Trustworthy Privacy-Preserving Service Compositions

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Abstract

E-Government applications are often composed of services provided by multiple service providers. Thus, public services must ensure accountability of performed actions to increase the trust in electronic services. Trust is crucial for user satisfaction and represents a key factor for the success of public services. Accountability is also necessary to determine an unintended behaviour of participants in service compositions. Transparent monitoring systems can facilitate the detection of failures or malicious behaviour of attackers. However, the demand for more accountability and transparency in public services arises challenges regarding the privacy of citizen's data. In this paper we propose a service composition concept providing accountability of service providers and considering privacy of sensitive data. This composition system uses proxy re-encryption in the communication protocol and cryptographically chains executed transactions. Retrospectively, citizens as well as participants of a processed service can validate the chained transactions. An implemented proof-of-concept demonstrates the feasibility of the proposed solution, which clearly supports accountability and thus increases trust in public services among citizens.
Original languageEnglish
Title of host publication2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Pages10-17
Number of pages8
DOIs
Publication statusPublished - 31 Oct 2019
Event18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering - Rotorua, New Zealand
Duration: 5 Aug 20198 Aug 2019

Conference

Conference18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering
Abbreviated titleTrustCom/BigDataSE 2019
CountryNew Zealand
CityRotorua
Period5/08/198/08/19

Fingerprint

Chemical analysis
Transparency
Cryptography
Computer systems
Network protocols
Monitoring

Cite this

Theuermann, K. (2019). Trustworthy Privacy-Preserving Service Compositions. In 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 10-17) https://doi.org/10.1109/TrustCom/BigDataSE.2019.00012

Trustworthy Privacy-Preserving Service Compositions. / Theuermann, Kevin.

2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). 2019. p. 10-17.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Theuermann, K 2019, Trustworthy Privacy-Preserving Service Compositions. in 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). pp. 10-17, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, Rotorua, New Zealand, 5/08/19. https://doi.org/10.1109/TrustCom/BigDataSE.2019.00012
Theuermann K. Trustworthy Privacy-Preserving Service Compositions. In 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). 2019. p. 10-17 https://doi.org/10.1109/TrustCom/BigDataSE.2019.00012
Theuermann, Kevin. / Trustworthy Privacy-Preserving Service Compositions. 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). 2019. pp. 10-17
@inproceedings{d1336de2f2f54cc7a6275e66145c2e36,
title = "Trustworthy Privacy-Preserving Service Compositions",
abstract = "E-Government applications are often composed of services provided by multiple service providers. Thus, public services must ensure accountability of performed actions to increase the trust in electronic services. Trust is crucial for user satisfaction and represents a key factor for the success of public services. Accountability is also necessary to determine an unintended behaviour of participants in service compositions. Transparent monitoring systems can facilitate the detection of failures or malicious behaviour of attackers. However, the demand for more accountability and transparency in public services arises challenges regarding the privacy of citizen's data. In this paper we propose a service composition concept providing accountability of service providers and considering privacy of sensitive data. This composition system uses proxy re-encryption in the communication protocol and cryptographically chains executed transactions. Retrospectively, citizens as well as participants of a processed service can validate the chained transactions. An implemented proof-of-concept demonstrates the feasibility of the proposed solution, which clearly supports accountability and thus increases trust in public services among citizens.",
author = "Kevin Theuermann",
year = "2019",
month = "10",
day = "31",
doi = "10.1109/TrustCom/BigDataSE.2019.00012",
language = "English",
pages = "10--17",
booktitle = "2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)",

}

TY - GEN

T1 - Trustworthy Privacy-Preserving Service Compositions

AU - Theuermann, Kevin

PY - 2019/10/31

Y1 - 2019/10/31

N2 - E-Government applications are often composed of services provided by multiple service providers. Thus, public services must ensure accountability of performed actions to increase the trust in electronic services. Trust is crucial for user satisfaction and represents a key factor for the success of public services. Accountability is also necessary to determine an unintended behaviour of participants in service compositions. Transparent monitoring systems can facilitate the detection of failures or malicious behaviour of attackers. However, the demand for more accountability and transparency in public services arises challenges regarding the privacy of citizen's data. In this paper we propose a service composition concept providing accountability of service providers and considering privacy of sensitive data. This composition system uses proxy re-encryption in the communication protocol and cryptographically chains executed transactions. Retrospectively, citizens as well as participants of a processed service can validate the chained transactions. An implemented proof-of-concept demonstrates the feasibility of the proposed solution, which clearly supports accountability and thus increases trust in public services among citizens.

AB - E-Government applications are often composed of services provided by multiple service providers. Thus, public services must ensure accountability of performed actions to increase the trust in electronic services. Trust is crucial for user satisfaction and represents a key factor for the success of public services. Accountability is also necessary to determine an unintended behaviour of participants in service compositions. Transparent monitoring systems can facilitate the detection of failures or malicious behaviour of attackers. However, the demand for more accountability and transparency in public services arises challenges regarding the privacy of citizen's data. In this paper we propose a service composition concept providing accountability of service providers and considering privacy of sensitive data. This composition system uses proxy re-encryption in the communication protocol and cryptographically chains executed transactions. Retrospectively, citizens as well as participants of a processed service can validate the chained transactions. An implemented proof-of-concept demonstrates the feasibility of the proposed solution, which clearly supports accountability and thus increases trust in public services among citizens.

U2 - 10.1109/TrustCom/BigDataSE.2019.00012

DO - 10.1109/TrustCom/BigDataSE.2019.00012

M3 - Conference contribution

SP - 10

EP - 17

BT - 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

ER -