Balancing Privacy Risk and Benefit in Service Selection for Multiprovision Cloud Service Composition
Abstract
:1. Introduction
- (1)
- An integer programming optimization model is used to formulate the SSMB problem, which takes into account the privacy risks of the user, the personalized benefits provided by the CSs, and the multiservice provision characteristics of CSPs.
- (2)
- A privacy risk model is proposed to measure the dissatisfaction degree between a CS’s privacy policies and the user’s privacy preferences, and the CS’s privacy risk is evaluated by combining privacy policy dissatisfaction degree, private data sensitivity degree, and CSP’s trust degree.
- (3)
- A benefit model is put forward to measure the benefit of personalized service provided by CSs, which employs sigmoid function to model the nonlinear relationship between the quality of personalized service and the number of private data required.
- (4)
- A solution using the improved KM algorithm is designed to solve the SSBM problem. The experimental results demonstrate that the proposed approach can significantly improve the risk–benefit ratio and performance compared with benchmark approaches.
2. Motivation and Scenario
- (1)
- Cloud service composition manager: it firstly receives the user’s requirements about functions and privacy disclosure, and establishes a service composition plan that describes tasks and their relationships. Then, it searches for candidate CSs for each task from the cloud service repository. Furthermore, it coordinates a risk/benefit calculator, privacy risk evaluator, and cloud service selector to assign suitable candidate CSs to multiple tasks. Finally, it generates an optimal service composition solution.
- (2)
- Risk/benefit calculator: It calculates the privacy risk and benefit of each candidate CS based on the privacy sensitivity preferences of the user, the private data disclosure information of the candidate CSs, and the trust degrees of the CSPs.
- (3)
- Privacy risk evaluator: Based on the privacy risk information of the candidate CSs, it evaluates whether each candidate CS satisfies the privacy risk threshold constraint.
- (4)
- Cloud service selector: According to the results of the privacy evaluation, the privacy risk and benefit information of the candidate CSs, the upper bound of service provision, and the privacy risk and benefit balance weight, the cloud service selector is in charge of solving the SSMB problem by assigning the suitable candidate CSs to multiple tasks.
3. Problem Model
3.1. Privacy Disclosure Requirements
- (1)
- Private data set PD: PD = {pd0, pd1, …, pdp−1} expresses a set of private data of the user, where pdl is the lth private data item, l ∈ {0, 1, …, p − 1}, p (=|PD|) represents the number of private data in PD.
- (2)
- Privacy sensitivity preferences SP: SP = {<pd0, sd0>, <pd1, sd1>, …, <pdp−1, sdp−1>} expresses a set of privacy sensitivity preferences specified by a user, where <pdl, sdl > is the lth privacy sensitivity preference, sdl ∈ [0, 1] represents the sensitivity degree of pdl, 0 indicates insensitive, and 1 indicates particularly sensitive.
- (3)
- Privacy disclosure preferences Pre = {pre0, pre1, …, prep−1} is a set of privacy preferences specified by a user. Each privacy preference prel is defined as a tuple <pdl, Pul, Lcl, rel>, where pdl ∈ PD is a private data item of the user, Pul specifies a set of purposes for which the pdl can be used, Lcl specifies a set of locations where the pdl can be stored, reg ∈ N specifies the longest time that the CSPs can retain pdl (in days).
- (4)
- Balance weight w: w ∈ [0, 1] is a weight parameter that expresses the user’s preference for balancing privacy risk and benefit, w = 0 means that the user is only concerned about the privacy risk, while w = 1 means that the user is only concerned about the benefit, and w ∈ (0, 1) means that the user considers the trade-off between privacy risk and benefit.
- (5)
- Privacy risk threshold rt: rt ∈ 0 ∪ R+ specifies the maximum privacy risk degree of each service that a user can tolerate.
- (6)
- The upper bound of service provision ub: ub ∈ N+ is the number of services for a CSP to provide at most in a CSC. For example, ub = 1 informs that the CSP can deliver at most one service in a CSC, and ub > 1 means that the CSP can offer multiple services in a CSC.
