TY - GEN
T1 - Modelling secure cloud computing systems from a security requirements perspective
AU - Shei, Shaun
AU - Kalloniatis, Christos
AU - Mouratidis, Haralambos
AU - Delaney, Aidan
N1 - This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-319-44341-6_4
PY - 2016/8/6
Y1 - 2016/8/6
N2 - This paper presents a cloud modelling language for defining essential cloud properties, enabling the modelling and reasoning about security issues in cloud environments from a requirements engineering perspective. The relationship between cloud computing and security aspects are described through a meta-model, aligning concepts from cloud computing and security requirements engineering. The central concept of the proposed approach is built around cloud services, where the propagation of relationships from a social perspective, abstract software processes and the foundational infrastructure layer are captured. The proposed concepts are applied on a running example throughout the paper to demonstrate how developers are able to capture and model cloud concepts across multiple conceptual layers, facilitating the understanding of cloud security requirements and the design of security-embedded cloud systems to realise organisational needs.
AB - This paper presents a cloud modelling language for defining essential cloud properties, enabling the modelling and reasoning about security issues in cloud environments from a requirements engineering perspective. The relationship between cloud computing and security aspects are described through a meta-model, aligning concepts from cloud computing and security requirements engineering. The central concept of the proposed approach is built around cloud services, where the propagation of relationships from a social perspective, abstract software processes and the foundational infrastructure layer are captured. The proposed concepts are applied on a running example throughout the paper to demonstrate how developers are able to capture and model cloud concepts across multiple conceptual layers, facilitating the understanding of cloud security requirements and the design of security-embedded cloud systems to realise organisational needs.
KW - Cloud computing
KW - Cloud security
KW - Cloud security requirements
KW - Modelling language
KW - Security requirements engineering
UR - http://www.scopus.com/inward/record.url?scp=84981165442&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-44341-6_4
DO - 10.1007/978-3-319-44341-6_4
M3 - Conference contribution with ISSN or ISBN
AN - SCOPUS:84981165442
SN - 9783319443409
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 48
EP - 62
BT - Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Proceedings
PB - Springer-Verlag
T2 - 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016
Y2 - 7 September 2016 through 7 September 2016
ER -