Assurance of Security and Privacy Requirements for Cloud Deployment Models

被引:23
|
作者
Islam, Shareeful [1 ]
Ouedraogo, Moussa [2 ]
Kalloniatis, Christos [3 ]
Mouratidis, Haralambos [4 ]
Gritzalis, Stefanos [5 ]
机构
[1] Univ East London, Sch Architecture Comp & Engn, Docklands Campus 4-6 Univ Way, London E16 2RD, England
[2] Luxembourg Inst Sci & Technol, L-4362 Esch Sur Alzette, Luxembourg
[3] Univ Aegean, Dept Cultural Technol & Commun, Univ Hill, GR-81100 Mitilini, Lesvos, Greece
[4] Univ Brighton, Sch Comp Engn & Math, Watts Bldg,Lewes Rd, Brighton BN2 4GJ, E Sussex, England
[5] Univ Aegean, Dept Informat & Commun Syst Engn, 2 Palama St, GR-83200 Karlovassi, Samos, Greece
基金
奥地利科学基金会;
关键词
Cloud deployment; security; privacy; assurance; migration; MIGRATION;
D O I
10.1109/TCC.2015.2511719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite of the several benefits of migrating enterprise critical assets to the cloud, there are challenges specifically related to security and privacy. It is important that cloud users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issues for cloud systems but such works do not provide a detailed methodological approach to elicit security and privacy requirements neither methods to select cloud deployment models based on satisfaction of these requirements by cloud service providers. This work advances the current state of the art towards this direction. In particular, we consider requirements engineering concepts to elicit and analyze security and privacy requirements and their associated mechanisms using a conceptual framework and a systematic process. The work introduces assurance as evidence for satisfying the security and privacy requirements in terms of completeness and reportable of security incident through audit. This allows perspective cloud users to define their assurance requirements so that appropriate cloud models can be selected for a given context. To demonstrate our work, we present results from a real case study based on the Greek National Gazette.
引用
收藏
页码:387 / 400
页数:14
相关论文
共 50 条
  • [41] Patterns for Security and Privacy in Cloud Ecosystems
    Fernandez, Eduardo B.
    Yoshioka, Nobukazu
    Washizaki, Hironori
    2015 IEEE 2ND WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2015, : 13 - 18
  • [42] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659
  • [43] Security and privacy issues in cloud computing
    Abbas, Haider
    Maennel, Olaf
    Assar, Said
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 233 - 235
  • [44] Security and Privacy Issues in Cloud Computing
    Shaikh, Asma A.
    Iyer, Kamatchi
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1299 - 1306
  • [45] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [46] Who Is Responsible for Security and Privacy in the Cloud?
    Dasgupta, Dipankar
    COMPUTER INFORMATION SYSTEMS - ANALYSIS AND TECHNOLOGIES, 2011, 245 : 4 - 4
  • [47] User Privacy and Security in Cloud Computing
    Waleed, AL-Museelem
    Li Chunlin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 341 - 352
  • [48] Engineering Cryptography for Security and Privacy in the Cloud
    Krenn, Stephan
    Loruenser, Thomas
    Striecks, Christoph
    ERCIM NEWS, 2018, (113): : 53 - 54
  • [49] Security and Privacy Issues in Cloud Computing
    UbaidullahBokhari, Mohammad
    MakkiShallal, Qahtan
    Tamandani, Yahya Kord
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 896 - 900
  • [50] Developing a Conceptual Framework for Cloud Security Assurance
    Duncan, Bob
    Pym, David J.
    Whittington, Mark
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 120 - 125