- PD = {name, ID, address, gender, age, phone number, zip code, bank card number, password, insurance number, prescription, medicines, diagnosis results, allergic history, medical history, medication history, occupation, salary, delivery location, delivery time},
- SP = {<name, 0.6>, <ID, 0.8>, <address, 0.6>, <gender, 0.5>, <age, 0.5>, <phone number, 0.7>, <zip code, 0.5>, <bank card number, 0.75>, <password, 0.75>, <insurance number, 0.7>, <prescription, 0.7>, <medicines, 0.7>, <diagnosis results, 0.7>, <allergic history, 0.65>, <medical history, 0.65>, <medication history, 0.65>, <occupation, 0.4>, <salary, 0.4>, <delivery location, 0.5>, <delivery time, 0.6>},
- Pre = {pre0 = <name, {ordering, payment, shipping, contact, audit}, {DE, FR,UK, US, CN, AU}, 60>,
- pre1 = <ID, {ordering, payment}, {DE, FR, UK}, 30>,pre2 = <address, {ordering, payment, shipping, contact}, {DE, FR, UK}, 30>,
- pre3 = <gender, {shipping, medicine recommendations}, {DE, FR, UK, US,CN, AU}, 60>,
- pre4 = <age, {medicine recommendations}, {DE, FR, UK, US, CN, AU}, 60>,
- pre5 = <phone number, {ordering, payment, shipping, contact, audit}, {DE, FR, UK}, 30>,
- pre6 = <zip code, {shipping, contact, audit}, {DE, FR, UK, US, CN, AU}, 60>,pre7 = <bank card number, {payment}, {DE, FR, UK}, 30>,
- pre8 = <password, {payment}, {DE, FR, UK}, 30>,
- pre9 = <insurance number, {ordering}, {DE, FR, UK}, 30>,
- pre10 = <prescription, {prescription checking, audit}, {DE, FR, UK}, 30>,
- pre11 = <medicines, {ordering}, {DE, FR, UK}, 30>,
- pre12 = <diagnosis results, {personalized medicine}, {DE, FR, UK}, 30>,
- pre13 = <allergic history, {personalized medicine}, {DE, FR, UK}, 30>,
- pre14 = <medical history, {medicine recommendations,personalized medicine}, {DE, FR, UK}, 30>,
- pre15 = <medication history, {medicine recommendations, personalized medicine}, {DE, FR, UK}, 30>,
- pre16 = <occupation, {medicine recommendations, personalized payment}, {DE, FR, UK, US,CN, AU}, 90>,
- pre17 = <salary, {medicine recommendations, personalized payment}, {DE, FR, UK, US, CN, AU}, 90>,
- pre18 = <delivery location, {personalized delivery}, {DE, FR, UK, US, CN, AU}, 90>,
- pre19 = <delivery time, {personalized delivery}, {DE, FR, UK, US, CN, AU}, 90>},
- w = 0.5,
- rt = 2,
- ub = 2.
3.2. MPCSC Model
3.3. Privacy Risk Model
- (1)
- Purpose dissatisfaction: The purpose attributes of both privacy policies and privacy preferences are defined as a purpose set; we use the Jaccard coefficient [41] to measure the distance between them. The degree of dissatisfaction with the purpose attribute is measured by:
- (2)
- Location dissatisfaction: The privacy preference specifies a set of locations where a private data can be stored. We measure the degree of dissatisfaction with the location by judging whether the location attribute of the privacy policy is in the location set specified by the privacy preference, which is calculated by:
- (3)
- Retention dissatisfaction: The retention can be expressed as a numerical value. We measure the degree of dissatisfaction with the retention by evaluating whether the retention time of the privacy policy is less than or equal to the retention time of the privacy preference, which is calculated by:
- (1)
- Privacy disclosure vector DVik: It is a vector of length p, where DVik[l] ∈ [0, 1] denotes if the private data item pdl is disclosed to CSik, DVik[l] = 1 means yes and 0 no, i ∈ {0, 1, …, m − 1}, k ∈ {0, 1, …, o − 1}, l ∈ {0, 1, …, p − 1}. The DVik[l] is calculated by:
- (2)
- Privacy sensitivity vector SV: It is a vector of length p, where SV[l] = sdl denotes the sensitivity degree of the lth private data item pdl, l ∈ {0, 1, …, p − 1}.
- = < prescription, {prescription checking, audit, medical analysis, advertisement}, US, 90>
- = < allergic history, {personalized medicine, medicine recommendations}, DE, 30>
- = < medication history, {medicine recommendations, personalized medicine, advertisement}, UK, 30>
3.4. Personalized Benefit Model
3.5. Problem Definition
- (1)
- Provision matrix P: It is an m × n matrix, where P[i, j] denotes whether there is a CSik in CSPi that can execute the task tj, P[i, j] = CSik means CSik is a candidate service of tj and 0 no, i ∈ {0, 1, …, m − 1}, j ∈ {0, 1, …, n − 1}, k ∈ {0, 1, …, o − 1}.
