Privacy-Preserving Mining of Web Service Conversations
[electronic resource].
Description
- Language(s)
-
English
- Published
-
2017-08-25.
- Summary
-
introduced for databases to Web service conversations. The goal is to determine the extent to which the invocation of a service can be inferred from downstream invocations. We first use the FP-Growth algorithm for mining service invocation logs. The mining process returns the probabilities of service conversations. We then define a probabilistic k-anonymity technique for Web service conversations based on the results of the mining process. The proposed approach assists users in selecting Web services that best satisfy their anonymity requirements. We conducted extensive experiments using realworld Web services to prove the efficiency of the proposed approach.
Organizations and businesses are exporting their applications as Web services seeking more collaboration opportunities. These services are generally not used in silos. Indeed, the invocation of a service is often conditioned by the invocation of other services. We refer to the precedence relationships between service invocations as conversations or choreographies. As clients interact with Web services, they exchange an important quantity of sensitive data, hence raising the challenge to keep the privacy of various interactions. In addition to the data exchanged with Web services, users may consider the information about service usage as sensitive and would like to hide that information from third parties. However, conversation relationships may complicate the task of keeping such information secret. In this Thesis, we extend the traditional concept of k-anonymity
- Locate a Print Version
-
Find in a library service is not available from this catalog. Search Worldcat
Viewability