Business Process Specification, Verification, and Deployment in a Mono-Cloud, Multi-Edge Context

Saoussen Cheikhrouhou1, Slim Kallel1, Ikbel Guidara2 and Zakaria Maamar3

  1. ReDCAD University of Sfax
    Sfax, Tunisia
    saoussen.cheikhrouhou@redcad.tn, slim.kallel@redcad.tn
  2. LIRIS, Claude Bernard Lyon 1 University
    Lyon, France
    ikbel.guidara@liris.cnrs.fr
  3. College of Technological Innovation, Zayed University
    Dubai, U.A.E
    zakaria.maamar@zu.ac.ae

Abstract

Despite the prevalence of cloud and edge computing, ensuring the satisfaction of time-constrained business processes, remains challenging. Indeed, some cloud/edge-based resources might not be available when needed leading to delaying the execution of these processes’ tasks and/or the transfer of these processes’ data. This paper presents an approach for specifying, verifying, and deploying time-constrained business processes in a mono-cloud, multi-edge context. First, the specification and verification of processes happen at design-time and run-time to ensure that these processes’ tasks and data are continuously placed in a way that would mitigate the violation of time constraints. This mitigation might require moving tasks and/or data from one host to another to reduce time latency, for example. A host could be either a cloud, an edge, or any. Finally, the deployment of processes using a real case-study allowed to confirm the benefits of the early specification and verification of these processes in mitigating time constraints violations.

Key words

Business process, Cloud, Edge, Time constraint, Violation

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS123456789X

Publication information

Volume 17, Issue 1 (January 2020)
Year of Publication: 2020
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Cheikhrouhou, S., Kallel, S., Guidara, I., Maamar, Z.: Business Process Specification, Verification, and Deployment in a Mono-Cloud, Multi-Edge Context. Computer Science and Information Systems, Vol. 17, No. 1, 293-314. (2020), https://doi.org/10.2298/CSIS123456789X