- (2)
- Risk matrix R: It is an m × n matrix, where R[i, j] ∈ [0, 1] denotes the normalized privacy risk of CSik provided by CSPi for task tj, i ∈ {0, 1, …, m − 1}, j ∈ {0, 1, …, n − 1}, k ∈ {0, 1, …, o − 1}. R[i, j] is calculated by:
- (3)
- Benefit matrix B: It is an m × n matrix, where B[i, j] ∈ (0, 1) denotes the benefit of CSik provided by CSPi for task tj, i ∈ {0, 1, …, m − 1}, j ∈ {0, 1, …, n − 1}, k ∈ {0, 1, …, o − 1}. B[i, j] is obtained by:
- (4)
- Evaluation matrix E: It is an m × n matrix, where E[i, j] denotes whether CSik provided by CSPi for task tj meets the user’s privacy risk threshold constraint, E[i, j] = 1 means yes and 0 no, i ∈ {0, 1, …, m − 1}, j ∈ {0, 1, …, n − 1}, k ∈ {0, 1, …, o − 1}. E[i, j] is obtained by:
- (1)
- Utility matrix U: It is an m × n matrix, where U[I, j] ∈ [−1, 1) denotes the utility of CSik provided by CSPi for task tj, i ∈ {0, 1, …, m − 1}, j ∈ {0, 1, …, n − 1}, k ∈ {0, 1, …, o − 1}. U[i, j] is calculated by:
- (2)
- Assignment matrix A: It is an m × n matrix, where A[i, j] ∈ {0, 1} denotes whether tj is assigned to CSik (A[i, j] = 1) or not (A[i, j] = 0), i ∈ {0, 1, …, m − 1}, j ∈ {0, 1, …, n − 1}, k ∈ {0, 1, …, o − 1}.
4. Solution to the SSBM Problem
- (1)
- The KM algorithm always finds the solution with the smallest sum [48]. However, the SSBM problem requires finding a solution with the greatest utility.
- (2)
- For the SSMB problem, the KM algorithm can always find a result for it, but the result may not be a feasible solution. For example, when the CSPi cannot provide candidate CSik for task tj or the candidate CSik cannot satisfy the privacy risk threshold constraint, i.e., E[i, j] = 0, the KM algorithm may produce incorrect task assignments, leading to an infeasible solution.
- (3)
- The KM algorithm can only solve the 1-to-1 task assignment problem, that is, m = n, and a CSP can only serve one task in a CSC. However, the SSMB problem is a typical n-to-1 task assignment problem. In SSMB, m ≫ n, where “≫” means “much larger than”, and each CSP can provide services for multiple tasks of a CSC.
- Step 1: Utility Matrix Building
Algorithm 1: Utility matrix building |
Input: m: the number of CSPs; n: the number of tasks; |
w: the privacy risk and benefit balance weight. |
Output: U: a utility matrix. |
1: for i = 0, 1, … m − 1 do |
2: for j = 0, 1, …, n − 1 do |
3: R[i, j] ← calculate the normalized privacy risk of CSik by (8); |
4: B[i, j] ← calculate the benefit of CSik by (9); |
5: U[i, j] ← calculate the utility of CSik from R[i, j], B[i, j] and w by (11); |
6: end for |
7: end for |
8: return U; |
- Step 2: Utility Matrix Reset and Extension
Algorithm 2: Utility matrix reset and extension |
Input: m: the number of CSPs; n: the number of tasks; |
ub: the upper bound of service provision; U: the utility matrix. |
Output: M: a square matrix extended from U matrix. |
1: maxu ← finds the maximum utility in matrix U; |
2: for i = 0, 1, …, m − 1 do |
3: for j = 0, 1, …, n − 1 do |
4: E[i, j] ← calculate the privacy evaluation result of CSik by (10); |
5: if E[i, j] = 1 then |
6: U[i, j] ← maxu-U[i, j]; |
7: else |
8: U[i, j] ← n; |
9: end if |
10: end for |
11: end for |
12: for j = 0, 1, …, n − 1 do |
13: for i = 0, 1, …, m − 1 do |
14: index ← 0; |
15: for x = 0, 1, …, ub − 1 do |
16: M[index++, j] ← U[i, j]; |
17: end for |
18: end for |
19: end for |
20: if m × ub > n then |
21: for z = n, n + 1,…, m × ub − 1 do |
22: for y = 0, 1,…, m × ub − 1 do |
23: M[y, z] ← 0; |
24: end for |
25: end for |
26: end if |
27: return M; |
- Step 3: KM Algorithm-Based Task Assignment
Algorithm 3: Optimal task assignment |
Input:M: A square matrix extended from U matrix. |
Output: Success: A; Failure: no feasible A is obtained. |
1: N ← KM (M); |
2: Form the assignment matrix A based on N; |
3: for j = 0, 1, …, n − 1 do |
4: for i = 0, 1, … m − 1 do |
5: if A[i, j] = 1 and U[i, j] = n then |
6: return Failure; |
7: end if |
8: end for |
9: end for |
10: if for all columns of matrix A satisfy then |
11: calculate the overall utility of the optimal CSC by (12); |
12: return Success |
13: else |
14: return Failure |
15: end if |
5. Experiments
- (1)
- MinR. It adopts the KM algorithm to assign tasks to candidate CSs that satisfy the user’s privacy disclosure requirements, so as to minimize privacy risk without considering benefit. The MinR problem can be formulated as follows:
- (2)
- MaxB. It adopts the KM algorithm to assign tasks to candidate CSs that satisfy the users’ privacy disclosure requirements, so as to maximize benefit without considering privacy risk. The MaxB problem can be formulated as follows:
- (3)
- Cplex. It solves the optimization problem proposed in Section 3.5 with IBM’s CPLEX Optimizer v12.2 [49] and assigns tasks based on the solution.
