Advanced Cloud Privacy Threat Modeling

Ali Gholami,Erwin Laure
DOI: https://doi.org/10.5121/csit.2016.60120
2016-01-07
Abstract:Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system . This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodology for privacy threat modeling in relation to processing sensitive data in cloud computing environments. It describes the modeling methodology that involved applying Method Engineering to specify characteristics of a cloud privacy threat modeling methodology, different steps in the proposed methodology and corresponding products. We believe that the extended methodology facilitates the application of a privacy-preserving cloud software development approach from requirements engineering to design.
Software Engineering,Cryptography and Security,Distributed, Parallel, and Cluster Computing
What problem does this paper attempt to address?