A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements

被引:0
|
作者
Argyropoulos, Nikolaos [1 ]
Shei, Shaun [1 ]
Kalloniatis, Christos [1 ,2 ]
Mouratidis, Haralambos [1 ]
Delaney, Aidan [1 ]
Fish, Andrew [1 ]
Gritzalis, Stefanos [3 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Brighton, E Sussex, England
[2] Univ Aegean, Dept Cultural Technol & Commun, Lesvos, Greece
[3] Univ Aegean, Dept Informat & Commun Syst Engn, Samos, Greece
关键词
Security; Privacy; Cloud Computing; Semi-automatic Process; Business Process Modelling;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing provides a wide range of services to organisations in a flexible and cost efficient manner. Nevertheless, inherent cloud security issues make organisations hesitant towards the migration of their services to cloud. In parallel, the cloud service-oriented nature requires a specific and more demanding description of the business functional requirements intended for migration. Organisations need to transform their functional requirements based on a specific language, taking into account the respective non-functional requirements of the migrating services. Thus, the need for an approach that will holistically capture organisations' security and privacy requirements and transform them to cloud service requirements is immense. To this end, this paper presents an approach that takes as input abstract security and privacy requirements and produces through a semi-automatic process various alternative implementation options for cloud services. To achieve that a series of model transformations are utilised in order to create a mapping between the organisational and the operational level of the system's analysis.
引用
收藏
页码:4827 / 4836
页数:10
相关论文
共 50 条
  • [1] System evolution through semi-automatic elicitation of security requirements: A Position Paper
    Vargas, Cyntia
    Buerger, Jens
    Viertel, Fabien
    Vogel-Heuser, Birgit
    Juerjens, Jan
    [J]. IFAC PAPERSONLINE, 2018, 51 (10): : 64 - 69
  • [2] Semi-automatic approach for music classification
    Zhang, T
    [J]. INTERNET MULTIMEDIA MANAGEMENT SYSTEMS IV, 2003, 5242 : 81 - 91
  • [4] Incorporating Privacy Patterns into Semi-Automatic Business Process Derivation
    Argyropoulos, Nikolaos
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. 2016 IEEE TENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2016, : 529 - 540
  • [5] Requirements Engineering for Security, Privacy and Services in Cloud Environments
    Stefanos Gritzalis
    Lin Liu
    [J]. Requirements Engineering, 2013, 18 : 297 - 298
  • [6] Assurance of Security and Privacy Requirements for Cloud Deployment Models
    Islam, Shareeful
    Ouedraogo, Moussa
    Kalloniatis, Christos
    Mouratidis, Haralambos
    Gritzalis, Stefanos
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 387 - 400
  • [7] Requirements Engineering for Security, Privacy and Services in Cloud Environments
    Gritzalis, Stefanos
    Liu, Lin
    [J]. REQUIREMENTS ENGINEERING, 2013, 18 (04) : 297 - 298
  • [8] A semi-automatic approach for workflow staff assignment
    Liu, Yingbo
    Wang, Jianmin
    Yang, Yun
    Sun, Jiaguang
    [J]. COMPUTERS IN INDUSTRY, 2008, 59 (05) : 463 - 476
  • [9] A semi-automatic neighborhood rule discovery approach
    Wang, Tong
    Han, Qi
    de Vries, Bauke
    [J]. APPLIED GEOGRAPHY, 2017, 88 : 73 - 83
  • [10] A semi-automatic approach for bridging DSMLs with UML
    Wimmer, Manuel
    [J]. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2009, 5 (03) : 372 - +