Skip to main content

Analyzing Requirements Engineering for Cloud Computing

  • Chapter
  • First Online:

Abstract

Cloud computing is a business paradigm, where cloud providers offer resources (e.g., storage, computing, network) and cloud consumers use them after accepting a specific service level agreement. Cloud requirements can rapidly change over time, so organizations need to count with rapid methods to elicit, analyze, specify, verify, and manage dynamic requirements in a systematic and repeatable way. The existing works of this field are generally focused in a limited number of requirements and capabilities for cloud services. This chapter aims to provide a comprehensive and systematic literature review of academic researches done in requirements engineering for cloud computing area. During this study, some approaches for cloud computing were found that considered a limited number of characteristics (e.g., security, privacy, performance) and few activities involving diverse stakeholders. Generally, cloud stakeholders have got neither guidelines nor standards to manage multiple aspects of services in cloud environments. Thus, a literature review was first conducted and five dimensions are discussed (i.e., Contractual, Compliance, Financial, Operational, and Technical) in order to classify cloud characteristics, specify requirements, and support cloud contracts. Different specialists and experts may be requested to evaluate particular dimensions in the service level agreement and cloud service adoption. Finally, a simple sample is given to illustrate how to identify the cloud dimensions.

Keywords

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
EUR   29.95
Price includes VAT (Finland)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR   85.59
Price includes VAT (Finland)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR   109.99
Price includes VAT (Finland)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
EUR   109.99
Price includes VAT (Finland)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.nist.gov/.

  2. 2.

    http://www.cloud-council.org/.

  3. 3.

    http://www.computer.org/web/ieee-cloud-computing/standards/.

  4. 4.

    http://www.cloud-council.org/.

References

  1. Wiegers, K., Beatty, J. (2013). Software requirements. Pearson Education.

    Google Scholar 

  2. Repschlaeger, J., Zarnekow, R., Wind, S., Turowski, K. (2012). Cloud Requirement Framework: Requirements and Evaluation Criteria to Adopt Cloud solutions. In European Conference on Information Systems (ECIS) (p. 42).

    Google Scholar 

  3. Zardari, S., Bahsoon, R. (2011). Cloud adoption: a goal-oriented requirements engineering approach. In Proceedings of the 2nd International Workshop on Software Engineering for Cloud Computing (pp. 29–35). ACM.

    Google Scholar 

  4. Todoran, I., Seyff, N., Glinz, M. (2013). How cloud providers elicit consumer requirements: An exploratory study of nineteen companies. In 2013 21st IEEE International Requirements Engineering Conference (RE) (pp. 105–114). IEEE.

    Google Scholar 

  5. Kitchenham, B. (2004). Procedures for performing systematic reviews. Keele, UK, Keele University, 33(2004), 1–26.

    Google Scholar 

  6. Mell, P., Grance, T. (2011). The NIST Definition of Cloud Computing (Draft). NIST Special Publication, 800–145:1–6, 145.

    Google Scholar 

  7. Vaquero, L. M., Rodero-Merino, L., Caceres, J., Lindner, M. (2008). A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50–55.

    Google Scholar 

  8. Iankoulova, I., Daneva, M. (2012). Cloud computing security requirements: A systematic review. In 2012 Sixth International Conference on Research Challenges in Information Science (RCIS) (pp. 1–7). IEEE.

    Google Scholar 

  9. Abran, A., Bourque, P., Dupuis, R., Moore, J. W. (2001). Guide to the software engineering body of knowledge-SWEBOK. IEEE Press.

    Google Scholar 

  10. Pohl, K. (2010). Requirements engineering: fundamentals, principles, and techniques. Springer Publishing Company, Incorporated.

    Google Scholar 

  11. Flores, F., Mora, M., Álvarez, F., Garza, L., Duran, H. (2010). Towards a systematic service-oriented requirements engineering process (S-SoRE). In International Conference on ENTERprise Information Systems (pp. 111–120). Springer Berlin Heidelberg.

