Patterns for security and privacy in cloud ecosystems

An ecosystem is the expansion of a software product line architecture to include systems outside the product which interact with the product. We model here the architecture of a cloud-based ecosystem, showing security patterns for its main components. We discuss the value of this type of models.

[1]  Martin Fowler,et al.  Analysis patterns - reusable object models , 1996, Addison-Wesley series in object-oriented software engineering.

[2]  James Bret Michael,et al.  Atomic-Level Security for Web Applications in a Cloud Environment , 2012, Computer.

[3]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[4]  Nils Gruschka,et al.  Security and Privacy-Enhancing Multicloud Architectures , 2013, IEEE Transactions on Dependable and Secure Computing.

[5]  Bart Jellema,et al.  Communications as a cloud service: a new take on telecoms , 2014 .

[6]  Eduardo B. Fernández,et al.  Abstract security patterns for requirements specification and analysis of secure systems , 2014, WER.

[7]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[8]  E. B. Fernandez,et al.  A Pattern for Software-as-a-Service in Clouds , 2012, 2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom).

[9]  Eduardo B. Fernández,et al.  Building a security reference architecture for cloud systems , 2016, Requirements Engineering.

[10]  Jan Bosch,et al.  From software product lines to software ecosystems , 2009, SPLC.

[11]  Eduardo B. Fernández,et al.  A Multi-Dimensional Classification for Users of Security Patterns , 2008, J. Res. Pract. Inf. Technol..

[12]  Paris Avgeriou,et al.  Describing, Instantiating and Evaluating a Reference Architecture : A Case Study , 2003 .

[13]  Eduardo B. Fernández,et al.  An Approach to Model-based Development of Secure and Reliable Systems , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[14]  Peter Sommerlad,et al.  Pattern-Oriented Software Architecture Volume 1: A System of Patterns , 1996 .

[15]  David Bernstein,et al.  Intercloud Security Considerations , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[16]  Kristian Beckers,et al.  A pattern-based method for establishing a cloud-specific information security management system , 2013, Requirements Engineering.

[17]  Eduardo Fernandez-Buglioni,et al.  Security Patterns in Practice: Designing Secure Architectures Using Software Patterns , 2013 .