Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE)
Abstract
:1. Introduction
- A clearer guidance for developers in order to align technical measures with social needs effectively, helping them to understand the significance of social requirements.
- The empowerment of users with control over privacy settings, enhancing transparency and trust, proactively mitigating privacy risks, and granting users greater autonomy in privacy management.
- A user-centric approach that tailors privacy measures to diverse user groups, enhancing satisfaction.
- A compliant and standardized framework and best practices aiding in the improvement of self-adaptive privacy practices in cloud development.
2. Background
2.1. Groups and Self-Presentation and Information Disclosure
2.2. Groups and Self-Protection Strategies
3. Social, Technical, and Infrastructural Requirements Based on Developers’ Insights and Users’ Needs
3.1. Social Requirements
3.1.1. Groups and Self-Presentation and Information Disclosure
- Social requirement 1: platforms should provide robust privacy settings, allowing users to manage the visibility of their religious views, especially on Messenger.
- Social requirement 2: users should have the option to include or exclude a short curriculum vitae (CV) in their profile, with clear controls over its visibility to different audiences, particularly on Instagram.
- Social requirement 3: platforms should offer users granular control over photo-tagging permissions to manage the visibility of tagged photos, especially on platforms like Instagram, where users frequently tag others in shared photos ( = 5.549, p = 0.018, = −0.142).
- Social requirement 1: users engaging in trade union activities show a preference for privacy regarding sharing photos of themselves on Instagram, indicating a need for platforms to implement robust privacy controls for image sharing functionalities.
- Social requirement 2: Users involved in trade union activities are more cautious about sharing information about their hobbies, especially on platforms like Instagram. This underlines the importance of providing users with granular control over the visibility of hobby-related information on their profiles.
- Social requirement 3: Trade union members are concerned about sharing their location on social media, particularly on Instagram. This highlights the necessity for platforms to offer effective location privacy settings and raise awareness among users about the risks associated with sharing their whereabouts.
- Social requirement 4: Users affiliated with trade unions tend to avoid tagging others in photos they share on Instagram, indicating a desire for stricter control over the dissemination of personal information. Platforms should enhance tagging mechanisms to ensure users have the autonomy to manage tags and protect the privacy of themselves and others.
- Social requirement 1: Users engaged in voluntary activities exhibit a preference for privacy regarding sharing photos of themselves, particularly on Instagram. This indicates a need for social media platforms to implement robust privacy controls and provide users with options to manage the visibility of their photos, ensuring that individuals involved in voluntary work can maintain their privacy while using the platform.
- Social requirement 1: Users associated with cultural groups demonstrate a reluctance to share contact information, particularly on Instagram. This highlights the importance of respecting users’ privacy preferences regarding the disclosure of contact details within the context of cultural activities.
- Social requirement 1: Users affiliated with scientific groups exhibit a tendency not to share information about their hobbies on Instagram. This underscores the necessity for privacy safeguards concerning the disclosure of personal interests within scientific circles on social media platforms, specifically Instagram.
- Social requirement 2: Users involved in scientific groups refuse to share information about their daily activities on Messenger. This underscores the significance of privacy protection mechanisms concerning the disclosure of routine behaviors within scientific communities on messaging platforms like Messenger.
- Social requirement 1: Users engaged in environmental groups demonstrate a tendency not to share personal information on Messenger. This highlights the importance of implementing privacy measures to safeguard personal data exchanged within environmental communities on messaging platforms like Messenger.
- Social requirement 1: Users affiliated with technological interest groups demonstrate a tendency not to share photos of themselves on Instagram. This underscores the importance of implementing privacy controls and mechanisms on Instagram to empower users to manage their photo sharing preferences effectively.
- Social requirement 2: Users affiliated with technological interest groups demonstrate a tendency not to share information about their hobbies on Instagram. This emphasizes the necessity of enhancing privacy features that enable users to selectively share hobby-related content with specific audiences.
