A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design

被引:0
作者
Alkubaisy, Duaa [1 ]
Piras, Luca [2 ]
Al-Obeidallah, Mohammed Ghazi [3 ]
Cox, Karl [4 ]
Mouratidis, Haralambos [4 ,5 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Appl Studies & Community Serv, Dept MIS, Dammam, Saudi Arabia
[2] Robert Gordon Univ, Sch Comp, Aberdeen, Scotland
[3] Al Ain Univ, Fac Engn, Abu Dhabi, U Arab Emirates
[4] Univ Brighton, Ctr Secure Intelligent & Usable Syst, Brighton, E Sussex, England
[5] Stockholm Univ, Dept Comp & Syst Sci, Stockholm, Sweden
来源
EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE 2021) | 2022年 / 1556卷
基金
欧盟地平线“2020”;
关键词
Security requirements; Privacy requirements; Requirements conflicts; GDPR; Requirements modelling; Privacy by design; GOAL;
D O I
10.1007/978-3-030-96648-5_4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineering/fixing actions. This is especially important when critical Requirements Classes are involved, such as Privacy and Security Requirements. Recently, organisations have been heavily fined for lack of compliance with data protection regulations, such as the EU General Data Protection Regulation (GDPR). GDPR requires organisations to enforce privacy-by-design activities from the early stages and for the entire software engineering cycle. Accordingly, requirements engineers need methods and tools for systematically identifying privacy and security requirements, detecting and solving related conflicts. Existing techniques support requirements identification without detecting or mitigating conflicts. The framework and tool we propose in this paper, called Confls, fills this gap by supporting engineers and organisations in these complex activities, with its systematic and interactive process. We applied ConfIs to a realistic GDPR example from the DEFeND EU Project, and evaluated its supportiveness, with positive results, by involving privacy and security requirements experts (This research is an extension of the study conducted by Alkubaisy et al. [1] - which itself is a continuation of earlier studies [2, 3] and aims to aid the reader in comprehensively grasping the concepts laid out).
引用
收藏
页码:67 / 87
页数:21
相关论文
empty
未找到相关数据