6 CONCLUSIONS
We have highlighted how businesses are under in-
creasing pressure to manage the litany of legislation
and regulation. Coupled with the adoption of web-
based infrastructures and composite services. We
propose an architecture that leverages the dynamism
of service-based infrastructures and enables real-time
compliance processing. The described architecture is
loosely based on an event-driven service-oriented ar-
chitecture (SOA). The loose coupling allows for easy
scalability and distribution of both event processing
and storage components whilst managing processing
complexity. This forms a foundation for further re-
search into a compliance-driven auditing architecture
for distributed systems.
REFERENCES
106th United States Congress (1999). Gramm-leach-bliley
act.
107th United States Congress (2002). Sarbanes-oxley act.
Securities and Exchange Commission.
Alliance, C. S. (2009). Security guidance for
critical areas of focus in cloud computing.
http://www.cloudsecurityalliance.org/csaguide.pdf.
Baumann, C., Peitz, P., Raabe, O., and Wacker, R. (2010).
Compliance for service based systems through for-
malization of law. In Filipe, J. and Cordeiro, J., ed-
itors, Proceedings of the 6th International Confer-
ence on Web Information Systems and Technology,
volume 2, pages 367–371, Valencia, Spain. INSTICC
Press.
Blau, B., Kramer, J., Conte, T., and Dinther, C. v. (2009).
Service value networks. In Proceedings of the 2009
IEEE Conference on Commerce and Enterprise Com-
puting, pages 194–201, Washington, DC, USA. IEEE
Computer Society.
Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Ley-
mann, F., and Konrad, R. (2010). Compliant cloud
computing (c3): Architecture and language support
for user-driven compliance management in clouds.
Cloud Computing, IEEE International Conference on,
0:244–251.
Buyya, R., Yeo, C. S., and Venugopal, S. (2008). Market-
oriented cloud computing: Vision, hype, and reality
for delivering it services as computing utilities. In
HPCC ’08: Proceedings of the 2008 10th IEEE Inter-
national Conference on High Performance Computing
and Communications, pages 5–13, Washington, DC,
USA. IEEE Computer Society.
Cederquist, J., Corin, R., Dekker, M., Etalle, S., den Hartog,
J., and Lenzini, G. (2007). Audit-based compliance
control. International Journal of Information Secu-
rity, 6:133–151. 10.1007/s10207-007-0017-y.
Chesani, F., Mello, P., Montali, M., Riguzzi, F., Sebastia-
nis, M., and Storari, S. (2009). Checking compliance
of execution traces to business rules. In Aalst, W.,
Mylopoulos, J., Sadeh, N. M., Shaw, M. J., Szyperski,
C., Ardagna, D., Mecella, M., and Yang, J., editors,
Business Process Management Workshops, volume 17
of Lecture Notes in Business Information Processing,
pages 134–145. Springer Berlin Heidelberg.
Conrad, M., Funk, C., Raabe, O., and Waldhorst, O. (2007).
A lawful framework for distributed electronic mar-
kets. In Camarinha-Matos, L., Afsarmanesh, H., No-
vais, P., and Analide, C., editors, Establishing The
Foundation Of Collaborative Networks, IFIP Interna-
tional Federation for Information Processing, pages
233–240. Springer Boston.
Council, P. C. I. S. S. (2004). Payment card industry data
security standard.
Elgammal, A., Turetken, O., Heuvel, W. v. d., and Papa-
zoglou, M. (2010). On the formal specification of
business contracts and regulatory compliance. Open
access publications from tilburg university, Tilburg
University.
Etzion, O. and Niblett, P. (2010). Event Processing in Ac-
tion. Manning Publications.
Flint, D. (2009). Law shaping technology: Technology
shaping the law. International Review of Law, Com-
puters & Technology, 23 , 1:5–11.
Heuser, L., Alsdorf, C., and Woods, D. (2008). Interna-
tional Research Forum 2007. Evolved Technologist
Press.
Jaeger, P., Lin, J., Grimes, J., and Simmons, S. (2009).
Where is the cloud? geography, economics, environ-
ment, and jurisdiction in cloud computing. First Mon-
day, 14:5.
Janiesch, C., Niemann, M., and Repp, N. (2009). Towards a
service governance framework for the internet of ser-
vices. In 17th European conference on information
systems (ECIS), pages 1 –13.
Janvrin, D. (2007). The impact of information technology
on the audit process: An assessment of the state of
the art and implications for the future. Managerial
Auditing Journal, 16:159–164.
Law, U. S. P. (2000). Health insurance portability and ac-
countability act.
Li, X.-Y., Shi, Y., Guo, Y., and Ma, W. (2010). Multi-
tenancy based access control in cloud. In Computa-
tional Intelligence and Software Engineering (CiSE),
2010 International Conference on, pages 1 –4.
Mell, P. and Grance, T. (2009). Effectively and securely us-
ing the cloud computing paradigm. National Institute
of Standards and Technology.
Moreau, L., Groth, P., Miles, S., Vazquez-Salceda, J., Ib-
botson, J., Jiang, S., Munroe, S., Rana, O., Schreiber,
A., Tan, V., and Varga, L. (2008). The provenance of
electronic data. Commun. ACM, 51, 4(4):52–58.
Morrison, R., Balasubramaniam, D., Greenwood, M.,
Kirby, G., Mayes, K., Munro, D., and Warboys, B.
ARCHITECTURE FOR COMPLIANCE ANALYSIS OF DISTRIBUTED SERVICE BASED SYSTEMS
291