- Social requirement 3: Users engaged in technological interest groups manifest a tendency not to share information about their daily activities on Instagram. This highlights the need to enhance privacy settings and allow users to regulate the visibility of their daily activity updates.
- Social requirements for users of WhatsApp: there is a need for robust privacy controls and mechanisms for sharing personal information, photos, information about hobbies, and daily activities on this platform to safeguard their privacy.
- Social requirements for users of Facebook: there is a need to freely share information about their friends.
- Social requirements for users of Messenger: there is a need for privacy controls when sharing information regarding daily activities, sexuality, religious views, contact information, or location.
3.1.2. Groups and Self-Protection Strategies
- Social requirement 1: individuals in companionship groups should frequently adjust their privacy settings to maintain control over their shared content.
- Social requirement 1: professionals should refrain from not restricting access to the content they upload to ensure privacy and professional boundaries.
- Social requirement 1: participants in voluntary groups are advised to untag themselves from others’ photos to manage their privacy effectively.
- Social requirement 1: individuals in scientific groups should consider changing their initial privacy settings in their profiles to mitigate privacy risks.
- Social requirement 2: individuals in scientific groups should consider using a limited profile option to control their visibility.
- Social requirement 3: individuals in scientific groups should consider excluding contact information from their profiles to mitigate privacy risks.
- Social requirement 1: participants in gender equality groups should be cautious not to accept friendship requests from strangers to mitigate privacy risks
- Social requirement 1: platforms should offer the option for pseudonymous or anonymous registration to accommodate users’ preferences for privacy, especially for users who choose not to provide their real names during registration.
- Social requirement 2: Platforms must enhance their privacy settings to allow users who participate in both groups to have greater control over who can access the content they upload. This includes implementing robust access control mechanisms to safeguard users’ privacy preferences.
- Social requirement 1: platforms should introduce features that enable users to make informed decisions regarding personal information disclosure, including information about their families, to safeguard users’ privacy preferences.
3.2. Technical Requirements
- The protection of an attribute from unauthorized access;
- The minimization of an attribute when it is not required for some operation;
- The retention of an attribute according to user preferences and applicable laws;
- Anonymization when required;
- Encryption when required.
3.3. Infrastructural Requirements
4. A Taxonomy for Integrating Self-Adaptive Privacy Requirements Informed by Both Developers’ Insights and Social Identity Considerations
5. Discussion and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Islam, S.; Mouratidis, H.; Weippl, E.R. A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In Security Engineering for Cloud Computing; IGI Global: Hershey, PA, USA, 2013; pp. 97–122. [Google Scholar] [CrossRef]
- Peras, D.; Mekovec, R. A conceptualization of the privacy concerns of cloud users. Inf. Comput. Secur. 2022, 30, 653–671. [Google Scholar] [CrossRef]