5.1. Experimental Setting
5.2. Effectiveness Evaluation
5.3. Efficiency Evaluation
5.4. Discussion
- (1)
- IKM, MinR, and MaxB take the same execution time to solve their problems, and the utility of IKM is between MinR and MaxB. However, in most cases, IKM is better than MinR and MaxB when comparing the actual benefit received with the risk assumed. Additionally, IKM and Cplex have the same result in solving the SSMB problem. However, in terms of performance, the time overhead of IKM is much smaller than that of Cplex. Thus, comprehensively comparing these approaches, IKM is considered to be a better approach to finding the optimal solution to the SSBM problem.
- (2)
- As npd increases, the utilities of IKM and MaxB increase, while the utility of MinR decreases. Therefore, for users who balance privacy risk and benefit and users who only care about benefit, they can obtain more benefits by appropriately selecting CSs that require more private data, while for users who only care about privacy, they should select as many CSs as possible that require less private data.
- (3)
- When npd is relatively small, the benefit-to-risk ratio of IKM increases as w increases. It is higher than MinR in all cases, and exceeds MaxB when w ≥ 0.4. However, in the case of relatively large npd, the benefit-to-risk ratio of IKM is always higher than MaxB, it decreases with the increase of w, and is lower than MinR when w > 0.5. Therefore, for users who balance privacy risk and benefit, they should adjust w according to a different npd to obtain a higher benefit-to-risk ratio.
- (4)
- Although expanding m/n and ub can improve the utility and benefit-to-risk ratio, it also brings more time consumption. In addition, relaxing the rt constraint can increase utility, but it also leads to a decrease in the benefit-to-risk ratio. In summary, in service selection, privacy disclosure requirements can be set by a user according to the utility, profit-to-risk ratio, and time consumption with alternative combinations of m, n, w, npd, rt, and ub.
- (5)
- Since expanding m/n can increase the utility and benefit-to-risk ratio of all the approaches, CSPs should increase the supply of candidate service types in order to obtain more service provision opportunities. Additionally, because different user groups have different privacy disclosure requirements, CSPs should also disclose private data and provide personalized services based on the user groups that provide services.
- (6)
- For any two tasks in MPCSC, if they are assigned to services provided by the same CSP, then the CSP will collect multiple pieces of private data from the user, and can infer more privacy information from the collected data. Therefore, this type of task assignment will increase the overall privacy risk of a CSC. In order to calculate this part of the increased privacy risk, it needs to expand the objective function of the SSBM problem. The expanded SSBM problem is as follows:
- (7)
- The service selection approach proposed in this paper is practical and feasible. As shown in Figure 1, users only need to submit their functional requirements and privacy requirements to the cloud service broker. The cloud service broker can utilize the cloud service composition manager to discover candidate CSs from different CSPs. The cloud service composition manager then evaluates the privacy risks and personalized benefits of these candidate CSs, and selects a set of CSs with the maximum utility for users to use. The abovementioned service discovery, evaluation, and selection processes are automatically completed by the cloud service composition manager, and do not require user participation. In future work, we intend to develop a web application-based service selection tool for the proposed approach, where users can set their functionality and privacy requirements by simply filling in and selecting some parameter values in web pages. Therefore, the users can use it very easily.
- (8)
- In MPCSC, each CSP can provide services for multiple tasks and expect users to select as many services as possible. However, if a user selects too many services from the same CSP, it will lead to serious privacy leakage risks, and will also face high service prices and vendor lock-in. The proposed approach selects CSs from multiple CSPs, which can effectively reduce privacy risks and obtain services with lower prices and higher quality. At the same time, the proposed approach can also motivate CSPs to continuously enhance privacy protection capabilities, reduce asking prices, and improve service quality to compete for more service provision opportunities. Indeed, selecting services from multiple CSPs may incur some financial cost as well as technical difficulties compared to selecting services from a single CSP. However, in general, the benefits of selecting services from multiple CSPs can offset these costs, and furthermore, as can be seen from our simulation experiments, the proposed approach is technically practical and feasible.
