ing.
One limitation of the proposed approach is that
the central repository is trusted to sanitize the data
before making it public. We can employ encryp-
tion based techniques to address this limitation which
would add significant computation and communica-
tion overhead. In the future, we plan to develop effi-
cient techniques to deal with cases in which the cen-
tral repository cannot be fully trusted.
ACKNOWLEDGEMENTS
The work of Irshad and Shafiq is supported by the
LUMS Faculty Initiative Fund Grant. The work of
Vaidya is supported by the National Science Founda-
tion under Grant No. CNS-1422501.
REFERENCES
Baresi, L. and Guinea, S. (2011). Self-supervising bpel pro-
cesses. IEEE Trans. Softw. Eng., 37(2):247–263.
Bentounsi, M., Benbernou, S., and Atallah, M. J. (2012a).
Privacy-preserving business process outsourcing. In
Web Services (ICWS), 2012 IEEE 19th International
Conference on, pages 662–663.
Bentounsi, M., Benbernou, S., Deme, C. S., and Atallah,
M. J. (2012b). Anonyfrag: An anonymization-based
approach for privacy-preserving bpaas. In Proceed-
ings of the 1st International Workshop on Cloud Intel-
ligence, Cloud-I ’12, pages 9:1–9:8.
Brambilla, M., Fraternali, P., and Vaca, C. (2012). Bpmn
and design patterns for engineering social bpm solu-
tions. In Business Process Management Workshops,
pages 219–230.
Bruno, G., Dengler, F., Jennings, B., Khalaf, R., Nurcan,
S., Prilla, M., Sarini, M., Schmidt, R., and Silva, R.
(2011). Key challenges for enabling agile bpm with
social software. Journal of Software Maintenance and
Evolution: Research and Practice, 23(4):297–326.
Chen, R., Fung, B. C., Desai, B. C., and Sossou, N. M.
(2012). Differentially private transit data publication:
a case study on the montreal transportation system. In
Proceedings of the 18th ACM SIGKDD international
conference on Knowledge discovery and data mining,
KDD ’12, pages 213–221.
Chun, S., Atluri, V., and Adam, N. R. (2002a). Dynamic
composition of workflows for customized egovern-
ment service delivery. In Proceedings of the 2002
annual national conference on Digital government re-
search, pages 1–7.
Chun, S. A., Atluri, V., and Adam, N. R. (2002b). Domain
knowledge-based automatic workflow generation. In
Database and Expert Systems Applications, pages 81–
93.
Chun, S. A., Atluri, V., and Adam, N. R. (2005). Using
semantics for policy-based web service composition.
Distributed and Parallel Databases, 18(1):37–64.
Dengler, F., Koschmider, A., Oberweis, A., and Zhang, H.
(2011). Social software for coordination of collab-
orative process activities. In Muehlen, M. and Su,
J., editors, Business Process Management Workshops,
volume 66 of Lecture Notes in Business Information
Processing, pages 396–407.
Dwork, C. (2006). Differential privacy. In Bugliesi, M.,
Preneel, B., Sassone, V., and Wegener, I., editors, Au-
tomata, Languages and Programming, volume 4052
of Lecture Notes in Computer Science, pages 1–12.
Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006).
Calibrating noise to sensitivity in private data analysis.
In Proceedings of the Third conference on Theory of
Cryptography, TCC’06, pages 265–284.
Evdemon, J., Arkin, A., Barreto, A., Curbera, B., Goland,
F., G.Kartha, Khalaf, L., Marin, K., van der Rijn, M.,
and Yiu, Y. (2007). Services business process execu-
tion language version 2.0. OASIS Standard.
Kerschbaum, F. and Deitos, R. J. (2008). Security against
the business partner. In Proceedings of the 2008 ACM
workshop on Secure web services, SWS ’08, pages 1–
10.
Kifer, D. and Machanavajjhala, A. (2011). No free lunch
in data privacy. In Proceedings of the 2011 ACM
SIGMOD International Conference on Management
of Data, SIGMOD ’11, pages 193–204.
Koschmider, A., Song, M., and Reijers, H. A. (2010). Social
software for business process modeling. Journal of
Information Technology, 25(3):308–322.
McSherry, F. D. (2009). Privacy integrated queries: an ex-
tensible platform for privacy-preserving data analysis.
In Proceedings of the 2009 ACM SIGMOD Interna-
tional Conference on Management of data, SIGMOD
’09, pages 19–30.
Moser, O., Rosenberg, F., and Dustdar, S. (2008). Non-
intrusive monitoring and service adaptation for ws-
bpel. In Proceedings of the 17th international confer-
ence on World Wide Web, WWW ’08, pages 815–824.
Paliwal, A. V., Shafiq, B., Vaidya, J., Xiong, H., and Adam,
N. (2012). Semantics-based automated service dis-
covery. Services Computing, IEEE Transactions on,
5(2):260–275.
Quinlan, J. R. (1986). Induction of decision trees. Machine
learning, 1(1):81–106.
Silva, R., Zhang, J., and Shanahan, J. G. (2005). Probabilis-
tic workflow mining. In Proceedings of the eleventh
ACM SIGKDD international conference on Knowl-
edge discovery in data mining, KDD ’05, pages 275–
284.
Turban, E., Lee, J. K., King, D., Liang, T. P., and Turban,
D. (2009). Electronic commerce 2010.
Van der Aalst, W., Weijters, T., and Maruster, L. (Sept.).
Workflow mining: discovering process models from
event logs. Knowledge and Data Engineering, IEEE
Transactions on, 16(9):1128–1142.
van der Aalst, W. M., Pesic, M., and Song, M. (2010). Be-
yond process mining: from the past to present and fu-
ture. In Advanced Information Systems Engineering,
pages 38–52.
Wen, L., Wang, J., Aalst, W., Huang, B., and Sun, J. (2009).
A novel approach for process mining based on event
types. Journal of Intelligent Information Systems,
32:163–190.
PreservingPrivacyinCollaborativeBusinessProcessComposition
123