Abstract
The vast adoption of cloud computing has led to a new content in relation to privacy and security. Personal information is no longer as safe as we think and can be altered. In addition, Cloud Service Providers (CSPs) are still looking for new ways to raise the level of trust in order to gain popularity and increase their number of users. In this paper, a systematic literature review was carried out to identify the different methodologies, models and frameworks regarding privacy engineering and trust in cloud computing. A detailed review is produced on the specific area to bring forward all the work that has been carried out the recent years using a methodology with a number of different steps and criteria. Based on the findings from the literature review, we present the state-of-the-art on privacy and trust methodologies in cloud computing and we discuss the existing conventional tools that can assist software designers and developers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Flexera, State of the Cloud Report (2021). https://www.flexera.com/blog/cloud/cloud-computing-trends-2022-state-of-the-cloud-report/
Cook, A., Robinson, M., Ferrag, M.A.: Internet of cloud: security and privacy issues. In: Mishra, B.S.P., Das, H., Dehuri, S., Jagadev, A.K. (ed.) Cloud Computing for Optimization: Foundations, Applications, and Challenges. SBD, vol. 39, pp. 271–301. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73676-1_11
Razaque, A., Rizvi, S.S.: Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. Comput. Secur. 62, 328–347 (2016)
Kaiser, C., et al.: A vehicle telematics service for driving style detection: implementation and privacy challenges. In: VEHITS, pp. 29–36 (2020)
Canedo, E.D., Bandeira, I., Calazans, A., Costa, P., Cançado, E., Bonifacio, R.: Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners. Requirements Eng. 27 (2022). https://doi.org/10.1007/s00766-022-00382-8
Pattakou, A., Kalloniatis, C., Gritzalis, S.: Security and Privacy under a unified framework: a review. Inter. J. Adv. Sec. 11(1–2), 39–51 (2018)
Ibrahim, F.A., Hemayed, E.E.: Trusted cloud computing architectures for infrastructure as a service: Survey and systematic literature review. Comput. Secur. 82, 196–226 (2019)
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy re-quirements. Requirements Eng. 16(1), 3–32 (2011)
Bijwe, A., Mead, N.R.: Adapting the SQUARE Process for Privacy Requirements Engineering, pp. 1–32 (2010)
Mead, N.R., Hough, E.D. Ii, T.R.S.: Security Quality Requirements Engineering (SQUARE) Methodology. Carnegie Mellon Software Engineering Institute, Pittsburgh PA (2005)
Meis, R., Heisel, M.: Computer-aided identification and validation of intervenability requirements. Information 8(1), 30 (2017)
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241–255 (2008)
Kalloniatis, C., Kavakli, E., Kontellis, E.: Pris tool: a case tool for privacy-oriented requirements engineering. In: 4th Mediterranean Conference on Information Systems, MCIS, p. 71 (2009)
Islam, S., Mouratidis, H., Kalloniatis, C., Hudic, A., Zechner, L.: Model based process to support security and privacy requirements engineering. Inter. J. Sec. Softw. Eng. (IJSSE) 3(3), 1–22 (2012)
Mouratidis, H., Kalloniatis, C., Islam, S., Huget, M.P., Gritzalis, S.: Aligning security and privacy to support the development of secure information systems. J. Univ. Comput. Sci. 18(12), 1608–1627 (2012)
He, Q., Antón, A.I.: A framework for modeling privacy requirements in role engineering. In: 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ 2003) on Proceedings, pp. 137–146 (2003)
Jensen, C., Tullio, J., Potts, C., Mynatt, E.D.: STRAP: a structured analysis framework for privacy. Georgia Institute of Technology (2005)
Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: 11th IEEE International Requirements Engineering Conference 2003 on Proceedings, pp. 151–161. IEEE (2003)
Horkoff, J., Yu, Y., Eric, S.K.: OpenOME: an open-source goal and agent-oriented model drawing and analysis tool. iStar 766, 154–156 (2011)