6. Related Work
6.1. Service Selection for MPCSC
6.2. Privacy-Preserving Service Selection
6.3. Risk–Benefit Balance in Private Data Disclosure
7. Conclusions
- (1)
- IKM, MinR, and MaxB have the same time performance. But in terms of utility, IKM is between MinR and MaxB, and in terms of benefit-to-risk ratio, IKM outperforms MinR and MaxB in most cases.
- (2)
- IKM and Cplex have the same result in solving the SSMB problem. However, in terms of performance, the time consumption of IKM is much less than that of Cplex.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.H.; Andrew, K.; Gunho, L.; David, A.P.; Ariel, R.; Stoica, I.; et al. Above the Clouds: A Berkeley View of Cloud Computing. Comm. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef] [Green Version]
- He, Q.; Yan, J.; Jin, H.; Yang, Y. Quality-Aware Service Selection for Service-Based Systems Based on Iterative Multi-Attribute Combinatorial Auction. IEEE Trans. Softw. Eng. 2014, 40, 192–215. [Google Scholar] [CrossRef]
- Jamshidi, P.; Ahmad, A.; Pahl, C. Cloud Migration Research: A Systematic Review. IEEE Trans. Cloud Comput. 2013, 1, 142–157. [Google Scholar] [CrossRef]
- Gartner. Gartner Forecasts Worldwide Public Cloud Revenue to Grow 6.3% in 2020. 2020. Available online: https://www.gartner.com/en/newsroom/press-releases/2020-07-23-gartner-forecasts-worldwide-public-cloud-revenue-to-grow-6point3-percent-in-2020 (accessed on 10 April 2022).
- Lin, D.; Squicciarini, A.C.; Dondapati, V.N.; Sundareswaran, S. A Cloud Brokerage Architecture for Efficient Cloud Service Selection. IEEE Trans. Cloud Comput. 2019, 12, 144–157. [Google Scholar] [CrossRef]
- Liu, L.; Zhu, H.; Chen, S.; Huang, Z. Privacy Regulation Aware Service Selection for Multi-provision Cloud Service Composition. Future Gener. Comput. Syst. 2022, 126, 263–278. [Google Scholar] [CrossRef]
- Ma, H.; Zhu, H.; Li, K.; Tang, W. Collaborative Optimization of Service Composition for Data-Intensive Applications in a Hybrid Cloud. IEEE Trans. Parallel Distrib. Syst. 2019, 30, 1022–1035. [Google Scholar] [CrossRef]
- Shi, T.; Ma, H.; Chen, G.; Sven, H. Location-Aware and Budget-Constrained Service Deployment for Composite Applications in Multi-Cloud Environment. IEEE Trans. Parallel Distrib. Syst. 2020, 31, 1954–1969. [Google Scholar] [CrossRef]
- Pallant, J.I.; Pallant, J.L.; Sands, S.J.; Ferraro, C.R.; Afifi, E. When and How Consumers Are Willing to Exchange Data with Retailers: An Exploratory Segmentation. J. Retail. Consum. Serv. 2022, 64, 1–12. [Google Scholar] [CrossRef]
- Gerber, N.; Gerber, P.; Volkamer, M. Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior. Comput. Secur. 2018, 77, 226–261. [Google Scholar] [CrossRef]
- Zhu, H.; Ou, C.X.; Van den Heuvel, W.J.A.M.; Liu, H. Privacy Calculus and Its Utility for Personalization Services in E-commerce: An Analysis of Consumer Decision-Making. Inf. Manag. 2017, 54, 427–437. [Google Scholar] [CrossRef]
- Ghorbel, A.; Ghorbel, M.; Jmaiel, M. Privacy in Cloud Computing Environments: A Survey and Research Challenges. J. Supercomput. 2017, 73, 2763–2800. [Google Scholar] [CrossRef]
- Bahri, L.; Carminati, B.; Ferrari, E. Privacy in Web Service Transactions: A Tale of More than a Decade of Work. IEEE Trans. Serv. Comput. 2018, 11, 448–465. [Google Scholar] [CrossRef]
- Koh, B.; Raghunathan, S.; Nault, B.R. An Empirical Examination of Voluntary Profiling: Privacy and Quid Pro Quo. Decis. Support Syst. 2020, 132, 1–11. [Google Scholar] [CrossRef]
- Awad, N.F.; Krishnan, M.S. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and The Willingness to be Profiled Online for Personalization. MIS Q. 2006, 30, 13–28. [Google Scholar] [CrossRef] [Green Version]
