A Goal-Oriented Approach to Requirements Development and Quantitative Security Assurance

A Goal-Oriented Approach to Requirements Development and Quantitative Security Assurance

Zhengshu Zhou, Qiang Zhi, Zilong Liang, Shuji Morisaki
DOI: 10.4018/IJSSSP.2021010103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

When deciding and evaluating system security strategies, there is a trade-off relationship between security assuring effect and constraint condition, which has been revealed by many qualitative security assurance methods. However, the existing methods cannot be used to make quantitative analysis on security assurance and constraint conditions to support project managers and system engineers to decide system development strategies. Therefore, a quantitative method which can consider both security strategies and constraints is necessary. This paper proposes a semi-automatic, quantitative system security assurance approach for developing security requirement and security assurance cases by extending the traditional GSN (goal structuring notation). Next, two greedy algorithms for quantitative system security assurance are implemented and evaluated. In addition, a case study and an experiment are carried out to verify the effectiveness and efficiency of the proposed approach and the proposed algorithms.
Article Preview
Top

1. Introduction

The diversity of information sharing channels and information security risks may be the biggest paradox of the rapidly developing information era. According to the definition of ISO/IEC 27002, information security mainly involves a couple of aspects, including confidentiality, integrity and availability. Due to cyber-attack and information risks, scholars and engineers have proposed and implemented a variety of security assurance methods to assure the security of information systems. At present, the most frequently used specific information security techniques include data encryption, user authentication technology, firewall, etc. Moreover, so far many approaches to conduct system security assurance have been proposed, such as i* framework, NFR (Non-Functional Requirement) framework, and D-Case. These approaches enable system engineers to adopt reasonable security strategies to reduce information security risks. Nevertheless, as constraint conditions of the security strategies have not been analyzed in these approaches, the proposed security countermeasures cannot always be achieved in industry.

The aforementioned constraints that affect whether a specific system security countermeasure should be adopted or not may be development time, engineering budget, system performance, system usability and even the space occupied by system hardware or equipment. For example, a large hospital is considering the introduction of an electronic medical record system (EMRS). Because the EMRS involves the privacy of patients, it must be implemented with an authentication function so that only users with corresponding permission can log into the system. Software vendor has proposed the technology of biometric identification, because it is more efficient and reliable. Compared with traditional methods (for example, user ID and password), biometric recognition needs specific facility and new software module, more development man-hours and engineering budget are therefore needed. When the engineering budget is insufficient, although the proposal is superior, it should be rejected. In other words, there is a trade-off between system security assurance and engineering budget.

It can be seen from the example that system designers always have to find a balance between system security goals and constrain conditions. In order to resolve this problem, the paper proposes a quantitative security assurance method that allows security assurance cases to consider both security contributions and constraints. In addition, two algorithms to support decision-making for security assurance cases development will be proposed and implemented. The remainder of this paper is organized as follows. Related researches on system security assurance approaches will be introduced in Section 2. Next, we propose a new method for security assuring to resolve the defects of the related research and give an example in Section 3. After that, in Section 4, the detailed steps of the proposed method are defined, and two greedy algorithms for automated reasoning of security assurance strategic decisions is proposed and implemented. In Section 5, a case study on an in-vehicle embedded system will be conducted to verify the effectiveness of this proposed method. In addition, experiments are carried out to evaluate the computational efficiency of the proposed method. Finally, this paper is concluded by discussing this method and by suggesting further directions of this research in Section 6.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 12: 2 Issues (2021)
Volume 11: 2 Issues (2020)
Volume 10: 2 Issues (2019)
Volume 9: 4 Issues (2018)
View Complete Journal Contents Listing