Machine learning evaluation of the requirement engineering process models for cloud computing and security issues

2Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

Abstract

In the requirement engineering phase, the team members work to get the user requirements, comprehend them and specify them for the next process. There are many models for the requirement engineering phase. There is a need to select the best Requirement Engineering model, and integrate it with cloud computing, that can give the best response to the users and software developers and avoid mistakes in the requirement engineering phase. In this study, these models are integrated with the cloud computing domain, and we report on the security considerations of all the selected models. Four requirement engineering process models are selected for this study: the Linear approach, the Macaulay Linear approach, and the Iterative and Spiral models. The focus of this study is to check the security aspects being introduced by the cloud platform and assess the feasibility of these models for the popular cloud environment SaaS. For the classification of the security aspects that affect the performance of these model, a framework is proposed, and we check the results regarding selected security parameters and RE models. By classifying the selected RE models for security aspects based on deep learning techniques, we determine that the Loucopoulos and Karakostas iterative requirements engineering process model performs better than all the other models.

References Powered by Scopus

A survey on security issues in service delivery models of cloud computing

2012Citations
N/AReaders
Get full text

Security in cloud computing: Opportunities and challenges

654Citations
N/AReaders
Get full text

Developing vehicular data cloud services in the IoT environment

506Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Identification and Classification of Functional and Nonfunctional Software Requirements Using Machine Learning

0Citations
N/AReaders
Get full text

PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Nadeem, M. A., & Lee, S. U. J. (2020). Machine learning evaluation of the requirement engineering process models for cloud computing and security issues. Applied Sciences (Switzerland), 10(17). https://doi.org/10.3390/app10175851

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 8

73%

Researcher 2

18%

Lecturer / Post doc 1

9%

Readers' Discipline

Tooltip

Computer Science 7

54%

Engineering 4

31%

Decision Sciences 1

8%

Neuroscience 1

8%

Article Metrics

Tooltip
Mentions
Blog Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free