2018
DOI: 10.1109/tcc.2015.2511719
|View full text |Cite
|
Sign up to set email alerts
|

Assurance of Security and Privacy Requirements for Cloud Deployment Models

Abstract: Abstract-Despite of the several benefits of migrating enterprise critical assets to the Cloud, there are challenges specifically related to security and privacy. It is important that Cloud Users understand their security and privacy needs, based on their specific context and select cloud model best fit to support these needs. The literature provides works that focus on discussing security and privacy issues for cloud systems but such works do not provide a detailed methodological approach to elicit security an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 20 publications
(29 reference statements)
0
16
0
1
Order By: Relevance
“…We have also found some works in the literature that report on the use of use cases, business process modeling, class diagrams, user story, user experience, design thinking, among others, for software privacy and privacy requirements' elicitation [44,48,49,[56][57][58] and have related works to software privacy and privacy requirements for cloud deployment models [46,47,59] and Internet of Things (IoT) [41,42,60,61]. This diversity of works found in several areas [43,45,62] demonstrates how important the elicitation of software privacy and privacy requirements is during the software development process and the growing concern of researchers from various fields of knowledge regarding the privacy of user data.…”
Section: Rq1 According To the Literature What Are The Methodsologiementioning
confidence: 95%
“…We have also found some works in the literature that report on the use of use cases, business process modeling, class diagrams, user story, user experience, design thinking, among others, for software privacy and privacy requirements' elicitation [44,48,49,[56][57][58] and have related works to software privacy and privacy requirements for cloud deployment models [46,47,59] and Internet of Things (IoT) [41,42,60,61]. This diversity of works found in several areas [43,45,62] demonstrates how important the elicitation of software privacy and privacy requirements is during the software development process and the growing concern of researchers from various fields of knowledge regarding the privacy of user data.…”
Section: Rq1 According To the Literature What Are The Methodsologiementioning
confidence: 95%
“…Smitha et al [16] suggest that the integration of the cloud computing in e-government could solve a number of problems including data duplication, low resource utilization rate, repetitive infrastructure construction and information isolated island. Besides this, governments could be benefited from overall cost reduction, distributed data storage, scalability, accountability, modifiability and security management by using cloud computing [9,[18][19][20][21].…”
Section: Related Workmentioning
confidence: 99%
“…Islam et al [31] endeavored to execute the security and protection prerequisites of the cloud sending models. This examination work investigated the significant points of view of the security and protection necessities of the distinctive cloud organization models.…”
Section: Discussion Of Different Data Integrity Maintenance Technmentioning
confidence: 99%