- Dinev, T.; Hart, P. An Extended Privacy Calculus Model for E-commerce Transactions. Inf. Syst. Res. 2006, 17, 61–80. [Google Scholar] [CrossRef]
- Ozturk, A.B.; Nusair, K.; Okumus, F.; Singh, D. Understanding Mobile Hotel Booking Loyalty: An Integration of Privacy Calculus Theory and Trust-Risk Framework. Inf. Syst. Front. 2017, 19, 753–767. [Google Scholar] [CrossRef]
- Kordzadeh, N.; Warren, J. Communicating Personal Health Information in Virtual Health Communities: An Integration of Privacy Calculus Model and Affective Commitment. J. Assoc. Inf. Syst. 2017, 18, 45–81. [Google Scholar] [CrossRef] [Green Version]
- Wahab, O.A.; Bentahar, J.; Otrok, H. Towards trustworthy multi-cloud services communities: A trust-based hedonic coalitional game. IEEE Trans. Serv. Comput. 2018, 11, 184–201. [Google Scholar] [CrossRef]
- Nesrine, K.; Maryline, L.; Sana, B. Privacy Enhancing Technologies for Solving the Privacy-Personalization Paradox: Taxonomy and Survey. J. Netw. Comput. Appl. 2020, 171, 1–32. [Google Scholar]
- Badsha, S.; Yi, X.; Khalil, I.; Liu, D.; Nepal, S.; Bertino, E.; Lam, K.Y. Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 2021, 14, 791–804. [Google Scholar] [CrossRef]
- Kosinski, M.; Stillwell, D.; Graepel, T. Private Traits and Attributes are Predictable from Digital Records of Human Behavior. Proc. Natl. Acad. Sci. USA 2013, 110, 5802–5805. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Cai, Z.; He, Z.; Guan, X.; Li, Y. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Trans. Depend. Secur. Comput. 2018, 15, 577–590. [Google Scholar] [CrossRef]
- Deng, S.; Wu, H.; Hu, D.; Zhao, J.L. Service Selection for Composition with QoS Correlations. IEEE Trans. Serv. Comput. 2016, 9, 291–303. [Google Scholar] [CrossRef]
- Zhang, Y.; Cui, G.; Deng, S.; Chen, F.; Wang, Y.; He, Q. Efficient Query of Quality Correlation for Service Composition. IEEE Trans. Serv. Comput. 2021, 14, 695–709. [Google Scholar] [CrossRef]
- Wen, Z.; Jacek, C.; Paul, W.; Alexander, B.R. Cost Effective, Reliable and Secure Workflow Deployment over Federated Clouds. IEEE Trans. Serv. Comput. 2017, 10, 929–941. [Google Scholar] [CrossRef] [Green Version]
- Costante, E.; Paci, F.; Zannone, N. Privacy-Aware Web Service Composition and Ranking. In Proceedings of the 2013 IEEE International Conference on Web Services, Santa Clara, CA, USA, 28 June–3 July 2013; pp. 131–138. [Google Scholar]
- Amini, M.; Osanloo, F. Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition. IEEE Trans. Serv. Comput. 2019, 12, 604–620. [Google Scholar] [CrossRef]
- Barati, M.; Rana, O. Tracking GDPR Compliance in Cloud-based Service Delivery. IEEE Trans. Services Comput. 2018. to be published. Available online: https://ieeexplore.ieee.org/document/9106853 (accessed on 10 April 2022). [CrossRef]
- Tbahriti, S.E.; Ghedira, C.; Medjahed, B.; Mrissa, M. Privacy-Enhanced Web Service Composition. IEEE Trans. Serv. Comput. 2014, 7, 210–222. [Google Scholar] [CrossRef]
- Meng, Y.; Huang, Z.; Zhou, Y.; Ke, C. Privacy-Aware Cloud Service Selection Approach Based on P-Spec Policy Models and Privacy Sensitivities. Future Gener. Comput. Syst. 2018, 86, 1–11. [Google Scholar] [CrossRef]
- Alom, M.Z.; Singh, B.C.; Aung, Z.; Azim, M.A. Knapsack Graph-Based Privacy Checking for Smart Environments. Comput. Secur. 2021, 105, 1–15. [Google Scholar] [CrossRef]
- Union, E. General Data Protection Regulation. Off. J. Eur. Union 2018. Available online: https://gdpr-info.eu/ (accessed on 10 April 2022).
