they must be sure that their decision strategy included
in their BP is preserved.
Even if the splitting of the process reduces the risk
of know how exposure, malicious cloud providers can
mine important information by combining their local
knowledge.
As a contribution to this topic, we proposed in
this paper an approach for detecting clouds initiating
or participating to a coalition by using a decoy pro-
cess. Each cloud participating or initiating a coalition
will have its reputation level reduced. The final set of
clouds will be used to deploy our initial BP process.
Important cost may be incurred by introducing de-
coy processes. But on the one hand, this may be the
price to pay for know how protection, and on the other
this can be minimized by our suggestions, which man-
aged strategically BP deployment.
Regarding future works, we aim to apply our ap-
proach to a real case where we aim to use real Cloud
resources while analyzing log files, to detect the un-
expected messages.
REFERENCES
Abdmeziem, M. R. (2016). Data confidentiality in the In-
ternet of Things. PhD thesis.
Abdmeziem, M. R. and Charoy, F. (2018). Fault-tolerant
and scalable key management protocol for iot-based
collaborative groups. In Security and Privacy in Com-
munication Networks: SecureComm 2017 Interna-
tional Workshops, ATCS and SePrIoT, Niagara Falls,
ON, Canada, October 22–25, 2017, Proceedings 13,
pages 320–338. Springer.
Ahmed Nacer, A., Goettelmann, E., Youcef, S., Tari, A.,
and Godart, C. (2016). Obfuscating a business process
by splitting its logic with fake fragments for securing
a multi-coud deployment. In the IEEE international
Congress on Services (SERVICES), page 8.
Arnold, U. (2000). New dimensions of outsourcing: a com-
bination of transaction cost economics and the core
competencies concept. European Journal of Purchas-
ing & Supply Management, 6(1):23–29.
Beaucamps, P. and Filiol,
´
E. (2007). On the possibility
of practically obfuscating programs towards a unified
perspective of code protection. Journal in Computer
Virology, 3(1):3–21.
Bentounsi, M., Benbernou, S., Deme, C. S., and Atallah,
M. J. (2012). Anonyfrag: an anonymization-based
approach for privacy-preserving bpaas. In 1st Inter-
national Workshop on Cloud Intelligence (colocated
with VLDB 2012), Cloud-I ’12, Istanbul, Turkey, Au-
gust 31, 2012, page 9.
Ge, L., Wang, X., and Yang, Z. (2021). The strategic
choice of contract types in business process outsourc-
ing. Business Process Management Journal.
Goettelmann, E., Ahmed-Nacer, A., Youcef, S., and Godart,
C. (2015). Paving the way towards semi-automatic
design-time business process model obfuscation. In
Web Services (ICWS), 2015 IEEE International Con-
ference on, pages 559–566.
Khalaf, R., Kopp, O., and Leymann, F. (2007). Maintaining
data dependencies across BPEL process fragments. In
Service-Oriented Computing - ICSOC 2007, Fifth In-
ternational Conference, Vienna, Austria, September
17-20, 2007, Proceedings, pages 207–219.
Network, E. and Agency, I. S. (2009). Cloud Computing:
Benefits, risks and recommendations for information
security. ENISA.
Polyvyanyy, A., Garc
´
ıa-Ba
˜
nuelos, L., and Dumas, M.
(2012). Structuring acyclic process models. Infor-
mation Systems, 37(6):518 – 538. BPM 2010.
Rekik, M., Boukadi, K., and Ben-Abdallah, H. (2015).
Business process outsourcing to the cloud: What ac-
tivity to outsource? In Computer Systems and Appli-
cations (AICCSA), 2015 IEEE/ACS 12th International
Conference of, pages 1–7. IEEE.
Suresh, S. and Ravichandran, T. (2022). Value gains in busi-
ness process outsourcing: The vendor perspective. In-
formation Systems Frontiers, 24(2):677–690.
Yang, D.-H., Kim, S., Nam, C., and Min, J.-W. (2007).
Developing a decision model for business process
outsourcing. Computers & Operations Research,
34(12):3769–3778.
Yildiz, U. and Godart, C. (2007). Towards decentralized
service orchestrations. In Proceedings of the 2007
ACM Symposium on Applied Computing (SAC), Seoul,
Korea, March 11-15, 2007.
Zemni, M. A., Benbernou, S., and Sahri, S. (2011). Pri-
vacypreserving business process fragmentation for
reusability.
Clouds Coalition Detection for Business Processes Outsourcing
537