Assurance of Security and Privacy Requirements for Cloud Deployment Models

被引:23
|
作者
Islam, Shareeful [1 ]
Ouedraogo, Moussa [2 ]
Kalloniatis, Christos [3 ]
Mouratidis, Haralambos [4 ]
Gritzalis, Stefanos [5 ]
机构
[1] Univ East London, Sch Architecture Comp & Engn, Docklands Campus 4-6 Univ Way, London E16 2RD, England
[2] Luxembourg Inst Sci & Technol, L-4362 Esch Sur Alzette, Luxembourg
[3] Univ Aegean, Dept Cultural Technol & Commun, Univ Hill, GR-81100 Mitilini, Lesvos, Greece
[4] Univ Brighton, Sch Comp Engn & Math, Watts Bldg,Lewes Rd, Brighton BN2 4GJ, E Sussex, England
[5] Univ Aegean, Dept Informat & Commun Syst Engn, 2 Palama St, GR-83200 Karlovassi, Samos, Greece
基金
奥地利科学基金会;
关键词
Cloud deployment; security; privacy; assurance; migration; MIGRATION;
D O I
10.1109/TCC.2015.2511719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite of the several benefits of migrating enterprise critical assets to the cloud, there are challenges specifically related to security and privacy. It is important that cloud users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issues for cloud systems but such works do not provide a detailed methodological approach to elicit security and privacy requirements neither methods to select cloud deployment models based on satisfaction of these requirements by cloud service providers. This work advances the current state of the art towards this direction. In particular, we consider requirements engineering concepts to elicit and analyze security and privacy requirements and their associated mechanisms using a conceptual framework and a systematic process. The work introduces assurance as evidence for satisfying the security and privacy requirements in terms of completeness and reportable of security incident through audit. This allows perspective cloud users to define their assurance requirements so that appropriate cloud models can be selected for a given context. To demonstrate our work, we present results from a real case study based on the Greek National Gazette.
引用
收藏
页码:387 / 400
页数:14
相关论文
共 50 条
  • [11] Cloud Security and Privacy Metamodel Metamodel for Security and Privacy Knowledge in Cloud Services
    Xia, Tian
    Washizaki, Hironori
    Kato, Takehisa
    Kaiya, Haruhiko
    Ogata, Shinpei
    Fernandez, Eduardo B.
    Kanuka, Hideyuki
    Yoshino, Masayuki
    Yamamoto, Dan
    Okubo, Takao
    Yoshioka, Nobukazu
    Hazeyama, Atsuo
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2018, : 379 - 386
  • [12] Data Security and Privacy Assurance for Cloud Computing in Education Based on a Third Party Auditor
    Alim, Endy Sjaiful
    Jin, Hai
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 96 - 97
  • [13] Security and Privacy in Cloud Computing
    Tari, Zahir
    IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [14] A Focus on Security and Privacy in the Cloud
    Yousif, Mazin
    IEEE CLOUD COMPUTING, 2014, 1 (03): : 8 - 9
  • [15] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [16] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [17] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [18] Data Security and Privacy in the Cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Samarati, Pierangela
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2019, 2019, 10993
  • [19] Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models
    Akinbi, Alex
    Pereira, Ella
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 789 - 794
  • [20] Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
    Rodrigues, Joel J. P. C.
    de la Torre, Isabel
    Fernandez, Gonzalo
    Lopez-Coronado, Miguel
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2013, 15 (08)