Reliable Requirements Engineering Practices for COVID-19 Using Blockchain

Improvement in the requirements for engineering practices is needed in areas such as requirement elicitation, validation, prioritization, and negotiations between stakeholders to create successful projects for COVID-19 (coronavirus disease 2019) software. Many algorithms and techniques are used to create quality software projects, but they still need more improvement to work effectively for global pandemic COVID-19 software. By improving the reliability of requirement engineering practices using blockchain-based technology, the software will be reliable and will make it easier for the users working in a lockdown situation because of COVID-19. Therefore, our purpose is to identify the factors for reliable software engineering practices using blockchain-oriented technology for COVID-19 software. A systematic literature review is conducted to identify challenges and offer solutions. Through using blockchain-based technology for requirement engineering practices, the requirements will be gathered accurately and validated, and the conflicts between stakeholders will also be solved. It will improve the quality and reliability of COVID-19 software projects, which will help society work effectively from home. Improvement in the quality and reliability of COVID-19 software will improve users’ interest, and their working capacity will be increased.

[1]  Hao Guo,et al.  Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[2]  Norbert Seyff,et al.  Enhancing GSS-based requirements negotiation with distributed and mobile tools , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).

[3]  Naveed Ahmad,et al.  A Social Network Based Process to Minimize In-Group Biasedness During Requirement Engineering , 2018, IEEE Access.

[4]  Xavier Franch,et al.  Requirements negotiation for multilayer system components , 2011, 2011 IEEE 19th International Requirements Engineering Conference.

[5]  Joshua S. Gans,et al.  Some simple economics of the blockchain , 2020, Commun. ACM.

[6]  Shivani Goel,et al.  Expert system and it's requirement engineering process , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[7]  Tharwon Arnuphaptrairong,et al.  Top Ten Lists of Software Project Risks : Evidence from the Literature Survey , 2022 .

[8]  Salil S. Kanhere,et al.  TrustChain: Trust Management in Blockchain and IoT Supported Supply Chains , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[9]  Bashar Nuseibeh,et al.  Requirements engineering: a roadmap , 2000, ICSE '00.

[10]  Laxmi Ahuja,et al.  Building Secure Infrastructure for Cloud Computing Using Blockchain , 2018, 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).

[11]  João M. Fernandes,et al.  Requirements in Engineering Projects , 2016 .

[12]  Akira Otsuka,et al.  Traceability in Permissioned Blockchain , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[13]  Martin Glinz,et al.  Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study , 2010, 2010 18th IEEE International Requirements Engineering Conference.

[14]  George Valença,et al.  Requirements negotiation model: A social oriented approach for software ecosystems evolution , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).

[15]  Shanzhi Chen,et al.  A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain , 2018, IEEE Access.

[16]  Lav Gupta,et al.  A Reputation Management Framework for Knowledge-Based and Probabilistic Blockchains , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[17]  Ruzanna Chitchyan,et al.  Tailoring Requirements Negotiation to Sustainability , 2018, 2018 IEEE 26th International Requirements Engineering Conference (RE).

[18]  Yang Chen,et al.  Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[19]  Lin Liu,et al.  Negotiating Service Requirements among Strategic Actors , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[20]  John Mylopoulos,et al.  CaRE: A Refinement Calculus for Requirements Engineering Based on Argumentation Semantics , 2018, 2018 IEEE 26th International Requirements Engineering Conference (RE).

[21]  Peng Liang,et al.  Reasoning about Stakeholder Groups for Requirements Negotiation Based on Power Relationships , 2013, 2013 20th Asia-Pacific Software Engineering Conference (APSEC).

[22]  Rizwan Beg,et al.  Effectiveness of Requirement Prioritization Using Analytical Hierarchy Process (AHP) And Planning Game (PG): A Comparative Study , 2013 .

[23]  Bo Zhang,et al.  A High Performance Blockchain Platform for Intelligent Devices , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).

[24]  Barry W. Boehm,et al.  Software requirements negotiation: some lessons learned , 1998, Proceedings of the 20th International Conference on Software Engineering.

[25]  Eric Dubois,et al.  An Automatic Requirements Negotiation Approach for Business Services , 2011, 2011 IEEE Ninth European Conference on Web Services.

[26]  Sachin Shetty,et al.  Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[27]  Bin Li,et al.  Application of block chain in multi-level demand response reliable mechanism , 2017, 2017 3rd International Conference on Information Management (ICIM).

[28]  Qiang Ye,et al.  A Requirements Maturity Measurement Approach Based on SKLSEWiki , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[29]  Mareike Schoop,et al.  Decision Problems in Requirements Negotiations - Identifying the Underlying Structures , 2017, GDN.

[30]  Rongxing Lu,et al.  Scalable Privacy-Preserving Query Processing over Ethereum Blockchain , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[31]  Jian-yun Lei,et al.  Trust vector-based sensitive information protecting scheme in automatic trust negotiation , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[32]  Yingshu Li,et al.  Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[33]  Naveed Ikram,et al.  Build Software or Buy: A Study on Developing Large Scale Software , 2017, IEEE Access.