    Google Scholar 

  12. Rimal, B. P., Jukan, A., Katsaros, D., Goeleven, Y. (2011). Architectural requirements for cloud computing systems: an enterprise cloud approach. Journal of Grid Computing, 9(1), 3–26.

    Google Scholar 

  13. Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S. (2013). A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software, 86(9), 2276–2293.

    Google Scholar 

  14. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), pp. 50–58.

    Google Scholar 

  15. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599–616.

    Google Scholar 

  16. Schrödl, H., Wind, S. (2011). Requirements engineering for cloud computing. Journal of Communication and Computer, 8(9), 707–715.

    Google Scholar 

  17. Sriram, I., Khajeh-Hosseini, A. (2010). Research agenda in cloud technologies.

    Google Scholar 

  18. Klems, M., Nimis, J., Tai, S. (2008). Do clouds compute? a framework for estimating the value of cloud computing. In Workshop on E-Business (pp. 110–123). Springer Berlin Heidelberg.

    Google Scholar 

  19. Mazher, N., Ashraf, I. (2014). A Systematic Mapping Study on Cloud Computing Security. International Journal of Computer Applications, 89(16):6–9.

    Google Scholar 

  20. El-Gazzar, R. F. (2014). A literature review on cloud computing adoption issues in enterprises. In International Working Conference on Transfer and Diffusion of IT (pp. 214–242). Springer Berlin Heidelberg.

    Google Scholar 

  21. Pfarr, F., Buckel, T., Winkelmann, A. (2014). Cloud Computing Data Protection–A Literature Review and Analysis. In 2014 47th Hawaii International Conference on System Sciences (pp. 5018–5027). IEEE.

    Google Scholar 

  22. Benslimane, Y., Plaisent, M., Bernard, P., Bahli, B. (2014). Key Challenges and Opportunities in Cloud Computing and Implications on Service Requirements: Evidence from a Systematic Literature Review. In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on (pp. 114–121). IEEE.

    Google Scholar 

  23. Latif, R., Abbas, H., Assar, S., Ali, Q. (2014). Cloud computing risk assessment: a systematic literature review. In Future Information Technology (pp. 285–295). Springer Berlin Heidelberg.

    Google Scholar 

  24. Zapata, B. C., Alemán, J. L. F., Toval, A. (2015). Security in cloud computing: A mapping study. Comput. Sci. Inf. Syst., 12(1), 161–184.

    Google Scholar 

  25. da Silva, F. A. P., Neto, P. A. D. M. S., Garcia, V. C., Assad, R. E., Trinta, F. A. M. (2012). Accounting models for cloud computing: A systematic mapping study. In Proceedings of the International Conference on Grid Computing and Applications (GCA) (pp. 3–9). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

    Google Scholar 

  26. Abdelmaboud, A., Jawawi, D. N., Ghani, I., Elsafi, A., Kitchenham, B. (2015). Quality of service approaches in cloud computing: A systematic mapping study. Journal of Systems and Software, 101, 159–179.

    Google Scholar 

  27. Lehrig, S., Eikerling, H., Becker, S. (2015). Scalability, elasticity, and efficiency in cloud computing: A systematic literature review of definitions and metrics. In Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures (pp. 83–92). ACM.

    Google Scholar 

  28. Jula, A., Sundararajan, E., Othman, Z. (2014). Cloud computing service composition: A systematic literature review. Expert Systems with Applications, 41(8), 3809–3824.

    Google Scholar 

  29. Grance, T., Patt-Corner, R., Voas, J. B. (2012). Cloud Computing Synopsis and Recommendations. NIST Special Publication, 800–146.

    Google Scholar 

  30. Kourtesis, D., Bratanis, K., Friesen, A., Verginadis, Y., Simons, A. J., Rossini, A., Schwichtenberg, A. and Gouvas, P. (2013). Brokerage for quality assurance and optimisation of cloud services: An analysis of key requirements. In International Conference on Service-Oriented Computing (pp. 150–162). Springer International Publishing.

