{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:25:21Z","timestamp":1765887921565,"version":"3.41.2"},"reference-count":50,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T00:00:00Z","timestamp":1510531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2017,11,13]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system design, with the addition of privacy-aware cloud-based concepts to assist analysts to reason and model about privacy in cloud environments.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>An analysis of previous findings on the file of cloud privacy based on previous work has been conducted and a set of privacy-related concepts that need to be considered during privacy analysis for cloud-based systems have been revealed. These concepts were used for extending the conceptual model of PriS.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The main finding of the paper is the design of a new, novel conceptual model that assists analysts and designers in reasoning about privacy in cloud environments. A new template using the JSON (Javascript notation object) format has been introduced for better expressing the privacy requirements along with the related concepts presented through the conceptual model, thus letting the developers to better understand the findings during the design stage and better guide them to the implementation of the respective solution.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The design of a cloud-based process that will guide analysts in detail for eliciting and modelling the identified privacy-related requirements is the limitation and in parallel the next step of the specific work presented here.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The conceptual model has been applied on a real case scenario regarding its efficiency on capturing and mapping all necessary concepts for assisting analysts proceed with the design of the privacy-aware system. The results were positive, all concepts were easy to use and totally understandable from the design team and the stakeholders and the use of the JSON template received very positive comments, especially from the developer\u2019s team.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The paper presents a novel conceptual model for reasoning about privacy requirements in the cloud. The applicability of the proposed model has also been tested on a real case study.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-06-2016-0044","type":"journal-article","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T19:12:43Z","timestamp":1507057963000},"page":"614-633","source":"Crossref","is-referenced-by-count":19,"title":["Incorporating privacy in the design of cloud-based systems: a conceptual meta-model"],"prefix":"10.1108","volume":"25","author":[{"given":"Christos","family":"Kalloniatis","sequence":"first","affiliation":[]}],"member":"140","reference":[{"first-page":"136","article-title":"Goal-based requirements analysis","year":"1996","key":"key2020120422182437400_ref001"},{"first-page":"29","article-title":"Strategies for developing policies and requirements for secure electronic commerce systems","year":"2001","key":"key2020120422182437400_ref002"},{"article-title":"Opinion 05\/2012 on cloud computing","year":"2012","author":"Article 29 Data Protection Working Party","key":"key2020120422182437400_ref003"},{"first-page":"93","article-title":"Design for privacy in ubiquitous computing environments","year":"1993","key":"key2020120422182437400_ref004"},{"volume-title":"Privacy: What Developers and IT Professionals Should Know","year":"2004","key":"key2020120422182437400_ref005"},{"first-page":"234","article-title":"Dealing with security requirements during the development of information systems","year":"1993","key":"key2020120422182437400_ref006"},{"key":"key2020120422182437400_ref007","article-title":"Top threats to cloud computing results update 2012","volume-title":"Cloud Security Alliance","author":"CSA Threats","year":"2012"},{"volume-title":"EU Directive for Security Issues in Cloud Computing","year":"2012","author":"Draft EU","key":"key2020120422182437400_ref008"},{"article-title":"IT-Security and privacy, design and use of privacy enhancing security mechanisms","volume-title":"Lecture Notes in Computer Science","year":"2001","key":"key2020120422182437400_ref009"},{"first-page":"275","article-title":"The characteristics of cloud computing","year":"2010","key":"key2020120422182437400_ref010"},{"issue":"3","key":"key2020120422182437400_ref011","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1108\/09685220410542615","article-title":"Enhancing web privacy and anonymity in the digital era","volume":"12","year":"2004","journal-title":"Information Management & Computer Security"},{"issue":"7","key":"key2020120422182437400_ref012","first-page":"769","article-title":"A pattern language for developing privacy enhancing technologies","volume":"43","year":"2013","journal-title":"Software: Practice and Experience"},{"issue":"1","key":"key2020120422182437400_ref013","first-page":"1","article-title":"An analysis of security issues for cloud computing","volume":"4","year":"2013","journal-title":"Journal of Internet Services and Applications"},{"first-page":"115","article-title":"A framework for modelling privacy requirements in role engineering","year":"2003","key":"key2020120422182437400_ref014"},{"year":"2004","key":"key2020120422182437400_ref015","article-title":"Privacy risk models for designing privacy-sensitive ubiquitous computing systems"},{"issue":"1","key":"key2020120422182437400_ref016","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s00766-009-0093-9","article-title":"Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec","volume":"15","year":"2010","journal-title":"Requirements Engineering Journal"},{"key":"key2020120422182437400_ref017","article-title":"Methodologies and tools for building intelligent collaboration and transaction environments in public administration networks","volume-title":"Project Deliverable D 3.1b","author":"ICTE-PAN","year":"2005"},{"first-page":"255","article-title":"Toward a framework to elicit and manage security and privacy requirements from laws and regulation","year":"2010","key":"key2020120422182437400_ref018"},{"key":"key2020120422182437400_ref019","first-page":"97","article-title":"A goal-driven risk management approach to support security and privacy analysis of cloud-based system","volume-title":"Security Engineering for Cloud Computing: Approaches and Tools","year":"2012"},{"key":"key2020120422182437400_ref020","article-title":"Privacy in cloud computing","volume-title":"International Telecommunications Union","author":"ITU Technology Watch","year":"2012"},{"key":"key2020120422182437400_ref021","unstructured":"Jensen, C., Tullio, J., Potts, C. and Mynatt, D.E. (2005), \u201cSTRAP: a structured analysis framework for privacy\u201d, GVU Technical Report."