Traceability for Adaptive Information Security in the Cloud

One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a risk that security policies are violated. To minimize this risk, cloud applications need to be engineered to adapt their security policies to maintain satisfaction of security requirements despite changes in their usage context. We call such adaptation capability Adaptive Information Security. The paper argues that one of the prerequisites to adaptive information security is the use of traceability as a means to understanding the relationship between security requirements and security policies. Using an example, we motivate the need for improving traceability in the development of cloud applications.

[1]  Vinicius Cardoso Garcia,et al.  Security Threats in Cloud Computing Models: Domains and Proposals , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[2]  Bashar Nuseibeh,et al.  Security Requirements Engineering: A Framework for Representation and Analysis , 2008, IEEE Transactions on Software Engineering.

[3]  Olly Gotel,et al.  An analysis of the requirements traceability problem , 1994, Proceedings of IEEE International Conference on Requirements Engineering.

[4]  Yijun Yu,et al.  Analysing monitoring and switching problems for adaptive systems , 2012, J. Syst. Softw..