A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements

Nikolaos Argyropoulos, Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan Delaney, Andrew Fish, Stefanos Gritzalis

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

Abstract

Cloud computing provides a wide range of services to organisations in a flexible and cost efficient manner. Nevertheless, inherent cloud security issues make organisations hesitant towards the migration of their services to cloud. In parallel, the cloud service-oriented nature requires a specific and more demanding description of the business functional requirements intended for migration. Organisations need to transform their functional requirements based on a specific language, taking into account the respective non-functional requirements of the migrating services. Thus, the need for an approach that will holistically capture organisations' security and privacy requirements and transform them to cloud service requirements is immense. To this end, this paper presents an approach that takes as input abstract security and privacy requirements and produces through a semi-automatic process various alternative implementation options for cloud services. To achieve that a series of model transformations are utilised in order to create a mapping between the organisational and the operational level of the system's analysis.
Original languageEnglish
Title of host publication50th Hawaii International Conference on System Sciences (HICSS)
Place of PublicationHawaii, USA
Pages4827-4836
Number of pages10
Publication statusPublished - 4 Jan 2017
Event50th Hawaii International Conference on System Sciences (HICSS) - Hawaii, USA, January 2017
Duration: 4 Jan 2017 → …

Conference

Conference50th Hawaii International Conference on System Sciences (HICSS)
Period4/01/17 → …

Bibliographical note

Attribution-NonCommercial-NoDerivatives 4.0 International

Fingerprint

Dive into the research topics of 'A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements'. Together they form a unique fingerprint.

Cite this