Transactional Behavior Verification in Business Process as a Service Configuration
Business Process as a Service (BPaaS) is an emerging type of cloud service that offers configurable and executable business processes to clients over the Internet. As BPaaS is still in early years of research, many open issues remain. Managing the configuration of BPaaS builds on areas such as software product lines and configurable business processes. The problem has concerns to consider from several perspectives, such as the different types of variable features, constraints between configuration options, and satisfying the requirements provided by the client. In our approach, we use temporal logic templates to elicit transactional requirements from clients that the configured service must adhere to. For formalizing constraints over configuration, feature models are used. To manage all these concerns during BPaaS configuration, we develop a structured process that applies formal methods while directing clients through specifying transactional requirements and selecting configurable features. The Binary Decision Diagram (BDD) analysis is then used to verify that the selected configurable features do not violate any constraints. Finally, model checking is applied to verify the configured service against the transactional requirement set. We demonstrate the feasibility of our approach with several validation scenarios and performance evaluations.
PROJECT OUTPUT VIDEO: (Click the below link to see the project output video):
- Existing approaches in managing business process configuration ensure domain constraints over configuration choices, while allowing basic client requirements such as selected features or control flow variations. One area that has yet to receive research attention is ensuring both domain constraints and client transactional requirements during BPaaS configuration.
- These requirements can include conditions for acceptable process commit or abortion, required recovery operations for key activities, or valid forms of process compensation, and are difficult to verify in a cloud based scenario where multiple stakeholders are involved.
- A configuration method that ensures complex requirements within a feasible runtime will be able to provide service clients with increased trust for outsourcing potentially sensitive business operations.
DISADVANTAGES OF EXISTING SYSTEM:
- The problem has concerns to consider from several perspectives, such as the different types of variable features, constraints between configuration options, and satisfying the requirements provided by the client.
- We propose a three-step configuration and verification process which relies on a modeling paradigm. Such paradigm allows us to capture transactional requirements and subsequently verify them. Our approach is expressive and relatively easy to use by stakeholders, while at the same time being sufficiently rigorous to allow us to apply formal methods for verification.
- We propose a BPaaS configuration process that applies formal methods to ensure that i) the configuration is valid with respect to provider domain constraints, and ii) the process satisfies transactional requirements drawn from the business rules of the client.
- First, we provide an overview of the process which guides clients through BPaaS configuration, then we provide details on how Binary Decision Diagram (BDD) analysis and model checking are used at certain steps.
ADVANTAGES OF PROPOSED SYSTEM:
- To the best of our knowledge, transactional requirements important to clients, such as those supported by our template set, are not yet supported by any business process configuration method, and this is one of the major contributions of this work compared to existing works.
- This increases client trust that the service will behave in a manner consistent with internal business policies and requirements, without having to perform their own analysis of the service behavior.
- Our BPaaS model enables configuration from numerous perspectives important to BPaaS clients, namely, activities, resources, and data objects.
- Our configuration method aims to elicit and ensure complex transactional requirements from clients, by adapting the temporal logic template set.
- It has the advantage of a reduced runtime when configuring services with many configuration options and values.
- System : Pentium Dual Core.
- Hard Disk : 120 GB.
- Monitor : 15’’ LED
- Input Devices : Keyboard, Mouse
- Ram : 1 GB
- Operating system : Windows 7.
- Coding Language : JAVA/J2EE
- Tool : ECLIPSE
- Database : MYSQL
Scott Bourne, Claudia Szabo, Member, IEEE, Quan Z. Sheng, Member, IEEE, “Transactional Behavior Verification in Business Process as a Service Configuration”, IEEE TRANSACTIONS ON SERVICE COMPUTING 2017.