6 RELATED WORK
The fulfillment of compliance and security require-
ments in business processes is essential to receive ac-
ceptance from customers. An approach to encode
and check security requirements in BPMN models has
been presented Wolter et. al. (Wolter et al., 2008).
However, these requirements focus only on closed
systems.
Cloud computing, which has lasted on the peak
of Gartner’s technology hype cycle (Dixon and Jones,
2011) for quite a while now, leads to outsourcing of
processes into heterogeneous environments. The use
of cloud computing technologies offers economic po-
tential for small and medium-sized enterprises. How-
ever, serious doubts wrt. security and compliance ex-
ist (BITKOM, 2009). Hence, security approaches
for closed systems are not eligible here. Menzel
et. al. (Menzel et al., 2009) propose an approach to
define security requirements on service orchestration
level.
CloudCycle
3
is a project related to our approach.
It focuses on cloud providers and offers services that
allow them to guarantee their customers that they are
compliant with security policies and further regula-
tions. The approach of CloudCycle is a suitable com-
plement for our approach. Once business processes
are successfully outsourced into the cloud their secu-
rity and compliance can be monitored.
Ontologies for cloud computing and cloud secu-
rity have been presented by Gr
¨
auler et. al. (Gr
¨
auler
et al., 2011). They analyzed the different sources of
risks within cloud computing environments and man-
ifested them in an ontology. Based on that ontology,
they provide a database of cloud providers that allows
users to select a provider based on certain security
properties. This is especially interesting for finding a
suitable cloud provider after potential risks of a busi-
ness process have been revealed by our approach.
Tsoumas and Gritzalis provide an ontology-based
approach to organize security knowledge (Tsoumas
and Gritzalis, 2006). It is designed to enable reuse
of knowledge and map requirements to implemented
controls of a system. A similar approach to formal-
ize security knowledge has been presented by Fenz
and Ekelhart (Fenz and Ekelhart, 2009). It focuses
on representing security domain knowledge and cor-
porate knowledge in an ontology. While we pro-
vide a systematic approach to represent the regula-
tory documents and to extract security or compli-
ance requirements, the above-mentioned approaches
consider only the modeling resulting security knowl-
edge. It would be interesting to consider an integra-
3
http://www.cloudcycle.org
tion of those approaches such that they could be used
to represent the knowledge that is extracted by our ap-
proach.
Peschke et. al. (Peschke et al., 2011) present the
RiskFinder which is a precursor of our risk analysis
component. It analyses UML models with respect to
security relevant vocabulary. Schneider et. al. propose
a heuristic search based on Bayesian filters (Schneider
et al., 2011). HeRA realizes a feedback-driven ap-
proach for security analysis during requirements en-
gineering (Knauss et al., 2009). These approaches
provide powerful rules, however, they work only on
single words and do not consider language databases.
Our view of IT security risks corresponds to the
use in the BSI IT-Grundschutz Catalogues (Bunde-
samt f
¨
ur Sicherheit in der Informationstechnik, 2006),
which does not include concrete values for probabil-
ities and possible extend of damage (or benefit) of
risks. In the terminology defined by other standards,
this information is included, e.g. in the ISO 27000
series (ISO, 2008) and NIST standard 800-39 (NIST
and Aroms, 2012).
7 CONCLUSIONS & OUTLOOK
When outsourcing existing or new processes into
cloud environments, problems regarding security and
compliance still represent major obstacles. The
methodology described in this paper aims at support-
ing users in examining models of their systems and
processes for potential risks. While a completely au-
tomated analysis still appears far from feasible, our
approach and tools can aid in highlighting aspects that
require further examination, either manually or tool-
supported.
Using ontologies, one can take advantage of a very
flexible, yet formalized, way of representing informa-
tion, making it accessible for automated procedures.
To further develop our concept, several points
seem worth considering. Those include enhancement
of tool-support, improvement of existing heuristics
for the detection of matchings as well as support for
established methods in knowledge systems, e.g. auto-
mated reasoning.
REFERENCES
Baader, F., Calvanese, D., McGuinness, D. L., Nardi, D.,
and Patel-Schneider, P. F., editors (2003). The descrip-
tion logic handbook: theory, implementation, and ap-
plications. Cambridge University Press, New York,
NY, USA.
CLOSER2013-3rdInternationalConferenceonCloudComputingandServicesScience
560