Abstract

In the requirement engineering phase, the team members work to get the user requirements, comprehend them and specify them for the next process. There are many models for the requirement engineering phase. There is a need to select the best Requirement Engineering model, and integrate it with cloud computing, that can give the best response to the users and software developers and avoid mistakes in the requirement engineering phase. In this study, these models are integrated with the cloud computing domain, and we report on the security considerations of all the selected models. Four requirement engineering process models are selected for this study: the Linear approach, the Macaulay Linear approach, and the Iterative and Spiral models. The focus of this study is to check the security aspects being introduced by the cloud platform and assess the feasibility of these models for the popular cloud environment SaaS. For the classification of the security aspects that affect the performance of these model, a framework is proposed, and we check the results regarding selected security parameters and RE models. By classifying the selected RE models for security aspects based on deep learning techniques, we determine that the Loucopoulos and Karakostas iterative requirements engineering process model performs better than all the other models.

Highlights

  • IntroductionRequirement engineering (RE), as the initial phase of software engineering, is used for the definition of the customer’s requirement, documenting them, and efficiently maintaining them throughout the project

  • We have used the Aurora 2 dataset with multiple files required for the training of data, and classified it in MATLABr2018b

  • There are many reasons for the selection of Aurora 2. It is a publicly available dataset and provides the best identification and recognition results when used with the Convolutional Neural Network Model (CNN)

Read more

Summary

Introduction

Requirement engineering (RE), as the initial phase of software engineering, is used for the definition of the customer’s requirement, documenting them, and efficiently maintaining them throughout the project. To achieve these objectives, the team members carry out requirement elicitation, specification, verification and validation. The management of team members, cost and time are the mandatory factors for this phase. There are many hurdles in the gathering of requirements, which lead to many difficulties in the other phases of development. Four requirement engineering models were selected, which are integrable with cloud computing, and we investigated their security measures

Objectives
Methods
Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.