Title: Secure communication protocol for real-time business process monitoring

Authors: Abdelrahman AlMahmoud; Maurizio Colombo; Chan Yeob Yeun; Hassan Al-Muhairi

Addresses: ETISALAT BT Innovation Center (EBTIC), Khalifa University of Science, Technology and Research (KUSTAR), United Arab Emirates ' ETISALAT BT Innovation Center (EBTIC), Khalifa University of Science, Technology and Research (KUSTAR), United Arab Emirates ' ETISALAT BT Innovation Center (EBTIC), Khalifa University of Science, Technology and Research (KUSTAR), United Arab Emirates ' College of Engineering, Khalifa University of Science, Technology and Research (KUSTAR), United Arab Emirates

Abstract: The need for real-time information about business process, event monitoring and fault detection has pushed business process monitoring (BPM) tools to be improved for real-time analysis. However, such functionality introduces new challenges in providing both security and optimal performance. Such challenges are mainly due to the nature of the communication between these tools and its users, such as long durations of monitoring and the asynchronous nature of the communication. A standard solution that is used by many vendors is to provide sequential key derivation, or use long encryption keys. But, these solutions have a negative impact on the performance and response time. Furthermore, it is not optimised for these applications, thus wastes resources on key renegotiation and creation. These issues were the motivation behind the development of a security solution aimed to address the inefficiency and to better manage resources in a way that would not heavily impact performance.

Keywords: key derivation function; real-time BPM; business process monitoring; authentication; Kerberos; internet technology; secured transactions; secure communications; communication protocols; communication security.

DOI: 10.1504/IJITST.2014.065183

International Journal of Internet Technology and Secured Transactions, 2014 Vol.5 No.3, pp.223 - 239

Received: 23 Dec 2013
Accepted: 24 Jun 2014

Published online: 28 Oct 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article