Skip to main content

Review on Privacy and Trust Methodologies in Cloud Computing

  • Conference paper
  • First Online:
Computer Security. ESORICS 2023 International Workshops (ESORICS 2023)

Abstract

The vast adoption of cloud computing has led to a new content in relation to privacy and security. Personal information is no longer as safe as we think and can be altered. In addition, Cloud Service Providers (CSPs) are still looking for new ways to raise the level of trust in order to gain popularity and increase their number of users. In this paper, a systematic literature review was carried out to identify the different methodologies, models and frameworks regarding privacy engineering and trust in cloud computing. A detailed review is produced on the specific area to bring forward all the work that has been carried out the recent years using a methodology with a number of different steps and criteria. Based on the findings from the literature review, we present the state-of-the-art on privacy and trust methodologies in cloud computing and we discuss the existing conventional tools that can assist software designers and developers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Flexera, State of the Cloud Report (2021).  https://www.flexera.com/blog/cloud/cloud-computing-trends-2022-state-of-the-cloud-report/

  2. Cook, A., Robinson, M.,  Ferrag, M.A.: Internet of cloud: security and privacy issues. In: Mishra, B.S.P., Das, H., Dehuri, S., Jagadev, A.K. (ed.) Cloud Computing for Optimization: Foundations, Applications, and Challenges. SBD, vol. 39, pp. 271–301. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73676-1_11

  3. Razaque, A., Rizvi, S.S.: Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. Comput. Secur. 62, 328–347 (2016)

    Article  Google Scholar 

  4. Kaiser, C., et al.: A vehicle telematics service for driving style detection: implementation and privacy challenges. In: VEHITS, pp. 29–36 (2020)

    Google Scholar 

  5. Canedo, E.D., Bandeira, I., Calazans, A., Costa, P., Cançado, E., Bonifacio, R.: Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners. Requirements Eng. 27 (2022). https://doi.org/10.1007/s00766-022-00382-8

  6. Pattakou, A., Kalloniatis, C., Gritzalis, S.: Security and Privacy under a unified framework: a review. Inter. J. Adv. Sec. 11(1–2), 39–51 (2018)

    Google Scholar 

  7. Ibrahim, F.A., Hemayed, E.E.: Trusted cloud computing architectures for infrastructure as a service: Survey and systematic literature review. Comput. Secur. 82, 196–226 (2019)

    Article  Google Scholar 

  8. Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy re-quirements. Requirements Eng. 16(1), 3–32 (2011)

    Article  Google Scholar 

  9. Bijwe, A., Mead, N.R.: Adapting the SQUARE Process for Privacy Requirements Engineering, pp. 1–32 (2010)

    Google Scholar 

  10. Mead, N.R., Hough, E.D. Ii, T.R.S.: Security Quality Requirements Engineering (SQUARE) Methodology. Carnegie Mellon Software Engineering Institute, Pittsburgh PA (2005)

    Google Scholar 

  11. Meis, R., Heisel, M.: Computer-aided identification and validation of intervenability requirements. Information 8(1), 30 (2017)

    Article  Google Scholar 

  12. Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241–255 (2008)

    Article  Google Scholar 

  13. Kalloniatis, C., Kavakli, E.,  Kontellis, E.: Pris tool: a case tool for privacy-oriented requirements engineering. In: 4th Mediterranean Conference on Information Systems, MCIS, p. 71 (2009)

    Google Scholar 

  14. Islam, S., Mouratidis, H., Kalloniatis, C., Hudic, A., Zechner, L.: Model based process to support security and privacy requirements engineering. Inter. J. Sec. Softw. Eng. (IJSSE) 3(3), 1–22 (2012)

    Article  Google Scholar 

  15. Mouratidis, H., Kalloniatis, C., Islam, S., Huget, M.P., Gritzalis, S.: Aligning security and privacy to support the development of secure information systems. J. Univ. Comput. Sci. 18(12), 1608–1627 (2012)

    Google Scholar 

  16. He, Q.,  Antón, A.I.: A framework for modeling privacy requirements in role engineering. In: 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ 2003) on Proceedings, pp. 137–146 (2003)

    Google Scholar 

  17. Jensen, C., Tullio, J., Potts, C., Mynatt, E.D.: STRAP: a structured analysis framework for privacy. Georgia Institute of Technology (2005)

    Google Scholar 

  18. Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: 11th IEEE International Requirements Engineering Conference 2003 on Proceedings, pp. 151–161. IEEE (2003)

    Google Scholar 

  19. Horkoff, J., Yu, Y., Eric, S.K.: OpenOME: an open-source goal and agent-oriented model drawing and analysis tool. iStar 766, 154–156 (2011)

