of a process in our future work.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Implementation Concept</title>
      <p>An abstract class in Java defines the fundamental set of functions, i.e. basic java
members and abstract methods that deal with communicating information between java
and JSON, and the log file for further checks and troubleshooting. Each function has
still its own unique representation for requests and responses including the
corresponding JSON formats. In order to successfully connect request- and response functionality
for data interchange, some middleware classes are required. For providing cloud access,
we have to send login-data and a random token of the client for identification purposes.
The factory pattern is used to invoke requests and their corresponding response classes.
The Java classes that realize the communication with the cloud server are directly
implemented in the workflows, which we use for cooking instructions.</p>
      <p>
        Workflow engines for Business Process Management are abounding. Examples for
these are JBoss, jBPM or Activiti. For our workflow development, we use Activiti as
an open source workflow engine. Activiti uses BPMN 2.0 as a modelling language and
can be easily integrated with Java environments
        <xref ref-type="bibr" rid="ref2">(Alfresco 2015)</xref>
        . We used seven
already created pasta cooking workflows from the work of Minor et al. and converted
them into an Activiti workflow
        <xref ref-type="bibr" rid="ref7">(see Figure 3 following Minor, Bergmann et al. 2010)</xref>
        .
Each cooking task is modelled by a service task. This kind of task enables us to invoke
a Java class for API cloud access. We also deposit the ingredients as data objects
directly in the activity workflow. Other content like pictures or movies for cooking
instructions are stored in the cloud.
      </p>
      <p>
        In the example we have four individual instructions for the user. First, cook and place
in serving bowl as well as puree should be conducted in parallel. Parallelization can be
modelled using XOR-, AND- (symbolized by the plus), or LOOP-blocks
        <xref ref-type="bibr" rid="ref14">(Schumacher,
Minor et al. 2013)</xref>
        . When both branches are finished the last task is toss. In each task,
users get instructions with support of multimedia data from the cloud. To execute our
designed workflows we use the Ninja Web framework. The Web framework (worklist)
is a resource which performs the work presented by a workflow activity instance and
a picture of the specific task. The workflow running in the background is modelled in
BPMN 2.0. By pressing next step the user is guided to the next task of the related recipe
as specified in the BPMN workflow. Thereby, we provide a worklist with different
instructions for a kitchen chef.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Discussion and Conclusion</title>
      <p>In our paper we present a novel approach to integrate a high security cloud storage
(sealed cloud) in Business Process Management. We implement a new model for using
a sealed cloud multimedia data storage for our workflow contents. The implementation
of a case-based retrieval is not implemented yet. As a first step, we demonstrate a
pastacooking workflow, which can be processed or uploaded by the user in a web form. The
content is stored in the sealed cloud IDGARD of the Uniscon GmbH who provides the
cloud infrastructure. The content and meta data is encrypted and protected from
unauthorized provider or third-party access. By using cloud storage for our workflows we
examine two main benefits: data protection and scalability. With the IDGARD solution
third parties are not able to copy or even access the data.</p>
      <p>
        Scalable storage provides the advantage of adapting storage up and down on-demand
without using rare data space on physical disks of computers or other devices
(
        <xref ref-type="bibr" rid="ref3">Armbrust, Fox et al. 2009</xref>
        ). By using IDGARD, we are able to scale our storage
capacity in a flexible way in response to service usage and new customer demands. Since
it is very difficult to estimate, what recipes and data with instructions will be added,
scalability is very important. Apart from that, the evolution in terms of video quality
has significantly risen in the past years (and probably keeps rising in the future) which
contributes to the fact that scalability is an important factor because customers also tend
to pressure companies to provide state-of-the-art content. The amount of data that goes
along with this development is significant. It is also possible to migrate our workflow
engine into a cloud solution in future. As a result, the whole platform can be scaled in
response to service usage.