- Cook, A.; Robinson, M.; Ferrag, M.A.; Maglaras, L.A.; He, Y.; Jones, K.; Janicke, H. Internet of Cloud: Security and Privacy Issues. In Cloud Computing for Optimization: Foundations, Applications, and Challenges; Springer International Publishing: Berlin/Heidelberg, Germany, 2018; pp. 271–301. [Google Scholar] [CrossRef]
- Belk, M.; Fidas, C.; Athanasopoulos, E.; Pitsillides, A. Adaptive and Personalized Privacy and Security (APPS 2019): Workshop Chairs’ Welcome and Organization. In Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization, Larnaca, Cyprus, 9–12 June 2019. [Google Scholar] [CrossRef]
- Kitsiou, A.; Pantelelis, M.; Mavroeidi, A.G.; Sideri, M.; Simou, S.; Vgena, A.; Tzortzaki, E.; Kalloniatis, C. Self-Adaptive Privacy in Cloud Computing: An overview under an interdisciplinary spectrum. In Proceedings of the 26th Pan-Hellenic Conference on Informatics, Athens, Greece, 25–27 November 2022. [Google Scholar] [CrossRef]
- Sanchez, O.R.; Torre, I.; He, Y.; Knijnenburg, B.P. A recommendation approach for user privacy preferences in the fitness domain. User Model. User-Adapt. Interact. 2019, 30, 513–565. [Google Scholar] [CrossRef]
- Knijnenburg, B.P. Privacy? I Can’t Even! Making a Case for User-Tailored Privacy. IEEE Secur. Priv. 2017, 15, 62–67. [Google Scholar] [CrossRef]
- Kalloniatis, C. Incorporating privacy in the design of cloud-based systems: A conceptual meta-model. Inf. Comput. Secur. 2017, 25, 614–633. [Google Scholar] [CrossRef]
- Kitsiou, A.; Sideri, M.; Pantelelis, M.; Simou, S.; Mavroeidi, A.G.; Vgena, K.; Tzortzaki, E.; Kalloniatis, C. Developers’ mindset for Self-Adaptive Privacy related Requirements in Cloud. Int. J. Inf. Secur. 2023. submitted. [Google Scholar]
- Li, C.; Miklau, G. An adaptive mechanism for accurate query answering under differential privacy. arXiv 2012, arXiv:1202.3807. [Google Scholar] [CrossRef]
- Huo, Y.; Yong, C.; Lu, Y. Re-ADP: Real-Time Data Aggregation with Adaptive ω-Event Differential Privacy for Fog Computing. Wirel. Commun. Mob. Comput. 2018, 2018, 6285719. [Google Scholar] [CrossRef]
- Díaz Ferreyra, N.; Meis, R.; Heisel, M. Online self-disclosure: From users’ regrets to instructional awareness. In Machine Learning and Knowledge Extraction. CD-MAKE 2017; Lecture Notes in Computer Science; Springer: Cham, Switerland, 2017; pp. 83–102. [Google Scholar]
- Sanchez, D.; Viejo, A. Privacy-preserving and advertising-friendly web surfing. Comput. Commun. 2018, 130, 113–123. [Google Scholar] [CrossRef]
- Wang, B.; Srivastava, M. Enabling Privacy Policies for mHealth Studies. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 4045–4054. [Google Scholar] [CrossRef]
- Kapitsaki, G.; Charalambous, T. Adapting HTML5 Web applications to user privacy preferences. World Wide Web-Internet Web Inf. Syst. 2019, 22, 2041–2062. [Google Scholar] [CrossRef]
- Namara, M.; Sloan, H.; Knijnenburg, B. The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites. Proc. Priv. Enhancing Technol. 2021, 2022, 629–648. [Google Scholar] [CrossRef]
- Kitsiou, A.; Tzortzaki, E.; Kalloniatis, C.; Gritzalis, S. Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks. Future Internet 2021, 13, 23. [Google Scholar] [CrossRef]
- Hollenbaugh, E.E. Self-Presentation in Social Media: Review and Research Opportunities. Rev. Commun. Res. 2021, 9, 80–98. [Google Scholar] [CrossRef]
- Dienlin, T.; Masur, P.K.; Trepte, S. A longitudinal analysis of the privacy paradox. New Media Soc. 2021, 25, 1043–1064. [Google Scholar] [CrossRef]
