Huang et al. / J Zhejiang Univ-Sci C (Comput & Electron) 2010 11(5):328-339 328 Minimal role mining method for Web service composition Chao HUANG , Jian-ling SUN †‡ , Xin-yu WANG, Yuan-jie SI (Department of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China) E-mail: {hch, sunjl}@zju.edu.cn Received Apr. 2, 2009; Revision accepted July 29, 2009; Crosschecked Apr. 5, 2010 Abstract: Web service composition is a low cost and efficient way to leverage the existing resource and implementation. In current Web service composition implementations, the issue of how to define the role for a new composite Web service has been little addressed. Adjusting the access control policy for a new composite Web service always causes substantial administration overhead from the security administrator. Furthermore, the distributed nature of Web service based applications makes traditional role mining methods obsolete. In this paper, we analyze the minimal role mining problem for Web service composition, and prove that this problem is NP-complete. We propose a sub-optimal greedy algorithm based on the analysis of necessary role mapping for interoperation across multiple domains. Simulation shows the effectiveness of our algorithm, and compared to the existing methods, our algorithm has significant performance advantages. We also demonstrate the practical application of our method in a real agent based Web service system. The results show that our method could find the minimal role mapping efficiently. Key words: Web service composition, Role base access control (RBAC), Role mining, Access control policy, Role mapping, Web service security doi:10.1631/jzus.C0910186 Document code: A CLC number: TP309 1 Introduction Web service, which is based on the infrastructure of three major standards—the simple object access protocol (SOAP), the Web service definition language (WSDL), and universal description discovery and integration (UDDI), has been widely adopted by fi- nancial enterprises to build up the IT systems (Dust- dar and Schreiner, 2005; Eid et al., 2008). However, a single Web service may not satisfy changing system requirements in dynamic systems, such as the multi-agent system (MAS) (Sycara et al., 2003; Talib et al., 2006). This creates a need for automated Web service composition that enables the construction of a powerful, robust service network by integrating a number of collaborated agent-based Web services. Assume that there are three domains, D1, D2, and D3, in the foreign exchange order MAS. Web service S1 hosted in D1 provides the real time rates for the cur- rency pair; service S2 in D2 accepts the foreign ex- change order and makes the trade; service S3 in D3 records the trade order and generates the report. In such a case, a service that takes the given currency pair and accomplishes the trade with the latest market rate is not available. However, through Web service composition, S1, S2, and S3 can be composed into a new service CS which accepts the currency pair as input and accomplishes the deal. Although such Web service composition provides a cheap, effective, and efficient means for application integration over ex- isting resources, all the benefits can be obtained only after the access control policy is set up properly. The role base access control (RBAC) model, proposed by Ferriaiolo and Sandhu in the 1990s, has been used widely as a powerful way to satisfy the access control needs of Web service (Ferraiolo et al., 2001; Essmayr et al., 2004; Carminati et al., 2005; Li and Tripunitara, 2006). RBAC96 is currently the most widely used access control model in enterprises be- cause of its fine grained control over the privilege (Li et al., 2007). Furthermore, using RBAC we can model Journal of Zhejiang University-SCIENCE C (Computers & Electronics) ISSN 1869-1951 (Print); ISSN 1869-196X (Online) www.zju.edu.cn/jzus; www.springerlink.com E-mail: jzus@zju.edu.cn Corresponding author © Zhejiang University and Springer-Verlag Berlin Heidelberg 2010