      </p>
      <p>To sum up, our approach of using cloud storage for workflows in the cooking domain
benefits from flexible scalability, higher privacy and data protection leading to a higher
user experience especially for special interest groups of the cooking domain. The user
no longer needs to use her limited, physical storage. She can store multimedia data with
cooking instructions directly in the cloud. Our work also contributes to other future
trends besides the cooking domain. Sealed cloud technology offers opportunities to use
cloud storage without harming privacy or security regulations. This can be very
important for audit companies who want to store audit-documents or other critical contents
in the cloud.</p>
      <p>We would like to acknowledge our partnership with the Uniscon GmbH who
provided us with their sealed cloud service IDGARD.
8</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Aalst</surname>
            ,
            <given-names>W. M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Benatallah</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Casati</surname>
          </string-name>
          (
          <year>2003</year>
          ).
          <source>Business Process Management</source>
          , Springer-Verlag Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Alfresco.</surname>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>"Activiti mission statement</article-title>
          .
          <source>" Retrieved 08.06.15</source>
          ,
          <year>2015</year>
          , from http://activiti.org/vision.html.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Patterson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rabkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Stoica</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaharia</surname>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Above the Clouds: A Berkeley View of Cloud Computing</article-title>
          ,
          <source>Technical Report</source>
          , UC Berkeley Reliable Adaptive Distributed Systems Laboratory.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Ciovică</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Cristescu</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Fraţilă</surname>
          </string-name>
          (
          <year>2014</year>
          ).
          <source>"Cloud Based Business Processes Orchestration." Procedia Economics and Finance</source>
          <volume>16</volume>
          (
          <issue>0</issue>
          ):
          <fpage>592</fpage>
          -
          <lpage>596</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>Workflow</given-names>
            <surname>Management Coalition</surname>
          </string-name>
          (
          <year>1998</year>
          )
          <article-title>"</article-title>
          <source>Terminology &amp; Glossary." Retrieved 08.06.15</source>
          ,
          <year>2015</year>
          , from http://www.wfmc.org/resources.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Hammer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>J</given-names>
            .
            <surname>Champy</surname>
          </string-name>
          (
          <year>1994</year>
          ).
          <article-title>Business Reengineering: Die Radikalkur für das Unternehmen</article-title>
          .
          <source>Campus-Verlag Frankfurt.</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Minor</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bergmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Görg</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Walter</surname>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Adaptation of cooking instructions following the workflow paradigm</article-title>
          ,
          <source>In: ICCBR 2010 Workshop Proceedings</source>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>208</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>MyCoachNutrition.</surname>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>"</article-title>
          <source>MyCoachNutrition." Retrieved 06.07.15</source>
          ,
          <year>2015</year>
          , from http://www.mycoachnutrition.com/.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Rieken</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Datensicherheit als Herausforderung im Cloud-Computing-Trend.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>In</surname>
          </string-name>
          : Marktplätze im Umbruch: pp
          <fpage>751</fpage>
          -
          <lpage>759</lpage>
          , Springer.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Santos</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Gummadi</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Towards trusted cloud computing</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>In: Proceedings of the 2009 conference on Hot topics in cloud computing</source>
          . San Diego, California, USENIX Association.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Schulte</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Janiesch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Venugopal</surname>
          </string-name>
          , I. Weber and
          <string-name>
            <given-names>P.</given-names>
            <surname>Hoenisch</surname>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>"Elastic Business Process Management: State of the art and open challenges for BPM in the cloud</article-title>
          .
          <source>" Future Generation Computer Systems</source>
          <volume>46</volume>
          (
          <issue>0</issue>
          ):
          <fpage>36</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Schumacher</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Minor</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Schulte-Zurhausen</surname>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Extracting and enriching workflows from text</article-title>
          .
          <source>In: Proceedings of the 2013 IEEE 14th International Conference on Information Reuse and Integration (IRI)</source>
          , pp.
          <fpage>285</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Korambath</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Altintas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Davis</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Crawl</surname>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>"Workflow as a Service in the Cloud: Architecture</article-title>
          and
          <string-name>
            <given-names>Scheduling</given-names>
            <surname>Algorithms</surname>
          </string-name>
          .
          <source>" Procedia Computer Science</source>
          <volume>29</volume>
          (
          <issue>0</issue>
          ):
          <fpage>546</fpage>
          -
          <lpage>556</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>