Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Design and verification of privacy patterns for business process models

Barati, Masoud and Rana, Omer ORCID: https://orcid.org/0000-0003-3597-2646 2021. Design and verification of privacy patterns for business process models. Patnaik, S., Wang, T. -S., Shen, T. and Panigrahi, S. K., eds. Blockchain Technology and Innovations in Business Processes, Smart Innovation, Systems and Technologies, Singapore: Springer, pp. 125-139.

Full text not available from this repository. (Request a copy)

Abstract

Business process models can involve numerous operational activities for collecting, processing and exchanging personal user data. Such processes may involve activities that are executed over one or more Cloud-based platforms. With an increase in the use of enterprise business processes, the right to data privacy has become a key challenge for developers of process models deployed over such Cloud platforms. Design of privacy patterns that are compliant with modern data privacy regulations remains a challenge with increasing adoption of such approaches. One such legislation is the General Data Protection Regulation (GDPR) aiming to protect European citizens from privacy violations, especially for data processing activities hosted within Europe or involving data of European citizens. Blockchain and smart contract technologies have been identified as promising approaches for supporting compliance checking and trust in business processes that utilise a distributed set of activities. Blockchains enable verification of GDPR obligations in an automatic way without the need of a trusted third party. This chapter describes how smart contracts can be used to meet GDPR compliance verification using a number of privacy patterns for business process models. We also describe how a transition system-based automated tool can be used to support such verification. We conclude with a discussion of integrating automated compliance checking (especially for personal user data) and the potential impact this has on the overall execution performance of business processes.

Item Type: Book Section
Date Type: Publication
Status: Published
Schools: Computer Science & Informatics
Subjects: Q Science > QA Mathematics > QA76 Computer software
Publisher: Springer
ISBN: 9789813364691
Funders: EPSRC
Related URLs:
Last Modified: 06 Jul 2023 01:58
URI: https://orca.cardiff.ac.uk/id/eprint/139865

Citation Data

Cited 1 time in Scopus. View in Scopus. Powered By Scopus® Data

Actions (repository staff only)

Edit Item Edit Item