Assurance of Security and Privacy Requirements for Cloud Deployment Models

被引:23
|
作者
Islam, Shareeful [1 ]
Ouedraogo, Moussa [2 ]
Kalloniatis, Christos [3 ]
Mouratidis, Haralambos [4 ]
Gritzalis, Stefanos [5 ]
机构
[1] Univ East London, Sch Architecture Comp & Engn, Docklands Campus 4-6 Univ Way, London E16 2RD, England
[2] Luxembourg Inst Sci & Technol, L-4362 Esch Sur Alzette, Luxembourg
[3] Univ Aegean, Dept Cultural Technol & Commun, Univ Hill, GR-81100 Mitilini, Lesvos, Greece
[4] Univ Brighton, Sch Comp Engn & Math, Watts Bldg,Lewes Rd, Brighton BN2 4GJ, E Sussex, England
[5] Univ Aegean, Dept Informat & Commun Syst Engn, 2 Palama St, GR-83200 Karlovassi, Samos, Greece
基金
奥地利科学基金会;
关键词
Cloud deployment; security; privacy; assurance; migration; MIGRATION;
D O I
10.1109/TCC.2015.2511719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite of the several benefits of migrating enterprise critical assets to the cloud, there are challenges specifically related to security and privacy. It is important that cloud users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issues for cloud systems but such works do not provide a detailed methodological approach to elicit security and privacy requirements neither methods to select cloud deployment models based on satisfaction of these requirements by cloud service providers. This work advances the current state of the art towards this direction. In particular, we consider requirements engineering concepts to elicit and analyze security and privacy requirements and their associated mechanisms using a conceptual framework and a systematic process. The work introduces assurance as evidence for satisfying the security and privacy requirements in terms of completeness and reportable of security incident through audit. This allows perspective cloud users to define their assurance requirements so that appropriate cloud models can be selected for a given context. To demonstrate our work, we present results from a real case study based on the Greek National Gazette.
引用
收藏
页码:387 / 400
页数:14
相关论文
共 50 条
  • [1] Evaluating cloud deployment scenarios based on security and privacy requirements
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Islam, Shareeful
    REQUIREMENTS ENGINEERING, 2013, 18 (04) : 299 - 319
  • [2] Evaluating cloud deployment scenarios based on security and privacy requirements
    Christos Kalloniatis
    Haralambos Mouratidis
    Shareeful Islam
    Requirements Engineering, 2013, 18 : 299 - 319
  • [3] Requirements Engineering for Security, Privacy and Services in Cloud Environments
    Stefanos Gritzalis
    Lin Liu
    Requirements Engineering, 2013, 18 : 297 - 298
  • [4] Requirements Engineering for Security, Privacy and Services in Cloud Environments
    Gritzalis, Stefanos
    Liu, Lin
    REQUIREMENTS ENGINEERING, 2013, 18 (04) : 297 - 298
  • [5] Deployment Models: Enhancing Security in Cloud Computing Environment
    Ziglari, Hajar
    Yahya, Saadiah
    2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2016, : 204 - 209
  • [6] A framework to support selection of cloud providers based on security and privacy requirements
    Mouratidis, Haralambos
    Islam, Shareeful
    Kalloniatis, Christos
    Gritzalis, Stefanos
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (09) : 2276 - 2293
  • [7] A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements
    Argyropoulos, Nikolaos
    Shei, Shaun
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Delaney, Aidan
    Fish, Andrew
    Gritzalis, Stefanos
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 4827 - 4836
  • [8] Evaluating Cloud Deployment Models Based on Security in EHR System
    Ziglari, Hajar
    Negini, Arefeh
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICET), 2017,
  • [9] Reference deployment models for eliminating user concerns on cloud security
    Zhao, Gansen
    Rong, Chunming
    Jaatun, Martin Gilje
    Sandnes, Frode Eika
    JOURNAL OF SUPERCOMPUTING, 2012, 61 (02): : 337 - 352
  • [10] Reference deployment models for eliminating user concerns on cloud security
    Gansen Zhao
    Chunming Rong
    Martin Gilje Jaatun
    Frode Eika Sandnes
    The Journal of Supercomputing, 2012, 61 : 337 - 352