Quantifying Satisfaction of Security Requirements of Cloud Software Systems

被引:3
|
作者
Nhlabatsi, Armstrong [1 ]
Khan, Khaled M. D. [1 ]
Hong, Jin B. [2 ]
Kim, Dong Seong [3 ]
Fernandez, Rachael [1 ]
Fetais, Noora [1 ]
机构
[1] Qatar Univ, KINDI Ctr Comp Res, Dept Comp Sci & Engn, Doha 2713, Qatar
[2] Univ Western Australia, Dept Comp Sci & Software Engn, Crawley, WA 6009, Australia
[3] Univ Queensland, Sch Informat Technol & Elect Engn, St Lucia, Qld 4072, Australia
关键词
Security; Cloud computing; Servers; Measurement; Databases; Software systems; Software as a service; entailment relationship; security quantification; security requirements; FRAMEWORK; PRIVACY; THREATS;
D O I
10.1109/TCC.2021.3097770
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction level of a security requirement by deployed mechanisms is not very useful. Rather, it would be more effective if we could quantify the level of satisfaction of security requirements on a continuous scale. We propose an approach to achieve this for cloud software systems based on relationships between defense strength, exploitability of vulnerabilities, and attack severity. We extend the concept of entailment relationship from the field of requirements engineering with the satisfiability aspects of security requirements. The proposed approach enables us to systematically structure security concepts into three sets of related descriptions to quantify the satisfaction level of security requirements with the deployed security solutions. To demonstrate the feasibility of the proposed approach, we evaluate the approach in a case study. As a result, security administrators are able to deploy more effective and appropriate security solutions based on their assessment.
引用
收藏
页码:426 / 444
页数:19
相关论文
共 50 条
  • [1] Capturing security requirements for software systems
    El-Hadary, Hassan
    El-Kassas, Sherif
    [J]. JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 463 - 472
  • [2] Complying with Security Requirements in Cloud Storage Systems
    Roman, Rodrigo
    Felipe, Miguel Rodel
    Gene, Phua Eu
    Zhou, Jianying
    [J]. JOURNAL OF COMPUTERS, 2016, 11 (03) : 201 - 206
  • [3] Software security requirements management as an emerging cloud computing service
    Ramachandran, Muthu
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (04) : 580 - 590
  • [4] Understanding Software Security Vulnerabilities in Cloud Server Systems
    Tunde-Onadele, Olufogorehan
    Lin, Yuhang
    Gu, Xiaohui
    He, Jingzhu
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 245 - 252
  • [5] A Systems-of-Systems Security Framework for Requirements Definition in Cloud Environment
    Gennari Carturan, Sara B. O.
    Goya, Denise Hideko
    [J]. 13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 235 - 240
  • [6] Engineering safety and security related requirements for software intensive systems
    Firesmith, Donald G.
    [J]. 29th International Conference on Software Engineering: ICSE 2007 Companion Volume, Proceedings, 2007, : 169 - 169
  • [7] Security requirements for software development
    Kim, TH
    Shin, MC
    Kim, SH
    Cha, JS
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122
  • [8] Security requirements engineering for software systems: Case studies in support of software engineering education
    Mead, Nancy R.
    Hough, Eric D.
    [J]. 19TH CONFERENCE ON SOFTWARE ENGINEERING EDUCATION & TRAINING, PROCEEDINGS, 2006, : 149 - +
  • [9] Modelling Secure Cloud Computing Systems from a Security Requirements Perspective
    Shei, Shaun
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Delaney, Aidan
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2016, 9830 : 48 - 62
  • [10] Mapping Security Requirements of Mobile Health Systems into Software Development Lifecycle
    Al-Taee, Majid A.
    Al-Nuaimy, Waleed
    Muhsin, Zahra J.
    Al-Ataby, Ali
    Al-Taee, Ahmad M.
    [J]. 2016 9TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2016), 2016, : 87 - 93