Addressing Privacy in Traditional and Cloud-Based Systems

Author:

Kalloniatis Christos1,Kavakli Evangelia1,Gritzalis Stefanos1

Affiliation:

1. University of the Aegean, Greece

Abstract

A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Amid the main criteria that formulate users' trust is the way that that their privacy is protected. Indeed, privacy violation is an issue of great importance for active online users that daily accomplish several transactions that may convey personal data, sensitive personal data, employee data, credit card data and so on. In addition, the appearance of cloud computing has elevated the number of personally identifiable information that users provide in order to gain access to various services, further raising user concerns as to how and to what extend information about them is communicated to others. The aim of this work is to elevate the modern practices for ensuring privacy during software systems design. To this end, the basic privacy requirements that should be considered during system analysis are introduced. Additionally, a number of well-known methods that have been introduced in the research area of requirements engineering which aim on eliciting and modeling privacy requirements during system design are introduced and critically analyzed. The work completes with a discussion of the additional security and privacy concepts that should be considered in the context of cloud-based information systems and how these affect current research.

Publisher

IGI Global

Reference64 articles.

1. Antόn, A. (1996). Goal-based requirements analysis. In Proceedings of the ICRE'96 (pp. 136-144). Colorado Springs, CO: IEEE.

2. Antόn, A., & Earp, J. (2000). Strategies for developing policies and requirements for secure electronic commerce systems. In Proceedings of the 1st Workshop on Security and Privacy in e-Commerce. ACM.

3. Baburajan, R. (2012). The rising cloud storage market opportunity strengthens vendors. In Proceedings of the infoTECH. Retrieved from It.tmcnet.com

4. Bellotti, V., & Sellen, A. (1993). Design for privacy in ubiquitous computing environments. In In Michelis, G., Simone, C., Schmidt, K. (Eds.), Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW 93) (pp. 93-108).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3