[34]  Stanley Y. W. Su,et al.  A replicable Web-based negotiation server for e-commerce , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[35]  Hong Xiao,et al.  Blockchain Dividing Based on Node Community Clustering in Intelligent Manufacturing CPS , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[36]  Sheng Huang,et al.  A Privacy-Preserving Voting Protocol on Blockchain , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).

[37]  Saudi Arabia,et al.  Software Risk Management and Avoidance Strategy , 2011 .

[38]  Arie Segev,et al.  A framework for dynamic eBusiness negotiation processes , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[39]  Dušan Savić,et al.  Linguistic Patterns and Linguistic Styles for Requirements Specification: Focus on Data Entities , 2021, Applied Sciences.

[40]  Sabrina Ahmad Negotiation in the Requirements Elicitation and Analysis Process , 2008 .

[41]  Ashraf B. El-Sisi,et al.  RGSS-negotiation: A genetic-based approach for web service security negotiation , 2016, 2016 11th International Conference on Computer Engineering & Systems (ICCES).

[42]  Mitsuaki Nakasumi,et al.  Information Sharing for Supply Chain Management Based on Block Chain Technology , 2017, 2017 IEEE 19th Conference on Business Informatics (CBI).

[43]  Song Han,et al.  ChainSplitter: Towards Blockchain-Based Industrial IoT Architecture for Supporting Hierarchical Storage , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[44]  Jules White,et al.  Chapter One - Blockchain Technology Use Cases in Healthcare , 2018, Adv. Comput..

[45]  Sheikh Tahir Bakhsh,et al.  Risk Management Approaches for Large Scale Software Development , 2017, J. Inf. Sci. Eng..

[46]  Naveed Ikram,et al.  Goal Oriented Requirement Engineering: A Critical Study of Techniques , 2006, 2006 13th Asia Pacific Software Engineering Conference (APSEC'06).

[47]  Spyros Makridakis,et al.  Blockchain: Current Challenges and Future Prospects/Applications , 2019, Future Internet.

[48]  Paul Grünbacher Collaborative requirements negotiation with EasyWinWin , 2000, Proceedings 11th International Workshop on Database and Expert Systems Applications.

[49]  Nupul Kukreja,et al.  Winbook: A social networking based framework for collaborative requirements elicitation and WinWin negotiations , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[50]  A. van Lamsweerde Goal-oriented requirements enginering: a roundtrip from research to practice [enginering read engineering] , 2004 .

[51]  Rafael Prikladnicki,et al.  Mobile Speech Translation for Multilingual Requirements Meetings: A Preliminary Study , 2014, 2014 IEEE 9th International Conference on Global Software Engineering.

[52]  Abass Md Said,et al.  Identification and Quantitative Analysis of Project Success Factors for Large Scale Projects , 2014, Int. J. Knowl. Soc. Res..

[53]  Nayyar Iqbal,et al.  Fuzzy Logic Testing Approach for Measuring Software Completeness , 2021, Symmetry.

[54]  Rong Wang,et al.  A Privacy-Aware PKI System Based on Permissioned Blockchains , 2018, 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS).

[55]  Barry W. Boehm,et al.  Process implications of social networking-based requirements negotiation tools , 2012, 2012 International Conference on Software and System Process (ICSSP).

[56]  B. Shahzad,et al.  Enhanced Risk Analysis-Relative Impact Factorization , 2005, 2005 International Conference on Information and Communication Technologies.

[57]  Claes Wohlin,et al.  Engineering and Managing Software Requirements , 2005 .

[58]  Arim Park,et al.  The Effect of Blockchain Technology on Supply Chain Sustainability Performances , 2021, Sustainability.

[59]  Dhirendra Pandey,et al.  An Effective Requirement Engineering Process Model for Software Development and Requirements Management , 2010, 2010 International Conference on Advances in Recent Technologies in Communication and Computing.

[60]  Cheng Yang,et al.  A Phrase-Level User Requests Mining Approach in Mobile Application Reviews: Concept, Framework, and Operation , 2021, Inf..

[61]  Irfan Ul Haq,et al.  Agent-Based SLA Negotiation Protocol for Cloud Computing , 2017, 2017 International Conference on Cloud Computing Research and Innovation (ICCCRI).

[62]  Hoh Peter In,et al.  A requirements negotiation model based on multi-criteria analysis , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.

[63]  Yunpeng Zhang,et al.  Blockchain-Based Real Estate Market: One Method for Applying Blockchain Technology in Commercial Real Estate Market , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[64]  Ke Wang,et al.  FastChain: Scaling Blockchain System with Informed Neighbor Selection , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[65]  Waqar Aslam,et al.  Identification of Patterns in Failure of Software Projects , 2017, J. Inf. Sci. Eng..

[66]  Yan He,et al.  An Efficient and Minimum Sensitivity Cost Negotiation Strategy in Automated Trust Negotiation , 2008, 2008 International Conference on Computer Science and Software Engineering.

[67]  Kurt Schneider,et al.  Reframing Societal Discourse as Requirements Negotiation: Vision Statement , 2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW).

[68]  Murat Kantarcioglu,et al.  A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[69]  Peng Liang,et al.  Requirements Reasoning for Distributed Requirements Analysis Using Semantic Wiki , 2009, 2009 Fourth IEEE International Conference on Global Software Engineering.

[70]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.