Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 May 19;24(10):3227.
doi: 10.3390/s24103227.

Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE)

Affiliations

Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE)

Angeliki Kitsiou et al. Sensors (Basel). .

Abstract

This paper presents a novel approach to address the challenges of self-adaptive privacy in cloud computing environments (CCE). Under the Cloud-InSPiRe project, the aim is to provide an interdisciplinary framework and a beta-version tool for self-adaptive privacy design, effectively focusing on the integration of technical measures with social needs. To address that, a pilot taxonomy that aligns technical, infrastructural, and social requirements is proposed after two supplementary surveys that have been conducted, focusing on users' privacy needs and developers' perspectives on self-adaptive privacy. Through the integration of users' social identity-based practices and developers' insights, the taxonomy aims to provide clear guidance for developers, ensuring compliance with regulatory standards and fostering a user-centric approach to self-adaptive privacy design tailored to diverse user groups, ultimately enhancing satisfaction and confidence in cloud services.

Keywords: cloud computing environments; developer insights; information disclosure; privacy; protection strategies; self-adaptive; sociotechnical requirements.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflicts of interest.

Figures

Figure 1
Figure 1
Cross-sectional empirical mixed-methods Research Design.

References

    1. Islam S., Mouratidis H., Weippl E.R. Security Engineering for Cloud Computing. IGI Global; Hershey, PA, USA: 2013. A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System; pp. 97–122. - DOI
    1. Peras D., Mekovec R. A conceptualization of the privacy concerns of cloud users. Inf. Comput. Secur. 2022;30:653–671. doi: 10.1108/ics-11-2021-0182. - DOI
    1. Cook A., Robinson M., Ferrag M.A., Maglaras L.A., He Y., Jones K., Janicke H. Cloud Computing for Optimization: Foundations, Applications, and Challenges. Springer International Publishing; Berlin/Heidelberg, Germany: 2018. Internet of Cloud: Security and Privacy Issues; pp. 271–301. - DOI
    1. Belk M., Fidas C., Athanasopoulos E., Pitsillides A. Adaptive and Personalized Privacy and Security (APPS 2019): Workshop Chairs’ Welcome and Organization; Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization; Larnaca, Cyprus. 9–12 June 2019; - DOI
    1. Kitsiou A., Pantelelis M., Mavroeidi A.G., Sideri M., Simou S., Vgena A., Tzortzaki E., Kalloniatis C. Self-Adaptive Privacy in Cloud Computing: An overview under an interdisciplinary spectrum; Proceedings of the 26th Pan-Hellenic Conference on Informatics; Athens, Greece. 25–27 November 2022; - DOI

LinkOut - more resources