Assurance of Security and Privacy Requirements for Cloud Deployment Models

被引:23
|
作者
Islam, Shareeful [1 ]
Ouedraogo, Moussa [2 ]
Kalloniatis, Christos [3 ]
Mouratidis, Haralambos [4 ]
Gritzalis, Stefanos [5 ]
机构
[1] Univ East London, Sch Architecture Comp & Engn, Docklands Campus 4-6 Univ Way, London E16 2RD, England
[2] Luxembourg Inst Sci & Technol, L-4362 Esch Sur Alzette, Luxembourg
[3] Univ Aegean, Dept Cultural Technol & Commun, Univ Hill, GR-81100 Mitilini, Lesvos, Greece
[4] Univ Brighton, Sch Comp Engn & Math, Watts Bldg,Lewes Rd, Brighton BN2 4GJ, E Sussex, England
[5] Univ Aegean, Dept Informat & Commun Syst Engn, 2 Palama St, GR-83200 Karlovassi, Samos, Greece
基金
奥地利科学基金会;
关键词
Cloud deployment; security; privacy; assurance; migration; MIGRATION;
D O I
10.1109/TCC.2015.2511719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite of the several benefits of migrating enterprise critical assets to the cloud, there are challenges specifically related to security and privacy. It is important that cloud users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issues for cloud systems but such works do not provide a detailed methodological approach to elicit security and privacy requirements neither methods to select cloud deployment models based on satisfaction of these requirements by cloud service providers. This work advances the current state of the art towards this direction. In particular, we consider requirements engineering concepts to elicit and analyze security and privacy requirements and their associated mechanisms using a conceptual framework and a systematic process. The work introduces assurance as evidence for satisfying the security and privacy requirements in terms of completeness and reportable of security incident through audit. This allows perspective cloud users to define their assurance requirements so that appropriate cloud models can be selected for a given context. To demonstrate our work, we present results from a real case study based on the Greek National Gazette.
引用
收藏
页码:387 / 400
页数:14
相关论文
共 50 条
  • [31] Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
    Ari, Ado Adamou Abba
    Ngangmo, Olga Kengni
    Titouna, Chafiq
    Thiare, Ousmane
    Kolyang
    Mohamadou, Alidou
    Gueroui, Abdelhak Mourad
    APPLIED COMPUTING AND INFORMATICS, 2024, 20 (1/2) : 119 - 141
  • [32] Security and privacy issues in cloud computing
    Haider Abbas
    Olaf Maennel
    Saïd Assar
    Annals of Telecommunications, 2017, 72 : 233 - 235
  • [33] Cloud Computing: Security, Privacy and Practice
    Xiang, Yang
    Di Martino, Beniamino
    Wang, Guilin
    Li, Jin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2015, 52 : 59 - 60
  • [34] Multiuser Privacy and Security Conflicts in the Cloud
    Alhelali, Eman
    Ramokapane, Kopo M.
    Such, Jose
    PROCEEDINGS OF THE 2023 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2023), 2023,
  • [35] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    ZTECommunications, 2013, 11 (02) : 18 - 23
  • [36] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [37] Privacy and Security Security for Mobile and Cloud Frontiers in Healthcare
    Kotz, David
    Fu, Kevin
    Gunter, Carl
    Rubin, Avi
    COMMUNICATIONS OF THE ACM, 2015, 58 (08) : 21 - 23
  • [38] Evaluating Security and Privacy in Cloud Services
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Shiva, Sajjan
    Sheldon, Frederick T.
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 683 - 686
  • [39] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [40] Privacy Risk, Security, Accountability in the Cloud
    Theoharidou, Marianthi
    Papanikolaou, Nick
    Pearson, Siani
    Gritzalis, Dimitris
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 177 - 184