- Yu, T.; Zhang, Y.; Lin, K.J. Modeling and Measuring Privacy Risks in QoS Web Services. In Proceedings of the 2006 IEEE International Conference on E-Commerce Technology and 2006 IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, PaloAlto, CA, USA, 26–29 June 2016. [Google Scholar]
- Belabed, A.; Aïmeur, E.; Chikh, M.A.; Fethallah, H. A Privacy-Preserving Approach for Composite Web Service Selection. Trans. Data Priv. 2017, 10, 83–115. [Google Scholar]
- Kuhn, H.W. The Hungarian Method for the Assignment Problem. Nav. Res. Logist. Q. 1955, 2, 83–97. [Google Scholar] [CrossRef] [Green Version]
- Munkres, J. Algorithms for the Assignment and Transportation Problems. SIAM J. 1957, 5, 32–38. [Google Scholar] [CrossRef] [Green Version]
- Ke, C.; Xiao, F.; Huang, Z.; Meng, Y.; Cao, Y. Ontology-based Privacy Data Chain Disclosure Discovery Method for Big Data. IEEE Trans. Serv. Comput. 2022, 15, 59–68. [Google Scholar] [CrossRef]
- Shen, H.; Liu, G. An efficient and trustworthy resource sharing platform for collaborative cloud computing. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 862–875. [Google Scholar] [CrossRef]
- Li, X.; Yuan, J.; Ma, H.; Yao, W. Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1917–1931. [Google Scholar] [CrossRef]
- Niwattanakul, S.; Singthongchai, J.; Naenudorn, E.; Wanapu, S. Using of Jaccard coefficient for keywords similarity. In Proceedings of the International Multi-Conference of Engineers and Computer Scientists, Hong Kong, China, 13–15 March 2013; pp. 1–5. [Google Scholar]
- Stoneburner, G.; Goguen, A.; Feringa, A. Risk Management Guide for Information Technology Systems. Tech. Rep. 2002. Available online: https://csrc.nist.gov/publications/detail/sp/800-30/archive/2002-07-01 (accessed on 10 April 2022).
- Riaz, A.S.; Kamel, A.; Luigi, L. Dynamic Risk-Based Decision Methods for Access Control Systems. Comput. Secur. 2012, 31, 447–464. [Google Scholar]
- Mahdi, H.; Bill, M.; Shervin, S. QoE-Aware Bandwidth Allocation for Video Traffic Using Sigmoidal Programming. IEEE Multim. 2017, 24, 80–90. [Google Scholar]
- Phu, L.; He, Q.; Cui, G.; Xia, X.; Mohamed, A.; Feifei, C.; John, G.H.; John, G.; Yun, Y. QoE-Aware User Allocation in Edge Computing Systems with Dynamic QoS. Future Gener. Comput. Syst. 2020, 112, 684–694. [Google Scholar]
- Zhu, H.; Zhou, M. Role Transfer Problems and Algorithms. IEEE Trans. Syst. Man Cybern. Part A 2008, 38, 1442–1450. [Google Scholar]
- Zhu, H.; Alkins, R. Improvement to Rated Role Assignment Algorithms. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11–14 October 2009; pp. 4861–4866. [Google Scholar]
- Zhu, H.; Zhou, M.; Alkins, R. Group Role Assignment via a Kuhn-Munkres Algorithm-Based Solution. IEEE Trans. Syst. Man Cybern. Syst. 2012, 42, 739–750. [Google Scholar] [CrossRef]
- IBM. IBM ILOG CPLEX Optimization Studio. 2019. Available online: https://www.ibm.com/products/ilog-cplex-optimization-studio (accessed on 10 April 2022).
- Zhu, H.; Sheng, Y.; Zhou, X.; Zhu, Y. Group Role Assignment with Cooperation and Conflict Factors. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 851–863. [Google Scholar] [CrossRef]
- Xiao, Y.; Zhou, A.C.; Yang, X.; He, B. Privacy-Preserving Workflow Scheduling in Geo-Distributed Data Centers. Future Gener. Comput. Syst. 2022, 130, 46–58. [Google Scholar] [CrossRef]
- Yang, M.; Yu, Y.; Bandara, A.K.; Nuseibeh, B. Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit. In Proceedings of the 2014 IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, 24–26 September 2014; pp. 45–52. [Google Scholar]
- Sourya, J.D.; Abdessamad, I. Enabling Users to Balance Social Benefit and Privacy in Online Social Networks. In Proceedings of the Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, UK, 29 November 2018; pp. 1–10. [Google Scholar]
- Mahmoud, B.; Charith, P.; Chirine, G.; Djamal, B. User-Centric Privacy Engineering for the Internet of Things. IEEE Cloud Comput. 2018, 5, 47–57. [Google Scholar]