- Schaub, F. Context-Adaptive Privacy Mechanisms. In Handbook of Mobile Data Privacy; Springer International Publishing: Berlin/Heidelberg, Germany, 2018; pp. 337–372. [Google Scholar] [CrossRef]
- Teltzrow, M.; Kobsa, A. Impacts of User Privacy Preferences on Personalized Systems: A comparative study. In Designing Personalized User Experiences in eCommerce; Human-Computer Interaction Series; Springer: Dordrecht, The Netherlands, 2004; pp. 315–332. [Google Scholar] [CrossRef]
- Mulligan, D.K.; Koopman, C.; Doty, N. Privacy is an essentially contested concept: A multi-dimensional analytic for mapping privacy. Philos. Trans. R. Soc. A Math. Phys. Eng. Sci. 2016, 374, 20160118. [Google Scholar] [CrossRef] [PubMed]
- Iachello, G.; Hong, J. End-User Privacy in Human-Computer Interaction. Found. Trends® Hum.-Comput. Interact. 2007, 1, 1–137. [Google Scholar] [CrossRef]
- Correia, J.; Compeau, D. Information Privacy Awareness (IPA): A Review of the Use, Definition and Measurement of IPA. In Proceedings of the Annual Hawaii International Conference on System Sciences, Village, HI, USA, 4–7 January 2017. [Google Scholar] [CrossRef]
- Teresa Baldassarre, M.; Santa Barletta, V.; Caivano, D.; Piccinno, A. Integrating Security and Privacy in HCD-Scrum. In Proceedings of the CHItaly 2021: 14th Biannual Conference of the Italian SIGCHI Chapter, Bolzano Italy, 11–13 July 2021. [Google Scholar] [CrossRef]
- Razaque, A.; Rizvi, S.S. Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. Comput. Secur. 2016, 62, 328–347. [Google Scholar] [CrossRef]
- Pearson, S. Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, BC, Canada, 23 May 2009. [Google Scholar] [CrossRef]
- Mbanaso, U.M.; Chukwudebe, G.A. Requirement analysis of IoT security in distributed systems. In Proceedings of the 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), Owerri, Nigeria, 7–10 November 2017. [Google Scholar] [CrossRef]
- Nunes, D.; Tran, T.D.; Raposo, D.; Pinto, A.; Gomes, A.; Silva, J.S. A Web Service-Based Framework Model for People-Centric Sensing Applications Applied to Social Networking. Sensors 2012, 12, 1688–1701. [Google Scholar] [CrossRef] [PubMed]
- Hongchen, W.; Mingyang, L.; Huaxiang, Z. UISTD: A Trust-Aware Model for Diverse Item Personalization in Social Sensing with Lower Privacy Intrusion. Sensors 2018, 18, 4383. [Google Scholar] [CrossRef] [PubMed]
- Waheeb, A.; Wu, D.; Mukathe, D. Blockchain-Assisted Privacy-Preserving and Context-Aware Trust Management Framework for Secure Communications in VANETs. Sensors 2023, 23, 5766. [Google Scholar] [CrossRef] [PubMed]
Groups | Disclosure Practices (Information Shared) | Media and Services (Instagram, Messenger, Facebook) |
---|---|---|
Professional | About my job | Messenger: = 7.917, p = 0.005, = 0.169 |
Religious views | Messenger: = 5.553, p = 0.018, = −0.142 | |
A short cv in my profile | Instagram: = 5.470, p = 0.019, = −0.141 | |
I tag others in the photos I share | Instagram: = 5.549, p = 0.018, = −0.142 | |
Trade union | Photos of myself | Instagram: = 4.502, p = 0.034, = −0.128 |
About my hobbies | Facebook: = 6.686, p = 0.010, = −0.156 | |
Instagram: = 5.633, p = 0.018, = −0.143 | ||
my location | Instagram: = 7.107, p = 0.008, = −0.160 | |
I tag others in the photos I share | Instagram: = 8.209, p = 0.004, = −0.172 | |
Voluntary | Photos of myself | Instagram: = 4.410, p = 0.036, = −0.126 |
WhatsApp: = 4.226, p = 0.040, = −0.124 | ||
Cultural | About my family | Messenger: = 4.405, p = 0.036, = 0.126 |