},{"year":"2005","key":"key2020120422182437400_ref022","article-title":"PriS methodology: incorporating privacy requirements into the system design process"},{"issue":"3","key":"key2020120422182437400_ref023","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","article-title":"Addressing privacy requirements in system design: the PriS method","volume":"13","year":"2008","journal-title":"Requirements Engineering Journal"},{"first-page":"913","article-title":"PriS Tool: a case tool for privacy-oriented RE","year":"2009","key":"key2020120422182437400_ref024"},{"year":"2013","key":"key2020120422182437400_ref025","article-title":"Migrating into the cloud: identifying the major security and privacy concerns"},{"issue":"4","key":"key2020120422182437400_ref026","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/j.csi.2013.12.010","article-title":"Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts","volume":"36","year":"2014","journal-title":"Computer Standards and Interfaces"},{"year":"2004","key":"key2020120422182437400_ref027","article-title":"Privacy enhancing technologies"},{"key":"key2020120422182437400_ref028","unstructured":"Liu, L., Yu, E. and Mylopoulos, J. (2002), \u201cAnalyzing security requirements as relationships among strategic actors\u201d, paper presented at the Symposium on Requirements Engineering for Information Security (SREIS\u201902), Raleigh, NC."},{"first-page":"151","article-title":"Security and privacy requirements analysis within a social setting","year":"2003","key":"key2020120422182437400_ref029"},{"key":"key2020120422182437400_ref030","first-page":"67","article-title":"From information modelling to enterprise modelling","volume-title":"IS Engineering: State of the Art and Research Themes","year":"2000"},{"first-page":"123","article-title":"Enterprise knowledge management and conceptual modelling","year":"1999","key":"key2020120422182437400_ref031"},{"year":"2013","key":"key2020120422182437400_ref032","article-title":"Privacy in the cloud: bridging the gap between design and implementation"},{"issue":"1","key":"key2020120422182437400_ref033","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s00766-009-0089-5","article-title":"Evaluating existing security and privacy requirements for legal compliance","volume":"15","year":"2010","journal-title":"Requirements Engineering Journal"},{"year":"2016","key":"key2020120422182437400_ref034","article-title":"APPARATUS: reasoning about security requirements in the internet of things"},{"key":"key2020120422182437400_ref035","unstructured":"Microsoft Technical report (2009), Privacy in the Cloud Computing Era, a Microsoft Perspective, Microsoft Corp, Redmond, November (accessed 10 May 2016)."},{"key":"key2020120422182437400_ref036","unstructured":"Moffett, D.J. and Nuseibeh, A.B. (2003), A Framework for Security Requirements Engineering Report YCS 368, Department of Computer Science, University of York."},{"issue":"2","key":"key2020120422182437400_ref037","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1142\/S0218194007003240","article-title":"Secure tropos: a security-oriented extension of the tropos methodology","volume":"17","year":"2007","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"issue":"12","key":"key2020120422182437400_ref038","first-page":"1608","article-title":"Aligning security and privacy to support the development of secure information systems","volume":"18","year":"2012","journal-title":"Journal of Universal Computer Science"},{"first-page":"5","article-title":"Dark clouds on the horizon: using cloud storage as attack vector and online slack space","year":"2011","key":"key2020120422182437400_ref039"},{"issue":"6","key":"key2020120422182437400_ref040","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/32.142871","article-title":"Representing and using non-functional requirements: a process oriented approach","volume":"18","year":"1992","journal-title":"IEEE Transactions on Software Engineering"},{"article-title":"Privacy, security and trust in cloud computing","volume-title":"Computer Communications and Networks","year":"2013","key":"key2020120422182437400_ref041"},{"first-page":"693","article-title":"Privacy, security and trust issues arising from cloud computing","year":"2010","key":"key2020120422182437400_ref042"},{"year":"2010","key":"key2020120422182437400_ref043","article-title":"A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management"},{"volume-title":"Anonymity, Privacy and Security Online","year":"2013","key":"key2020120422182437400_ref044"},{"first-page":"12:1","article-title":"Privacy patterns for online interactions","year":"2006","key":"key2020120422182437400_ref045"},{"issue":"1","key":"key2020120422182437400_ref046","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","article-title":"Eliciting security requirements with misuse cases","volume":"10","year":"2005","journal-title":"Requirements Engineering Journal"},{"year":"1973","author":"The Code of Fair Information Practices","key":"key2020120422182437400_ref047"},{"key":"key2020120422182437400_ref048","unstructured":"TRUSTe: US Consumer Confidence Privacy Report (2014), available at: www.truste.com\/us-consumer-confidence-index-2014\/ (accessed 19 April 2016)."},{"issue":"10","key":"key2020120422182437400_ref049","doi-asserted-by":"crossref","first-page":"978","DOI":"10.1109\/32.879820","article-title":"Handling obstacles in goal-oriented requirements engineering","volume":"26","year":"2000","journal-title":"IEEE Transactions on Software Engineering"},{"first-page":"91","article-title":"Managing security of virtual machine images in a cloud environment","year":"2009","key":"key2020120422182437400_ref050"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-06-2016-0044\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-06-2016-0044\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:58Z","timestamp":1753406578000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/25\/5\/614-633\/189088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,13]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,11,13]]}},"alternative-id":["10.1108\/ICS-06-2016-0044"],"URL":"https:\/\/doi.org\/10.1108\/ics-06-2016-0044","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2017,11,13]]}}}