    Google Scholar 

  31. Beckers, K., Côté, I., Goeke, L., Güler, S., Heisel, M. (2014). A structured method for security requirements elicitation concerning the cloud computing domain. International Journal of Secure Software Engineering (IJSSE), 5(2), 20-43.

    Google Scholar 

  32. Jhawar, R., Piuri, V., Samarati, P. (2012). Supporting security requirements for resource management in cloud computing. In Computational Science and Engineering (CSE), 2012 IEEE 15th International Conference on (pp. 170–177). IEEE.

    Google Scholar 

  33. Muller, I., Han, J., Schneider, J. G., Versteeg, S. (2011). Tackling the Loss of Control: Standards-based Conjoint Management of Security Requirements for Cloud Services. In Cloud Computing (CLOUD), 2011 IEEE International Conference on (pp. 573–581). IEEE.

    Google Scholar 

  34. Clarke, R. (2010). User requirements for cloud computing architecture. In Cluster, Cloud and Grid Computing (CCGrid), 2010 10th IEEE/ACM International Conference on (pp. 625–630). IEEE.

    Google Scholar 

  35. Moyano, F., Fernandez-Gago, C., Lopez, J. (2013). A framework for enabling trust requirements in social cloud applications. Requirements Engineering, 18(4), 321–341.

    Google Scholar 

  36. Zhou, X., Yi, L., Liu, Y. (2011). A collaborative requirement elicitation technique for SaaS applications. In Service Operations, Logistics, and Informatics (SOLI), 2011 IEEE International Conference on (pp. 83–88). IEEE.

    Google Scholar 

  37. Beckers, K., Heisel, M., Côté, I., Goeke, L., Güler, S. (2013). Structured pattern-based security requirements elicitation for clouds. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on (pp. 465–474). IEEE.

    Google Scholar 

  38. Gordon, D. G., Breaux, T. D. (2011). Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop (pp. 83–94). ACM.

    Google Scholar 

  39. Humberg, T., Wessel, C., Poggenpohl, D., Wenzel, S., Ruhroth, T., Jürjens, J. (2013). Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes. In International Conference on Cloud Computing and Services Science (pp. 36–51). Springer International Publishing.

    Google Scholar 

  40. Kousiouris, G., Vafiadis, G., Corrales, M. (2013). A Cloud provider description schema for meeting legal requirements in cloud federation scenarios. In Conference on e-Business, e-Services and e-Society (pp. 61–72). Springer Berlin Heidelberg.

    Google Scholar 

  41. Beckers, K., Côté, I., Goeke, L. (2014). A catalog of security requirements patterns for the domain of cloud computing systems. In Proceedings of the 29th Annual ACM Symposium on Applied Computing (pp. 337–342). ACM.

    Google Scholar 

  42. Ficco, M., Palmieri, F., Castiglione, A. (2015). Modeling security requirements for cloud based system development. Concurrency and Computation: Practice and Experience, 27(8), 2107–2124.

    Google Scholar 

  43. Guesmi, A., Clemente, P. (2013). Access control and security properties requirements specification for clouds’ seclas. In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 1, pp. 723–729). IEEE.

    Google Scholar 

  44. Kalloniatis, C., Mouratidis, H., Islam, S. (2013). Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering, 18(4), 299–319.

    Google Scholar 

  45. Liccardo, L., Rak, M., Di Modica, G., Tomarchio, O. (2012). Ontology-based Negotiation of security requirements in cloud. In Computational Aspects of Social Networks (CASoN), 2012 Fourth International Conference on (pp. 192–197). IEEE.

    Google Scholar 

  46. Naveed, R., Abbas, H. (2014). Security Requirements Specification Framework for Cloud Users. In Future Information Technology (pp. 297–305). Springer Berlin Heidelberg.

