Modelling secure cloud computing systems from a security requirements perspective

Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan Delaney

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

Abstract

This paper presents a cloud modelling language for defining essential cloud properties, enabling the modelling and reasoning about security issues in cloud environments from a requirements engineering perspective. The relationship between cloud computing and security aspects are described through a meta-model, aligning concepts from cloud computing and security requirements engineering. The central concept of the proposed approach is built around cloud services, where the propagation of relationships from a social perspective, abstract software processes and the foundational infrastructure layer are captured. The proposed concepts are applied on a running example throughout the paper to demonstrate how developers are able to capture and model cloud concepts across multiple conceptual layers, facilitating the understanding of cloud security requirements and the design of security-embedded cloud systems to realise organisational needs.

Original languageEnglish
Title of host publicationTrust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Proceedings
PublisherSpringer-Verlag
Pages48-62
Number of pages15
ISBN (Print)9783319443409
DOIs
Publication statusPublished - 6 Aug 2016
Event13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016 - Porto, Portugal
Duration: 7 Sept 20167 Sept 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9830 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016
Country/TerritoryPortugal
CityPorto
Period7/09/167/09/16

Bibliographical note

This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-319-44341-6_4

Keywords

  • Cloud computing
  • Cloud security
  • Cloud security requirements
  • Modelling language
  • Security requirements engineering

Fingerprint

Dive into the research topics of 'Modelling secure cloud computing systems from a security requirements perspective'. Together they form a unique fingerprint.

Cite this