Towards the design of secure and privacy-oriented Information Systems in the Cloud: Identifying the major concepts

Warning

As of July 2018 University of Brighton Repository is no longer updated. Please see our new repository at http://research.brighton.ac.uk.

Kalloniatis, Christos, Mouratidis, Haralambos, Vassilis, Manousakis, Islam, Shareeful, Gritzalis, Stefanos and Kavakli, Evangelia (2014) Towards the design of secure and privacy-oriented Information Systems in the Cloud: Identifying the major concepts Computer Standards & Interfaces, 36 (4). pp. 759-775. ISSN 0920-5489

[img]
Preview
Text
Computer Standards and Interfaces_FINAL_R1_Converis.pdf - Accepted Version

Download (1MB) | Preview

Abstract

Cloud computing is without a doubt one of the most significant innovations presented in the global technological map. This new generation of technology has the potential to positively change our lives since on the one hand it provides capabilities that make our digital lives much easier, than before, while on the other hand it assists developers in creating services that can be disseminated easier and faster, than before, and with significantly less cost. However, one of the major research challenges for the successful deployment of cloud services is a clear understanding of security and privacy issues on a cloud environment, since the cloud architecture has dissimilarities comparing to the traditional distributed systems. Such differences might introduce new threats and require different treatment of security and privacy issues. Nevertheless, current security and privacy requirements engineering techniques and methodologies have not been developed with cloud computing in mind and fail to capture the unique characteristics of such domain. It is therefore important to understand security and privacy within the context of cloud computing and identify relevant security and privacy properties and threats that will support techniques and methodologies aimed to analyze and design secure cloud based systems. The contribution of this paper to the literature is two-fold. Firstly, it provides a clear linkage between a set of critical cloud computing areas with security and privacy threats and properties. Secondly, it introduces a number of requirements for analysis and design methodologies to consider for security and privacy concerns in the cloud.

Item Type: Journal article
Additional Information: This is the author’s version of a work that was accepted for publication in Computer Standards & Interfaces. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computer Standards & Interfaces, 36, 4, 2014, DOI:10.1016/j.csi.2013.12.010
Uncontrolled Keywords: Security; Privacy; Cloud computing; Security and privacy issues; Concepts; Requirements
DOI (a stable link to the resource): 10.1016/j.csi.2013.12.010
Depositing User: Converis
Date Deposited: 07 Jan 2015 03:01
Last Modified: 07 Jan 2015 09:04
URI: http://eprints.brighton.ac.uk/id/eprint/13161

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year