to select a providers based on certain security proper-
ties. This is especially interesting for finding a suit-
able cloud provider after potential risks of a business
process have been revealed by our approach.
Further work on general IT risk analysis exists.
(Peschke et al., 2011) present the RiskFinder which
is a precursor of our risk analysis component. It
analyses UML models with respect to security rele-
vant vocabulary. Schneider et. al. propose a heuris-
tic search based on Bayesian filters (Schneider et al.,
2011). HeRA realizes a feedback-driven approach
for security analysis during requirements engineering
(Knauss et al., 2009). These approaches provide pow-
erful rules, however, they work only on single words
and do not consider language databases.
An approach to encode and check security re-
quirements in BPMN models has been presented in
(Wolter et al., 2008). However, these requirement fo-
cus only on closed systems and are not eligible for
open processes which are meant to be executed in
cloud environments. Security requirements on ser-
vice orchestration level have been discussed in (Men-
zel et al., 2009).
8 CONCLUSIONS & OUTLOOK
In this paper we have presented our research project
SecureClouds which develops an approach to as-
sist small and medium-sized enterprises for deciding
which of their business processes are eligible to be
outsourced into a cloud computing environment. The
approach is based on three pillars. Firstly, risk anal-
ysis is used to unfold potential risks of business pro-
cesses that are to be outsourced into a cloud environ-
ment. Secondly, compliance analysis allows the en-
terprises to check whether the processes are still com-
pliant after adapting them to cloud environments. Fi-
nally, a security analysis enables the validation of se-
curity properties of cloud-based business processes.
The approach is currently being implemented in a
toolset based on the CARiSMA analysis tool environ-
ment which is a framework to provide a broad collec-
tion of different model-based security analyses.
While the approach presented here only focuses
on the perspective of the users of cloud environments,
it would be interesting to inspect also the business
processes within the cloud provider’s domain. Fur-
thermore, the analysis of cloud environment them-
selves might be interesting for inspecting the influ-
ence of cloud architectures on security properties.
The approach presented here is still in an early
stage of development. It is the result of the first year
of the project SecureClouds. For the second year of
that project, we plan to deepen our research in differ-
ent ways. One major aspect will be the further devel-
opment of the ontologies that we use for risk analysis.
Additional compliance and security checks are also
planned to be implemented. Last but not least, the
most important step we achieve is the evaluation of
our approach in real case study in the logistics domain
together with the enterprise partners of the project.
REFERENCES
BITKOM (2009). Cloud-Computing - Evolution in der
Technik. Technical report, BITKOM.
BSI (2006). IT Basic Protection Catalog. Online: http://
www.bsi.bund.de.
Dixon, J. and Jones, T. (2011). Hype cycle for business
process management. Technical report, Gartner Study.
Gr
¨
auler, M., Martens, and B.; Teuteberg, F. (2011). IT-
Sicherheitsmanagement im Cloud Computing. In Pro-
ceedings INFORMATIK 2011, Germany.
J
¨
urjens, J. (2005). Secure Systems Development with UML.
Springer, 1. edition.
J
¨
urjens, J. and Shabalin, P. (2007). Tools for secure systems
development with UML. In International Journal on
Software Tools for Technology Transfer (STTT), Vol-
ume 9 (5-6): 527-544.
Knauss, E., Lubke, D., and Meyer, S. (2009). Feedback-
driven requirements engineering: The Heuristic Re-
quirements Assistant. In ICSE’09, Washington, DC.
Mell, P. and Grance, T. (2009). Effectively and Securely
Using the Cloud Computing Paradigm.
Menzel, M., Thomas, I., and Meinel, C. (2009). Security re-
quirements specification in service-oriented business
process management. In ARES.
Michel, M. (2011). Konzeption und Umsetzung eines
UMLsecTool-Plugins zur Pr
¨
ufung von Authoriza-
tion Constraints f
¨
ur die Prozessmodellierungssprache
BPMN 2.0. Bachelor thesis, TU Dortmund, Germany.
Peschke, M., Hirsch, M., J
¨
urjens, J., and Braun, S.
(2011). Werkzeuggest
¨
utzte Identifikation von IT-
Sicherheitsrisiken.
Runeson, P., Alexandersson, M., and Nyholm, O. (2007).
Detection of duplicate defect reports using natural lan-
guage processing. In ICSE’07, Washington, DC.
Schneider, K., Knauss, E., Houmb, S., Islam, S., and
J
¨
urjens, J. (2011). Enhancing security requirements
engineering by organizational learning. Requirements
Engineering, pages 1–22.
W. van der Aalst, H. Reijers, A. Weijters, F. van Dongen,
M. Song, H. Verbeck. (2007). Business process min-
ing: An industrial application. Information Systems,
Vol. 32, No. 5.
Wolter, C., Menzel, M., and Meinel, C. (2008). Modelling
security goals in business processes. In Modellierung
2008, Germany.
CLOSER2012-2ndInternationalConferenceonCloudComputingandServicesScience
680