solve S&P problems by the Pattern View. A future
study should verify the contribution on finding
problems in a more complex system and combining
several S&P patterns.
RQ2. Do the S&P solutions by CSPM
effectively improve the system?
The case study examined the results of Pattern View
of CSPM to revise the model. We implemented an
application based on this model as well as the original
model. We confirmed that the problems found in the
target system exist are resolved in the revised version.
Because this case study focused on a simple system,
some components of the cloud system in CSPM were
not considered in this study. It is possible that
additional issues arise in a more complex system.
The effectiveness of the solution of CSPM for a
simple system is confirmed. Additional case studies
are necessary to evaluate the whole metamodel.
RQ3. Are CSPM and the process using
CSPM practical in real cloud system
development and maintenance?
Both the contrast experiment and the case study
followed the proposed process. The results indicate
that CSPM is practical. The contrast experiment
confirmed that some detail usages of CSPM proposed
in this paper are applicable to S&P analysis, while the
case study showed an example of cloud system
development with CSPM.
The participants in EG had some negative
comments. They expressed that the metamodel itself
is not useful. They declared that the guideline is much
more helpful than the model itself. A revised
guideline that includes more usages of CSPM should
make our approach more practical.
Thus, CSPM is practical in some usages. In the
future, creating a guideline to describe its usages
should increase the applicability of CSPM.
4 CONCLUSION AND FUTURE
WORK
We proposed a metamodel, CSPM, to address
security and privacy in cloud services as well as a
process to use CSPM in development. Two case
studies were conducted to verify the effectiveness and
usability of CSPM.
In the future, we plan to conduct more complex
case studies such as designing a cloud system
containing several layers based on CSPM and
implementing them to evaluate our approach. We also
plan to utilize the Vulnerability View and the Pattern
View via a semi-automatically applied pattern if a
specific threat is detected. Another future work will
involve developing detailed guidelines for CSPM to
expand its usage, allowing more developers,
especially newcomers, to apply our approach.
ACKNOWLEDGEMENTS
We are grateful to the participants in the contrast
experiment.
REFERENCES
D. Riehle and H. Zullighoven, 1996, “Understanding and
Using Patterns in Software Development,” Theory and
Practice of Object Systems, Vol.2, No.1, pp.3-13.
K. Hashizume, N. Yoshioka and E.B. Fernandez, 2011,
“Misuse Patterns for Cloud Computing,” 2nd Asian
Conference on Pattern Languages of Programs
(AsianPLoP’11).
K. Hashizume, N. Yoshioka and E.B. Fernandez,2013,
“Three Misuse Patterns for Cloud Computing,” in
“Security Engineering for Cloud Computing:
Approaches and Tools,” IGI Global.
E. B. Fernandez, et al, 2015, “Building a security reference
architecture for cloud systems,” Requirements
Engineering Journal
A. Hazeyama, 2012, “Survey on Body of Knowledge
Regarding Software Security”, 13th ACIS International
Conference on Software Engineering, Artificial
Intelligence
Kleopatra Chatziprimou, Kevin Lano, and Steffen Zschaler,
2013, "Towards a Meta-model of the Cloud Computing
Resource Landscape." MODELSWARD.
C. Kalloniatis, E. Kavakli and S. Gritzalis,2008,
“Addressing privacy requirements in system design: the
PriS method,” Requirements Engineering, Vol.13
H. Washizaki, et al., 2016, “A Metamodel for Security and
Privacy Knowledge in Cloud Services,” Proc. 12th
IEEE World Congress on Services (SERVICES 2016)
S. Subashini and V. Kavitha, 2011, “A survey on security
issues in service delivery models of cloud computing,”
Journal of Network and Computer Applications,
Vol.34, No.1, pp.1–11, 2011.
A.A. Almutairi, et al., 2012, “A Distributed Access Control
Architecture for Cloud Computing,” IEEE Software,
Vol. 29, No. 2, pp.36-44
E.B. Fernandez, N. Yoshioka, H. Washizaki, et al., 2010,
“Using security patterns to develop secure systems”, in
“Software Engineering for Secure Systems”, IGI
Global, pp16-31
L.L. Lobato, E.B. Fernandez and S.D. Zorzo, 2009,
“Patterns to support the development of privacy
policies”, International Conference on Availability,
Reliability and Security (ARES’09).
MODELSWARD 2018 - 6th International Conference on Model-Driven Engineering and Software Development
386