Stach, C., Steimle, F.: Recommender-based privacy requirements elicitation-EPICUREAN: an approach to simplify privacy settings in IoT applications with respect to the GDPR. In: 34th ACM/SIGAPP Symposium on Applied Computing on Proceedings, pp. 1500–1507. Limassol Cyprus (2019)
Peixoto, M.M.: Privacy Requirements engineering in agile software development: a specification method. In: REFSQ-2020 Workshops on Proceedings, Pisa Italy (2020)
Neureiter, C., Eibl, G., Veichtlbauer, A., Engel, D.: Towards a framework for engineering smart-grid-specific privacy requirements. In: IECON 2013–39th Annual Conference of the IEEE Industrial Electronics Society on Proceedings, pp. 4803–4808. IEEE, Vienna Austria (2013)
Gharib, M., Mylopoulos, J.: A core ontology for privacy requirements engineering. arXiv preprint arXiv:1811.12621. (2018)
Gharib, M., Giorgini, P., Mylopoulos, J.: COPri v. 2 – A core ontology for privacy requirements. Data Knowl. Eng. 133, 101888 (2021)
Wu, X., Zhang, R., Zeng, B., Zhou, S.: A trust evaluation model for cloud computing. Proc. Comput. Sci. 17, 1170–1177 (2013)
Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. Adv. Syst. Appli. 2(1), 1–14 (2013)
Shabalala, M.V., Tarwireyi, P., Adigun, M.O.: Privacy monitoring framework for enhancing transparency in cloud computing. In: 6th International Conference on Adaptive Science & Technology (ICAST), pp. 1–7. IEEE (2014)
Salih, R.M., Lilien, L. T.: Protecting users’ privacy in healthcare cloud computing with APB-TTP. In: International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 236–238. IEEE (2015)
Polash, F., Shiva, S.: Building trust in cloud: service certification challenges and approaches. In: Ninth International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 187–191. IEEE (2015)
Drucker, N., Gueron, S., Pinkas, B.: Faster secure cloud computations with a trusted proxy. IEEE Secur. Priv. 15(6), 61–67 (2017)
George, J.A., Veni, S., Soomroo, S.: Improving privacy and trust in federated identity using SAML with hash based encryption algorithm. In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS), pp. 1–5. IEEE (2017)
Mbanaso, U.M., Chukwudebe, G.A.: Requirement analysis of IoT security in distributed systems. In: 3rd International Conference on Electro-Technology for National Development (NIGERCON), pp. 777–781. IEEE (2017)
Marwan, M., Kartit, A., Ouahmane, H.: A cloud-based framework to secure medical image processing. J. Mobile Multimedia, 319–344 (2018)
Tahir, S., Rajarajan, M.: Privacy-preserving searchable encryption framework for permissioned blockchain networks. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1628–1633. IEEE (2018)
Qin, Z., Ye, J., Meng, J., Lu, B., Wang, L.: Privacy-Preserving Blockchain-Based Federated Learning for Marine Internet of Things. IEEE Trans. Comput. Soc. Syst. 9(1), 159–173 (2021)
Basha, S.M., Ahmed, S.T., Iyengar, N.C.S.N., Caytiles, R.D.: Inter-locking dependency evaluation schema based on block-chain enabled federated transfer learning for autonomous vehicular systems. In: Second International Conference on Innovative Technology Convergence (CITC), pp. 46–51. IEEE (2021)
Acknowledgements

The research project was supported by the Hellenic Foundation for Research and Innovation (H.F.R.I.) under the ‘2nd Call for H.F.R.I. Research Projects to support Faculty Members & Re-searchers’ (Project Number: 2550).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Simou, S., Mavroeidi, AG., Kalloniatis, C. (2024). Review on Privacy and Trust Methodologies in Cloud Computing. In: Katsikas, S., et al. Computer Security. ESORICS 2023 International Workshops. ESORICS 2023. Lecture Notes in Computer Science, vol 14398. Springer, Cham. https://doi.org/10.1007/978-3-031-54204-6_29
Download citation
DOI: https://doi.org/10.1007/978-3-031-54204-6_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-54203-9
Online ISBN: 978-3-031-54204-6
eBook Packages: Computer ScienceComputer Science (R0)