About my sexuality | Messenger: = 11.908, p = 0.001, = 0.208 | |
Religious views | Messenger: = 9.344, p = 0.002, = 0.184 | |
About my political views | Messenger: = 8.041, p = 0.005, = 0.171 | |
My location | Messenger: = 8.671, p = 0.003, = 0.177 | |
Contact information | Instagram: = 3.863, p = 0.049, = −0.118 | |
Messenger: = 3.888, p = 0.049, = 0.119 | ||
Scientific | About my job | Facebook: = 9.700, p = 0.002, = 0.187 |
About my hobbies | Instagram: = 4.189, p = 0.041, = −0.123 | |
About my daily activities | Messenger: = 4.597, p = 0.032, = −0.129 | |
Environmental | Personal information | Messenger: = 4.182, p = 0.041, = −0.123 |
Technological Interest | Photos of myself | Instagram: = 8.102, p = 0.004, = −0.171 |
About my hobbies | Instagram: = 4.825, p = 0.028, = −0.132 | |
About my daily activities | Instagram: = 5.751, p = 0.016, = −0.144 |
Companionship and professional | Companionship | Professional | |
I share personal information | WhatsApp/N(144) = 5.962, p = 0.015, = −0.203 | Messenger/N(276) = 6.844, p = 0.009, = 0.157 | |
I share photos of myself | WhatsApp/N(144) = 12.038, p = 0.001, = −0.289 | Instagram/N(276) = 11.024, p = 0.001, = 0.200 Messenger/N(276) = 6.517, p = 0.011, = 0.154 | |
I share information about my friends | Facebook/N(144) = 4.237, p = 0.040, = 0.172 | Messenger/N(276) = 3.957, p = 0.047, = 0.120 | |
I share information about my job | Messenger/N(276) = 5.227, p = 0.022, = 0.138 | Messenger/N(276) = 7.917, p = 0.005, = 0.169 | |
I share information about my hobbies | WhatsApp/N(144) = 8.456, p = 0.004, = −0.242 | Instagram/N(276) = 10.663, p = 0.001, = 0.197 Messenger/N(276) = 5.632, p = 0.018, = 0.143 | |
I share information about my daily activities | Messenger/N(144) = 4.782, p = 0.029, = −0.182 WhatsApp/N(144) = 9.735, p = 0.002, = −0.260 | Instagram/N(276) = 10.115, p = 0.001, = 0.191 Messenger/N(276) = 6.479, p = 0.011, = 0.153 | |
I share information regarding my sexuality | Messenger/N(144) = 5.839, p = 0.016, = −0.201 | ||
I share religious views | Messenger/N(144) = 6.946, p = 0.008, = −0.220 | Messenger/N(276) = 5.553, p = 0.018, = −0.142 | |
I share information about my political views | Instagram/N(276) = 4.082, p = 0.043, = 0.122 | ||
I state my location | Messenger/N(144) = 5.143, p = 0.023, = −0.189 | ||
I include contact information | Messenger/N(144) = 8.663, p = 0.003, = −0.245 | ||
I have included a short cv in my profile | Instagram/N(276) = 5.470, p = 0.019, = −0.141 | ||
I tag others in the photos I share | Instagram/N(276) = 5.520, p = 0.019, = 0.141 | Instagram/N(276) = 5.549, p = 0.018, = −0.142 |
Strategies | Companionship | Leisure | Scientific | Environmental | Technological Interest |
---|---|---|---|---|---|
Have changed initial privacy settings | N(273) = 5.876 p = 0.015 = 0.147 | N(273) = 4.947 p = 0.026 = −0.135 | |||
Often adjust privacy settings | N(272) = 6.498 p = 0.011 = −0.155 | N(272) = 4.881 p = 0.027 = 0.134 | N(272) = 4.212 p = 0.040 = 0.124 | ||
Use a limited profile option | N(273) = 5.420 p = 0.020 = −0.141 | N(273) = 3.865 p = 0.049 = 0.119 | |||
Have excluded contact information from my profile | N(273) = 5.200 p = 0.023 = −0.138 | ||||
Carefully consider the context (where am I) when I provide information | N(273) = 5.940 p = 0.015 = 0.148 |
Strategies | Professional | Voluntary | Religious | Gender Equality |
---|---|---|---|---|
Have let privacy settings at default | N(273) = 4.166 p = 0.041 = 0.124 | |||
Do not accept friendship requests from strangers | N(273) = 9.079 p = 0.003 = −0.182 | |||