    Google Scholar 

  47. Sun, Y. L., Harmer, T., Stewart, A. (2012). Specifying cloud application requirements: an ontological approach. In International Conference on Cloud Computing (pp. 82–91). Springer International Publishing.

    Google Scholar 

  48. Tariq, A., Khan, S. A., Iftikhar, S. (2014). Requirements Engineering process for Software-as-a-Service (SaaS) cloud environment. In Emerging Technologies (ICET), 2014 International Conference on (pp. 13–18). IEEE.

    Google Scholar 

  49. Iwashita, M., Tanimoto, S., Fujinoki, Y. (2013). Approaches to analyze requirements of billing management for cloud computing services. In Computer and Information Science (ICIS), 2013 IEEE/ACIS 12th International Conference on (pp. 17–22). IEEE.

    Google Scholar 

  50. Vassev, E., Hinchey, M. (2014). Autonomy requirements engineering for self-adaptive science clouds. In Parallel & Distributed Processing Symposium Workshops (IPDPSW), 2014 IEEE International (pp. 1344–1353). IEEE.

    Google Scholar 

  51. Bochicchio, M. A., Longo, A., Mansueto, C. (2011). Cloud services for SMEs: Contract Management’s requirements specification. In 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops (pp. 145–152). IEEE.

    Google Scholar 

  52. Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of systems and software, 80(4), 571–583.

    Google Scholar 

  53. Repschlaeger, J., Wind, S., Zarnekow, R., Turowski, K. (2012). A reference guide to cloud computing dimensions: infrastructure as a service classification framework. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 2178–2188). IEEE.

    Google Scholar 

  54. Pichan, A., Lazarescu, M., Soh, S. T. (2015). Cloud forensics: technical challenges, solutions and comparative analysis. Digital Investigation, 13, 38–57.

    Google Scholar 

  55. Carroll, M., Van Der Merwe, A., Kotze, P. (2011). Secure cloud computing: Benefits, risks and controls. In 2011 Information Security for South Africa (pp. 1–9). IEEE.

    Google Scholar 

  56. Andrikopoulos, V., Binz, T., Leymann, F., Strauch, S. (2013). How to adapt applications for the Cloud environment. Computing, 95(6), 493–535.

    Google Scholar 

  57. Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D. (2011). NIST cloud computing reference architecture. NIST special publication, 500(2011), 292.

    Google Scholar 

  58. Zalazar, A. S., Rodriguez, S., Ballejos, L. C. (2015). Handling Dynamic Requirements in Cloud Computing. In Simposio Argentino de Ingeniería de Software (ASSE 2015)-JAIIO 44 (Rosario, 2015).

    Google Scholar 

  59. Heilig, L., Voß, S. (2014). Decision analytics for cloud computing: a classification and literature review. Tutorials in Operations Research–Bridging Data and Decisions, 1–26.

    Google Scholar 

  60. Bao, D., Xiao, Z., Sun, Y., Zhao, J. (2010). A method and framework for quality of cloud services measurement. In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) (Vol. 5, pp. V5–358). IEEE.

    Google Scholar 

  61. Boampong, P. A., Wahsheh, L. A. (2012). Different facets of security in the cloud. In Proceedings of the 15th Communications and Networking Simulation Symposium (p. 5). Society for Computer Simulation International.

    Google Scholar 

  62. Rimal, B. P., Choi, E., Lumb, I. (2010). A taxonomy, survey, and issues of cloud computing ecosystems. In Cloud Computing (pp. 21–46). Springer London.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ana Sofia Zalazar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Zalazar, A.S., Ballejos, L., Rodriguez, S. (2017). Analyzing Requirements Engineering for Cloud Computing. In: Ramachandran, M., Mahmood, Z. (eds) Requirements Engineering for Service and Cloud Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-51310-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51310-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51309-6

  • Online ISBN: 978-3-319-51310-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics