Assurance of Security and Privacy Requirements for Cloud Deployment Models

被引:23
|
作者
Islam, Shareeful [1 ]
Ouedraogo, Moussa [2 ]
Kalloniatis, Christos [3 ]
Mouratidis, Haralambos [4 ]
Gritzalis, Stefanos [5 ]
机构
[1] Univ East London, Sch Architecture Comp & Engn, Docklands Campus 4-6 Univ Way, London E16 2RD, England
[2] Luxembourg Inst Sci & Technol, L-4362 Esch Sur Alzette, Luxembourg
[3] Univ Aegean, Dept Cultural Technol & Commun, Univ Hill, GR-81100 Mitilini, Lesvos, Greece
[4] Univ Brighton, Sch Comp Engn & Math, Watts Bldg,Lewes Rd, Brighton BN2 4GJ, E Sussex, England
[5] Univ Aegean, Dept Informat & Commun Syst Engn, 2 Palama St, GR-83200 Karlovassi, Samos, Greece
基金
奥地利科学基金会;
关键词
Cloud deployment; security; privacy; assurance; migration; MIGRATION;
D O I
10.1109/TCC.2015.2511719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite of the several benefits of migrating enterprise critical assets to the cloud, there are challenges specifically related to security and privacy. It is important that cloud users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issues for cloud systems but such works do not provide a detailed methodological approach to elicit security and privacy requirements neither methods to select cloud deployment models based on satisfaction of these requirements by cloud service providers. This work advances the current state of the art towards this direction. In particular, we consider requirements engineering concepts to elicit and analyze security and privacy requirements and their associated mechanisms using a conceptual framework and a systematic process. The work introduces assurance as evidence for satisfying the security and privacy requirements in terms of completeness and reportable of security incident through audit. This allows perspective cloud users to define their assurance requirements so that appropriate cloud models can be selected for a given context. To demonstrate our work, we present results from a real case study based on the Greek National Gazette.
引用
收藏
页码:387 / 400
页数:14
相关论文
共 50 条
  • [21] Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective
    Ermakova, Tatiana
    Fabian, Benjamin
    Kornacka, Marta
    Thiebes, Scott
    Sunyaev, Ali
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2020, 11 (02)
  • [22] Cloud Security Ecosystem for Data Security and Privacy
    Arora, Akshay
    Khanna, Abhirup
    Rastogi, Anmol
    Agarwal, Amit
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 288 - 292
  • [23] From Security to Assurance in the Cloud: A Survey
    Ardagna, Claudio A.
    Asal, Rasool
    Damiani, Ernesto
    Quang Hieu Vu
    ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [24] Capturing semantics for information security and privacy assurance
    Chowdhury, Mohammad M. R.
    Chamizo, Javier
    Noll, Josef
    Gomez, Juan Miguel
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 105 - +
  • [25] Information Assurance, Privacy, and Security in Ubiquitous Questionnaire
    Goto, Yuichi
    Cheng, Jingde
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 619 - 624
  • [26] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    Multimedia Systems, 2011, 17 : 393 - 408
  • [27] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [28] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [29] Security and privacy requirements in interactive TV
    Abou-Tair, Dhiah el Diehn I.
    Koester, Ingo
    Hoefke, Kathrin
    MULTIMEDIA SYSTEMS, 2011, 17 (05) : 393 - 408
  • [30] Security and Privacy Implications of Cloud Computing - Lost in the Cloud
    Tchifilionova, Vassilka
    OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 149 - 158