Home // ICSEA 2019, The Fourteenth International Conference on Software Engineering Advances // View article
i* (iStar) Security Hierarchy for Cloud Computing
Authors:
Fiza Saher Faizan
Seemab Latif
Rabia Latif
Keywords: Requirement Engineering), Cloud Computing, iStar
Abstract:
The world is advancing with the Cloud Computing technology. The aim of cloud computing is to provide improved usage of distributed resources like networks, servers, storage applications, and services. With the advancement, there are some risks involved as well. Whenever a cloud-system is being developed, an entity should be there, which looks-after security threats that may arise for the system. This entity is proposed in this research work and named as “Guard”. A framework is proposed, which can elicit functional requirements, as well as security requirements of the system. Online-banking case study is used to verify the proposed framework. To accomplish the task, a survey is also conducted and then results are analyzed from survey to propose a framework. The evaluation result of the proposed framework shows that the system will be protected from multiple security risks of cloud computing.
Pages: 104 to 109
Copyright: Copyright (c) IARIA, 2019
Publication date: November 24, 2019
Published in: conference
ISSN: 2308-4235
ISBN: 978-1-61208-752-8
Location: Valencia, Spain
Dates: from November 24, 2019 to November 28, 2019