- Bikash, C.S.; Barbara, C.; Elena, F. A Risk-Benefit Driven Architecture for Personal Data Release. In Proceedings of the 2016 IEEE International Conference on Information Reuse and Integration, Pittsburgh, PA, USA, 28–30 July 2016; pp. 40–49. [Google Scholar]
CSPs | Tasks | |||
---|---|---|---|---|
t0 | t1 | t2 | t3 | |
CSP0 | CS00 | CS01 | CS02 | Not Available (N/A) |
CSP1 | N/A | CS11 | CS12 | N/A |
CSP2 | CS20 | N/A | CS22 | CS23 |
CSP3 | CS30 | CS31 | N/A | CS33 |
Candidate Services | Inputs | Personalized Services | |
---|---|---|---|
Necessary Private Data | Unnecessary Private Data | ||
CS00 | prescription | allergies history, medication history | personalized medicine |
CS01 | name, address, phone number, medicines, checking results | age, gender, occupation, salary | medicine recommendation |
CS02 | bank card number, password, reservation code | name, phone number | personalized payment |
CS11 | insurance number, phone number, medicines, checking results | medical history, medication history | medicine recommendation |
CS12 | name, ID, phone number, bank card number, reservation code | address, zip code | personalized payment |
CS20 | prescription | diagnosis results | personalized medicine |
CS22 | bank card number, password, reservation code | phone number | personalized payment |
CS23 | name, phone number, zip code, payment code | delivery location | personalized delivery |
CS30 | prescription | allergies history, medical history, medication history, diagnosis results | personalized medicine |
CS31 | ID, phone number, address, medicines, checking results | age, gender, medical history | medicine recommendation |
CS33 | name, gender, address, phone number, payment code | delivery time | personalized delivery |
CSPs | CSP0 | CSP1 | CSP2 | CSP3 |
---|---|---|---|---|
Trust degrees | 0.4 | 0.7 | 0.5 | 0.8 |
Type | Configuration |
---|---|
Environment | Windows 7 Enterprise (64-bit), JDK 1.8, Eclipse 4.6.0 |
CPU | Intel core i7-4790, 3.60 GHz |
Storage | 8 G of memory, 1 TB disk |
m | n | w | rt | npd | ub | ||
---|---|---|---|---|---|---|---|
Set #1 | Set #1.1 | 20, 40, …, 200 | 10, 20, …, 100 | 0.5 | 2 | [1, 10] | 2 |
Set #1.2 | 40, 80, …, 400 | ||||||
Set #1.3 | 100 | 50 | 0.1, 0.2, …, 0.9 | 2 | [1, 10] | 2 | |
Set #1.4 | 4 | [1, 10] | 2 | ||||
Set #1.5 | 4 | [11, 20] | 2 | ||||
Set #1.6 | 2 | [1, 10] | 4 |
m | n | ub | ||
---|---|---|---|---|
Set #2 | Set #2.1 | 20, 40, …, 200 | 10, 20, …, 100 | 2 |
Set #2.2 | 4 | |||
Set #2.3 | 40, 80, …, 400 | 2 | ||
Set #2.4 | 4 |
Works | Privacy Requirements | Privacy Policy Matching | Privacy Risk | Personalized Benefit | Multiservice Provision | |||
---|---|---|---|---|---|---|---|---|
Sensitivity | Purpose | Location | Retention | |||||
Costante [27] | Yes | Yes | No | Yes | Yes | Yes | No | No |
Meng [31] | Yes | Yes | No | No | Yes | No | No | No |
Tbahriti [30] | No | Yes | No | Yes | Yes | No | No | No |
Amini [28] | Yes | Yes | No | Yes | Yes | No | No | Yes |
Barati [29] | No | Yes | No | No | Yes | No | No | No |
Alom [32] | No | Yes | No | Yes | Yes | No | No | No |
Yu [34] | No | No | No | No | No | Yes | No | No |
Belabed [35] | No | Yes | No | Yes | Yes | Yes | No | No |
Xiao [51] | Yes | No | No | No | No | No | No | Yes |
Liu [6] | Yes | Yes | Yes | Yes | Yes | No | No | Yes |
This work | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, L.; Zhu, H.; Chen, S. Balancing Privacy Risk and Benefit in Service Selection for Multiprovision Cloud Service Composition. Mathematics 2022, 10, 1675. https://doi.org/10.3390/math10101675
Liu L, Zhu H, Chen S. Balancing Privacy Risk and Benefit in Service Selection for Multiprovision Cloud Service Composition. Mathematics. 2022; 10(10):1675. https://doi.org/10.3390/math10101675
Chicago/Turabian StyleLiu, Linyuan, Haibin Zhu, and Shenglei Chen. 2022. "Balancing Privacy Risk and Benefit in Service Selection for Multiprovision Cloud Service Composition" Mathematics 10, no. 10: 1675. https://doi.org/10.3390/math10101675
APA StyleLiu, L., Zhu, H., & Chen, S. (2022). Balancing Privacy Risk and Benefit in Service Selection for Multiprovision Cloud Service Composition. Mathematics, 10(10), 1675. https://doi.org/10.3390/math10101675