Do not restrict access to the content I upload | N(273) = 4.833 p = 0.028 = −0.133 | |||
Untag myself from others’ photos | N(273) = 6.121 p = 0.013 = −0.150 | N(273) = 3.921 p = 0.048 = 0.120 | ||
Familiar with the mechanisms provided by the platform to protect myself | N(273) = 4.732 p = 0.030 = 0.132 |
Self-Protection Strategy | Companionship and Professional | Companionship | Professional |
---|---|---|---|
During registration I did not give my real name | N(142) = 6.208, p = 0.013, = −0.209 | ||
I often adjust privacy settings | N(272) = 6.498, p = 0.011, = −0.155 | ||
I do not restrict access to the content I upload | N(142) = 4.070, p = 0.044, = −0.169 | N(273) = 4.833, p = 0.028, = −0.133 | |
I untag myself from others’ photos | N(142) = 8.047, p = 0.005, = 0.238 | ||
I have enabled the review of the posts in my profile | N(142) = 3.945, p = 0.047, = 0.167 |
Self-Protection Strategy | Companionship and Voluntary | Companionship | Voluntary |
---|---|---|---|
I have let privacy settings at default | N(142) = 3.978, p = 0.046, = 0.167 | N(273) = 4.166, p = 0.041, = 0.124 | |
I often adjust privacy settings | N(272) = 6.498, p = 0.011, = −0.155 | ||
I do not disclose personal information | N(142) = 4.107, p = 0.043, = −0.170 | ||
I do not disclose information about my family | N(142) = 7.383, p = 0.007, = −0.228 | ||
I untag myself from others’ photos | N(273) = 6.121, p = 0.013, = −0.150 | ||
I control the information I upload | N(142) = 3.842, p = 0.050, = −0.164 |
SR: Social Requirement | |
---|---|
SR-1 | Platforms should provide robust privacy settings, allowing users to manage the visibility of their views among different groups. |
SR-2 | Users should have the option to include or exclude a short curriculum vitae (CV) in their profile, with clear controls over its visibility to different audiences. |
SR-3 | Platforms should offer users granular/robust control over photo-tagging permissions to manage the visibility of tagged photos, to protect their privacy and that of others. |
SR-4 | Providing users with granular control over the visibility of hobby-related or personal interest information on their profiles. |
SR-5 | Offer effective location privacy settings and raise awareness among users about the risks associated with sharing their whereabouts. |
SR-6 | Respecting users’ privacy preferences regarding the disclosure of personal data or contact details. |
SR-7 | Provide protection mechanisms concerning the disclosure of routine behaviors or daily activity updates within communities on messaging platforms. |
SP: Social Protection Measure | |
---|---|
SP-1 | Adjust privacy settings to maintain control over shared content. |
SP-2 | Restricting access to the uploaded content to ensure privacy boundaries. |
SP-3 | Untag themselves from others’ photos to manage their privacy. |
SP-4 | Change initial privacy settings from their profiles to mitigate privacy risks. |
SP-5 | Use a limited profile option to control their visibility. |
SP-6 | Exclude contact information from their profiles to mitigate privacy risks. |
SP-7 | Reject friendship requests from strangers to mitigate privacy risks. |
SP-8 | Pseudonymous or anonymous registration to accommodate users’ preferences for privacy. |
SP-9 | Privacy settings to allow users who participate in both groups to have greater control over who can access the content they upload by implementing robust access control mechanisms. |
SP-10 | Make informed decisions regarding personal information disclosure, including information about their families. |
