Assurance of Security and Privacy Requirements for Cloud Deployment Models

Shareeful Islam, Moussa Ouedraogo, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis

    Research output: Contribution to journalArticlepeer-review

    Abstract

    Despite of the several benefits of migrating enterprise critical assets to the cloud, there are challenges specifically related to security and privacy. It is important that cloud users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issues for cloud systems but such works do not provide a detailed methodological approach to elicit security and privacy requirements neither methods to select cloud deployment models based on satisfaction of these requirements by cloud service providers. This work advances the current state of the art towards this direction. In particular, we consider requirements engineering concepts to elicit and analyze security and privacy requirements and their associated mechanisms using a conceptual framework and a systematic process. The work introduces assurance as evidence for satisfying the security and privacy requirements in terms of completeness and reportable of security incident through audit. This allows perspective cloud users to define their assurance requirements so that appropriate cloud models can be selected for a given context. To demonstrate our work, we present results from a real case study based on the Greek National Gazette.

    Original languageEnglish
    Pages (from-to)387-400
    Number of pages14
    JournalIEEE Transactions on Cloud Computing
    Volume6
    Issue number2
    DOIs
    Publication statusPublished - 23 Dec 2015

    Bibliographical note

    © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including
    reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

    Keywords

    • assurance
    • Cloud deployment
    • migration
    • privacy
    • security

    Fingerprint

    Dive into the research topics of 'Assurance of Security and Privacy Requirements for Cloud Deployment Models'. Together they form a unique fingerprint.

    Cite this