Abstract

The Internet of Services is envisioned as a global Serviceoriented
Architecture enabling collaboration across organizational
boundaries. However, by monitoring communication
endpoints, attackers can create detailed pro les of service
consumers and providers even if typical security mechanisms
such as message encryption are used. In a business
context, this trac analysis threatens the relationship
anonymity of the participants and can reveal sensitive information
about an organization's underlying business processes
or a service provider's client base. In this paper, we
discuss the simulation-based evaluation of di erent attack
scenarios regarding the identi cation of the service compositions
an organization uses. Thus, we o er insights regarding
the limits of anonymity for cross-organizational collaboration
in the Internet of Services.

Share

COinS