ABSTRACT
In this extended abstract, we consider one important aspect of security: the protection of sensitive data from unauthorized access. We argue that (i) self-adaptation may facilitate the efficient protection of sensitive data; (ii) data protection has peculiar properties that make its treatment different from other quality attributes; and (iii) data protection should be considered in combination with other quality attributes like performance and costs.
- Rogério de Lemos, David Garlan, Carlo Ghezzi, Holger Giese, Jesper Andersson, Marin Litoiu, Bradley Schmerl, Danny Weyns, Luciano Baresi, and Nelly Bencomo. 2017. Software engineering for self-adaptive systems: Research challenges in the provision of assurances. In Software Engineering for Self-Adaptive Systems III.Google Scholar
- Antonio Filieri, Henry Hoffmann, and Martina Maggio. 2015. Automated Multi-objective Control for Self-Adaptive Software Design. In Proceedings of the 10th Joint Meeting on Foundations of Software Engineering. 13--24. Google ScholarDigital Library
- Carlo Ghezzi, Leandro Sales Pinto, Paola Spoletini, and Giordano Tamburrelli. 2013. Managing Non-functional Uncertainty via Model-Driven Adaptivity. In Proceedings of the 35th International Conference on Software Engineering. 33--42. Google ScholarDigital Library
- Meiko Jensen. 2013. Challenges of privacy protection in big data analytics. In IEEE International Congress on Big Data. IEEE, 235--238. Google ScholarDigital Library
- Zoltán Ádám Mann and Andreas Metzger. 2017. Optimized cloud deployment of multi-tenant software considering data protection concerns. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, 609--618. Google ScholarDigital Library
- Zoltán Ádám Mann, Andreas Metzger, and Stefan Schoenen. 2018. Towards a run-time model for data protection in the cloud. In Modellierung 2018. 71--86.Google Scholar
- Gabriel A. Moreno, Javier Cámara, David Garlan, and Bradley Schmerl. 2016. Efficient decision-making under uncertainty for proactive self-adaptation. In IEEE International Conference on Autonomic Computing. 147--156.Google ScholarCross Ref
- Inah Omoronyia, Luca Cavallaro, Mazeiar Salehie, Liliana Pasquale, and Bashar Nuseibeh. 2013. Engineering adaptive privacy: on the role of privacy awareness requirements. In Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, 632--641. Google ScholarDigital Library
- Liliana Pasquale, Carlo Ghezzi, Claudio Menghi, Christos Tsigkanos, and Bashar Nuseibeh. 2014. Topology aware adaptive security. In Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. ACM, 43--48. Google ScholarDigital Library
- Eric Schmieders, Andreas Metzger, and Klaus Pohl. 2015. Runtime model-based privacy checks of big data cloud services. In International Conference on Service-Oriented Computing. Springer, 71--86.Google ScholarCross Ref
- Stefan Schoenen, Zoltán Ádám Mann, and Andreas Metzger. 2017. Using risk patterns to identify violations of data protection policies in cloud systems. In 13th Intl. Workshop on Engineering Service-Oriented Applications and Cloud Services.Google Scholar
- Marten Van Dijk and Ari Juels. 2010. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Proceedings of the 5th USENIX Conference on Hot Topics in Security. 1--8. Google ScholarDigital Library
Recommendations
Data protection in outsourcing scenarios: issues and directions
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications SecurityData outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their storage, management, and dissemination. Although data outsourcing provides ...
Data quality, sensitive data and joint controllership as examples of grey areas in the existing data protection framework for the Internet of Things
'The technology used to provide connectivity from anytime, any place and for anyone. Now anything can be added to the list.'1 In the Internet of Things ('IoT'), the amount of individuals? data collected and processed is increasing substantially as data ...
The EU General Data Protection Regulation and its Effects on Designing Assistive Environments
PETRA '18: Proceedings of the 11th PErvasive Technologies Related to Assistive Environments ConferenceOn the 25th of May 2018 the EU will start to enforce the General Data Protection Regulation (EU-GDPR)[3]. This new regulation will replace the old Data Protection Act from 1998 and will disrupt common data processing practices. While the new regulation ...
Comments