SR: Social Requirements | |
---|---|
SR-1 | Platforms should provide robust privacy settings, allowing users to manage the visibility of their views or shared content among different groups. |
SR-2 | Users should have the option to include or exclude a short curriculum vitae (CV) in their profile. |
SR-3 | Platforms should offer users granular/robust control over photo-tagging permissions to manage the visibility of tagged photos. |
SR-4 | Providing users with granular control over the visibility of hobby-related or personal interest information on their profiles. |
SR-5 | Offer effective location privacy settings and raise awareness among users about the risks associated with sharing their whereabouts. |
SR-6 | Respecting users’ privacy preferences regarding the disclosure of personal data or contact details. |
SR-7 | Provide protection mechanisms concerning the disclosure of routine behaviors or daily activity updates. |
SR-8 | Change initial privacy settings from their profiles to mitigate privacy risks. |
SR-9 | Make informed decisions regarding personal information disclosure. |
SR-10 | Pseudonymous or anonymous registration to accommodate users’ preference for privacy. |
SR-11 | Reject friendship requests from strangers to mitigate privacy risks. |
Group | SR-1 | SR-2 | SR-3 | SR-4 | SR-5 | SR-6 | SR-7 | SR-8 | SR-9 | SR-10 | SR-11 |
---|---|---|---|---|---|---|---|---|---|---|---|
Professional | X | X | X | X | X | X | X | X | |||
Companionship | X | X | X | X | X | X | X | X | |||
Trade union | X | X | X | ||||||||
Voluntary | X | X | |||||||||
Cultural | X | ||||||||||
Scientific | X | X | X | X | X | ||||||
Environmental | X | ||||||||||
Gender equality | X | ||||||||||
Technological interest | X | X | X |
SR-1 | SR-2 | SR-3 | SR-4 | SR-5 | SR-6 | SR-7 | SR-8 | SR-9 | SR-10 | SR-11 | |
---|---|---|---|---|---|---|---|---|---|---|---|
TR-1 Compliance management | X | X | |||||||||
TR-2 Transparency awareness | X | X | X | X | |||||||
TR-3 Context awareness | X | X | X | X | X | X | X | X | |||
TR-4 User interaction | X | X | X | X | X | X | |||||
TR-5 PII attribute management | X | X | X | X | |||||||
TR-6 Privacy control | X | X | X | X | X | X | X | X | |||
TR-7 Intelligence management | X | X | X | X | X | X | X | X | |||
IR-1 Storage management | X | X | X | X | |||||||
IR-2 Collaboration | X | X | |||||||||
IR-3 Developer guidance | X | X | X | X | X | X | X | X | X | X | X |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kitsiou, A.; Sideri, M.; Pantelelis, M.; Simou, S.; Mavroeidi, A.-G.; Vgena, K.; Tzortzaki, E.; Kalloniatis, C. Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE). Sensors 2024, 24, 3227. https://doi.org/10.3390/s24103227
Kitsiou A, Sideri M, Pantelelis M, Simou S, Mavroeidi A-G, Vgena K, Tzortzaki E, Kalloniatis C. Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE). Sensors. 2024; 24(10):3227. https://doi.org/10.3390/s24103227
Chicago/Turabian StyleKitsiou, Angeliki, Maria Sideri, Michail Pantelelis, Stavros Simou, Aikaterini-Georgia Mavroeidi, Katerina Vgena, Eleni Tzortzaki, and Christos Kalloniatis. 2024. "Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE)" Sensors 24, no. 10: 3227. https://doi.org/10.3390/s24103227
APA StyleKitsiou, A., Sideri, M., Pantelelis, M., Simou, S., Mavroeidi, A. -G., Vgena, K., Tzortzaki, E., & Kalloniatis, C. (2024). Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE). Sensors, 24(10), 3227. https://doi.org/10.3390/s24103227