Article Preview
TopIntroduction
In recent days, web services are performing various computations on several scenarios like networks, big data and cloud computing, etc., where ambient computing plays a vital role. It acts as a framework to control several sets of services, resources to utilize it efficiently and seamlessly to any scenario. It also helps in making the services user-friendly and effective and it supports improved user interaction when the particular service is utilized for the users. Nowadays, resources are offered and utilized in large quantity, thus ambient computing plays an important role in cloud-based services.
Cloud Services in the web has been growing and attracting the attention of researchers based on issues like uncertainty during the authentication of Cloud services, lack of decision-making process during the authorization of services and information loss during confidential information exchange. World Wide Web plays a vital role in this current trend related to the concept of cloud technology. For every business organization, role provisioning is the initial step for every employee (Chandrashekar et al., 2017; Jonathan & Dusit, 2017). Every role provisioning system must have certain conditions to assign an appropriate role to the employee (Ilia & Rizos, 2016; Jonathan & Dusit, 2017). In general condition, ‘R’ provides a condition for each role assigned to all employees in the organization. The role of enrolment is done based on the concept of Role Based Access Control (RBAC) (Yiqun et al., 2008) which is used to assign a role in a suitable way. Then each employee must be assigned and allowed to use several services based on a particular application by integrating with the workflow foundation (Ilia, 2016). Workflow is a sequence of the inter-connected process which contains a set of operations that include work assigned to a particular person or a group of persons or a set of persons in an organization or a mechanism having a simple or complex procedure to perform. (Ward et al., 2015). As all know, large sets of information are in existence in all other domains including networks, data mining (Santosh, 2018) Big data (Feldiansyah, 2018) and machine learning (Lazaros & Ahmad, 2017; Brian, 2018), etc.
For the execution of the above workflow, scheduling the task is needed and several methodologies of the workflow are detailed as 1. The work process is executed based on calling a thread which is not generated especially for workflow process which means that the process calling has to wait until the workflow completes its process by the invoker. 2. When the work process executes its method using a new thread by the application. At the same time, the executed process calling will be paused. 3. Window Communication Foundation (WCF) will be served when the work process executes its method. The resultant work process which is served will use the data as input from the network which contains the activities of the host service. There are two condition policies, which are applied during the workflow execution. There should be a fixed condition for a certain role in an organization. Aggregate Zero Knowledge Proof knowledge (AgZKPk) protocol (Uwe et al., 2008) is used to provide privacy and authentication. There will be no fixed condition and the conditions can be framed as an employee identity attributes. Oblivious Commitment Based Envelope (OCBE) (Jiangtao et al., 2006) protocol is used for these situations.