Version 1
: Received: 8 April 2019 / Approved: 9 April 2019 / Online: 9 April 2019 (11:46:02 CEST)
How to cite:
Xia, T.; Washizaki, H.; Fukazawa, Y.; Kato, T.; Kaiya, H.; Ogata, S.; Fernandez, E.B.; Kanuka, H.; Yoshino, M.; Yamamoto, D.; Okubo, T.; Yoshioka, N.; Hazeyama, A. Metamodel for Security and Privacy Knowledge in Cloud Service Development. Preprints2019, 2019040106 (doi: 10.20944/preprints201904.0106.v1).
Xia, T.; Washizaki, H.; Fukazawa, Y.; Kato, T.; Kaiya, H.; Ogata, S.; Fernandez, E.B.; Kanuka, H.; Yoshino, M.; Yamamoto, D.; Okubo, T.; Yoshioka, N.; Hazeyama, A. Metamodel for Security and Privacy Knowledge in Cloud Service Development. Preprints 2019, 2019040106 (doi: 10.20944/preprints201904.0106.v1).
Cite as:
Xia, T.; Washizaki, H.; Fukazawa, Y.; Kato, T.; Kaiya, H.; Ogata, S.; Fernandez, E.B.; Kanuka, H.; Yoshino, M.; Yamamoto, D.; Okubo, T.; Yoshioka, N.; Hazeyama, A. Metamodel for Security and Privacy Knowledge in Cloud Service Development. Preprints2019, 2019040106 (doi: 10.20944/preprints201904.0106.v1).
Xia, T.; Washizaki, H.; Fukazawa, Y.; Kato, T.; Kaiya, H.; Ogata, S.; Fernandez, E.B.; Kanuka, H.; Yoshino, M.; Yamamoto, D.; Okubo, T.; Yoshioka, N.; Hazeyama, A. Metamodel for Security and Privacy Knowledge in Cloud Service Development. Preprints 2019, 2019040106 (doi: 10.20944/preprints201904.0106.v1).
Abstract
Requirements for cloud services include security and privacy. Although many security patterns, privacy patterns, and non-pattern-based knowledge have been reported, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the Cloud Security and Privacy Metamodel (CSPM). CSPM uses a consistent approach to classify and support existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.
Subject Areas
cloud computing; security patterns; privacy patterns; software and system architecture
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.