    Google Scholar 

  20. Stach, C.,  Steimle, F.: Recommender-based privacy requirements elicitation-EPICUREAN: an approach to simplify privacy settings in IoT applications with respect to the GDPR. In: 34th ACM/SIGAPP Symposium on Applied Computing on Proceedings, pp. 1500–1507. Limassol Cyprus (2019)

    Google Scholar 

  21. Peixoto, M.M.: Privacy Requirements engineering in agile software development: a specification method. In: REFSQ-2020 Workshops on Proceedings, Pisa Italy (2020)

    Google Scholar 

  22. Neureiter, C., Eibl, G., Veichtlbauer, A.,  Engel, D.: Towards a framework for engineering smart-grid-specific privacy requirements. In: IECON 2013–39th Annual Conference of the IEEE Industrial Electronics Society on Proceedings, pp. 4803–4808. IEEE, Vienna Austria (2013)

    Google Scholar 

  23. Gharib, M.,  Mylopoulos, J.: A core ontology for privacy requirements engineering. arXiv preprint arXiv:1811.12621. (2018)

  24. Gharib, M., Giorgini, P.,  Mylopoulos, J.: COPri v. 2 – A core ontology for privacy requirements. Data Knowl. Eng. 133, 101888 (2021)

    Google Scholar 

  25. Wu, X., Zhang, R., Zeng, B., Zhou, S.: A trust evaluation model for cloud computing. Proc. Comput. Sci. 17, 1170–1177 (2013)

    Article  Google Scholar 

  26. Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. Adv. Syst. Appli. 2(1), 1–14 (2013)

    Google Scholar 

  27. Shabalala, M.V., Tarwireyi, P.,  Adigun, M.O.: Privacy monitoring framework for enhancing transparency in cloud computing. In: 6th International Conference on Adaptive Science & Technology (ICAST), pp. 1–7. IEEE (2014)

    Google Scholar 

  28. Salih, R.M.,  Lilien, L. T.: Protecting users’ privacy in healthcare cloud computing with APB-TTP. In: International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 236–238. IEEE (2015)

    Google Scholar 

  29. Polash, F., Shiva, S.: Building trust in cloud: service certification challenges and approaches. In: Ninth International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 187–191. IEEE (2015)

    Google Scholar 

  30. Drucker, N., Gueron, S., Pinkas, B.: Faster secure cloud computations with a trusted proxy. IEEE Secur. Priv. 15(6), 61–67 (2017)

    Article  Google Scholar 

  31. George, J.A., Veni, S., Soomroo, S.: Improving privacy and trust in federated identity using SAML with hash based encryption algorithm. In: 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS), pp. 1–5. IEEE (2017)

    Google Scholar 

  32. Mbanaso, U.M., Chukwudebe, G.A.: Requirement analysis of IoT security in distributed systems. In: 3rd International Conference on Electro-Technology for National Development (NIGERCON), pp. 777–781. IEEE (2017)

    Google Scholar 

  33. Marwan, M., Kartit, A.,  Ouahmane, H.: A cloud-based framework to secure medical image processing. J. Mobile Multimedia, 319–344 (2018)

    Google Scholar 

  34. Tahir, S., Rajarajan, M.: Privacy-preserving searchable encryption framework for permissioned blockchain networks. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1628–1633. IEEE (2018)

    Google Scholar 

  35. Qin, Z., Ye, J., Meng, J., Lu, B., Wang, L.: Privacy-Preserving Blockchain-Based Federated Learning for Marine Internet of Things. IEEE Trans. Comput. Soc. Syst. 9(1), 159–173 (2021)

    Article  Google Scholar 

  36. Basha, S.M., Ahmed, S.T., Iyengar, N.C.S.N.,  Caytiles, R.D.: Inter-locking dependency evaluation schema based on block-chain enabled federated transfer learning for autonomous vehicular systems. In: Second International Conference on Innovative Technology Convergence (CITC), pp. 46–51. IEEE (2021)

    Google Scholar 

Download references

Acknowledgements

figure a

The research project was supported by the Hellenic Foundation for Research and Innovation (H.F.R.I.) under the ‘2nd Call for H.F.R.I. Research Projects to support Faculty Members & Re-searchers’ (Project Number: 2550).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stavros Simou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Simou, S., Mavroeidi, AG., Kalloniatis, C. (2024). Review on Privacy and Trust Methodologies in Cloud Computing. In: Katsikas, S., et al. Computer Security. ESORICS 2023 International Workshops. ESORICS 2023. Lecture Notes in Computer Science, vol 14398. Springer, Cham. https://doi.org/10.1007/978-3-031-54204-6_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-54204-6_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-54203-9

  • Online ISBN: 978-3-031-54204-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics