Home // ICSEA 2019, The Fourteenth International Conference on Software Engineering Advances // View article


i* (iStar) Security Hierarchy for Cloud Computing

Authors:
Fiza Saher Faizan
Seemab Latif
Rabia Latif

Keywords: Requirement Engineering), Cloud Computing, iStar

Abstract:
The world is advancing with the Cloud Computing technology. The aim of cloud computing is to provide improved usage of distributed resources like networks, servers, storage applications, and services. With the advancement, there are some risks involved as well. Whenever a cloud-system is being developed, an entity should be there, which looks-after security threats that may arise for the system. This entity is proposed in this research work and named as “Guard”. A framework is proposed, which can elicit functional requirements, as well as security requirements of the system. Online-banking case study is used to verify the proposed framework. To accomplish the task, a survey is also conducted and then results are analyzed from survey to propose a framework. The evaluation result of the proposed framework shows that the system will be protected from multiple security risks of cloud computing.

Pages: 104 to 109

Copyright: Copyright (c) IARIA, 2019

Publication date: November 24, 2019

Published in: conference

ISSN: 2308-4235

ISBN: 978-1-61208-752-8

Location: Valencia, Spain

Dates: from November 24, 2019 to November 28, 2019