ABSTRACT

The analysis of security requirements on which policies are developed must consider the complex nature of the cloud architecture. The analysis method must identify security requirements at multiple levels of the cloud. The High-Order Object-Oriented Modeling Technique addresses a challenge faced by requirement analysts and software engineers to develop well-structured object-oriented software systems. The chapter presents background information and the various architectural elements that form the basis for cloud computing. Cloud computing has emerged as a new and important computing paradigm; it is gaining increased attention in the service computing community. The security policies for cloud computing systems are based on the cloud security requirements through the security requirements analysis process. Policies and requirements are not necessarily mapped one-to-one. The cloud security requirement analysis and policy development process then continues at the second level. Developing comprehensive cloud-specific security policies is a very difficult task that requires collaboration and insight from many individuals in various areas of expertise.