Title: A novel comprehensive extension to BPMN language for security-aware two-tier security model and architecture of cloud applications

Authors: Samiha Rebiai; El Kamel Merah; Djallel Eddine Boubiche

Addresses: Department of Computer Science, University Mustapha Ben Boulaid-Batna 2, Algeria; ICOSI Laboratory, University of Khenchela, Algeria ' Department of Computer Science, University Abbes Laghrour -Khenchela, Algeria; ICOSI Laboratory, University of Khenchela, Algeria ' Department of Computer Science, University Mustapha Ben Boulaid-Batna 2, Algeria; LaSTIC Laboratory, University of Batna 2, Algeria

Abstract: Enterprises have always given great importance to business process management to be competitive and profitable. With the advent of cloud computing, other opportunities are given to these enterprises to execute their business processes with minimal cost in a very short time. Business processes (BPs) are modelled using specific languages. BPMN is the most popular of these languages. However, its current version does not support process modelling for eventual execution in the cloud. Resource management, risk management, deployment, and security are key concepts in cloud computing that a modelling language must support. This paper presents an extension of the BPMN language for modelling business processes in the cloud, integrating the concept of security to secure cloud execution. The use of our new proposed architecture and models for secure BPs is illustrated by a real-life example that demonstrates how our extension is used to define/enforce actual security requirements.

Keywords: business process management; BPM; business process model and notation; BPMN; cloud computing; security; enterprise; data; task; business process; model; extension; architecture.

DOI: 10.1504/IJBPIM.2022.128744

International Journal of Business Process Integration and Management, 2022 Vol.11 No.2, pp.135 - 148

Received: 07 Sep 2021
Accepted: 16 Mar 2022

Published online: 02 Feb 2023 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article