SlideShare a Scribd company logo
1 of 30
Download to read offline
UMLsec4Edge: Extending UMLsec to model
data-protection-compliant edge computing systems
Sven Smolka, Jan Laufer, Zoltán Ádám Mann, Klaus Pohl
48th Euromicro Conference Series on Software Engineering and Advanced Applications
SOFTWARE SYSTEMS ENGINEERING
Agenda
1. Motivation
2. Aim of the paper
3. Research Approach
4. Conclusion & Future work
2
SOFTWARE SYSTEMS ENGINEERING
Motivation: Overview
3
Information Security and Data Protection Edge Computing
SOFTWARE SYSTEMS ENGINEERING
Motivation: Information Security and Data Protection
4
Data Protection
(e.g., GDPR)
Information Security
(ISO 27000:2018)
SOFTWARE SYSTEMS ENGINEERING
Motivation: Information Security
Source: International Organization for Standardization. Information technology –security techniques– information security management systems–
overview and vocabulary. International Organization for Standardization Std, 27(000):2018,2018 5
Data Protection
(e.g., GDPR)
Information Security
(ISO 27000:2018)
Information Security (ISO 27000:2018)
Preservation of:
• confidentiality,
• integrity,
• availability of information
Moreover:
• authenticity,
• accountability,
• non-repudiation,
• reliability
SOFTWARE SYSTEMS ENGINEERING
Motivation: Data Protection
European General Data Protection Regulation (GDPR)
Goal: “Protection of natural persons with regard to the
processing of personal data and on the free movement of
such data”
Personal data: “any information relating to an identified or
identifiable natural person” (e.g., name, address, location
data)
GDPR defines data-related roles: Data Subject, Data
Controller, Data Processor, Third Party
GDPR stipulates the need for data protection by design
Source: General Data Protection Regulation, “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive
95/46/EC,” Official Journal of the European Union, p. L119, 016.
6
Data Protection
(e.g., GDPR)
Information Security
(ISO 27000:2018)
SOFTWARE SYSTEMS ENGINEERING
Motivation: Overview
7
Edge Computing
Data Protection
(e.g., GDPR)
Information Security
(ISO 27000:2018)
Measures
for personal
data
protection
SOFTWARE SYSTEMS ENGINEERING
Motivation: The need for Edge Computing
8
Cloud
End devices
SOFTWARE SYSTEMS ENGINEERING
Motivation: The need for Edge Computing
9
Cloud
End devices
SOFTWARE SYSTEMS ENGINEERING
Motivation: The need for Edge Computing
10
Cloud
End devices
Two major problems:
• High communication latencies
• Network bandwidth congestion
Data processing at the edge of the network
(Edge computing)
SOFTWARE SYSTEMS ENGINEERING
Motivation: Edge Computing
11
Edge nodes
End devices
Cloud
SOFTWARE SYSTEMS ENGINEERING
Motivation: Overview
12
Measures
for personal
data
protection
Data Protection
(e.g., GDPR)
Information Security
(ISO 27000:2018)
Edge nodes
End devices
Cloud
SOFTWARE SYSTEMS ENGINEERING
Motivation: Complexity of Edge computing systems
13
Edge nodes
End devices
Cloud
Enforcing Privacy by design is difficult
Edge computing systems are complex:
• Heterogeneous devices and networks
• Unknown & untrusted actors with different
data-related roles
• Resource constrained devices
• Dynamic network structures
• …
SOFTWARE SYSTEMS ENGINEERING
Data-protection-related requirements on modeling languages for modeling the static architecture of
edge computing systems [1]:
• (R-1) Network properties
• (R-2) Devices
• (R-3) Actors
• (R-4) Data properties
Motivation: Privacy by design in Edge computing
14
No modeling language which covers all requirements
GDPR requires systems processing personal data to ensure data protection by design
Data protection challenges must be considered already in the static architectural design of the system
Modeling languages are commonly used for the architectural design of a system
paluno – The Ruhr Institute for Software Technology
Aim of the paper:
- Create a modeling language which satisfies the
identified four requirements concerning the design of
the architecture of edge computing systems,
accounting for data protection
15
UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems
SOFTWARE SYSTEMS ENGINEERING
Privacy by design in Edge Computing using UMLsec
16
Data-protection-related requirements on modeling languages for modeling the static architecture of
edge computing systems [1]:
• (R-1) Network properties
• (R-2) Devices
• (R-3) Actors
• (R-4) Data properties
Partially fulfilled by UMLsec
Fulfilled by UMLsec
UMLsec is capable of modeling information security aspects for software systems
We identified the UML profile UMLsec as a promising starting point for modeling data protection
concerns in edge computing systems
We have investigated several related works in order to find a modeling language that we can use as
a starting point
SOFTWARE SYSTEMS ENGINEERING
17
Research Approach
Creation of the
UML profile
secEdge
Previous work: [1] This work
Application of
UMLsec4Edge
to real-world
use cases
Data protection-related
requirements secEdge UMLsec4Edge UMLsec4Edge deployment &
class diagrams
Integration of the
secEdge profile
into the UMLsec
profile
SOFTWARE SYSTEMS ENGINEERING
18
Research Approach
Creation of the
UML profile
secEdge
Previous work: [1] This work
Application of
UMLsec4Edge
to real-world
use cases
Data protection-related
requirements secEdge UMLsec4Edge UMLsec4Edge deployment &
class diagrams
Integration of the
secEdge profile
into the UMLsec
profile
SOFTWARE SYSTEMS ENGINEERING
19
Restriction of UMLsec leading to non-fulfilment of the
requirements
Data protection-related
requirement
Restriction of UMLsec leading to non-fulfilment of the requirement
(R-1) Network
properties
Lack of ability to model wireless data transmission
(R-2) Devices Lack of ability to model the threat of unauthorized physical access to device
types in edge computing systems
Lack of ability to model threats between components on the same node
(R-3) Actors Lack of ability to model relationships between actors and data
Lack of ability to model trust relationships between actors
Lack of ability to model actors with multiple data-specific roles
(R-4) Data properties Already covered by UMLsec
We extend UMLsec with
respect to deployment
diagrams
We extend UMLsec with
respect to class diagrams
SOFTWARE SYSTEMS ENGINEERING
20
Research Approach
Creation of the
UML profile
secEdge
Previous work: [1] This work
Application of
UMLsec4Edge
to real-world
use cases
Data protection-related
requirements secEdge UMLsec4Edge UMLsec4Edge deployment &
class diagrams
Integration of the
secEdge profile
into the UMLsec
profile
SOFTWARE SYSTEMS ENGINEERING
21
Solution provided by UMLsec4Edge to satisfy the
requirements
Data protection-related
requirement
Restriction of UMLsec leading to non-fulfilment of the requirement Solution provided by UMLsec4Edge
Stereotype Tag
(R-1) Network
properties
Lack of ability to model wireless data transmission <<Wireless>>, <<3G>>,
<<4G>>, <<5G>>, <<RFID>>,
<<NFC>>, <<Bluetooth>>,
<<WLAN>>
(R-2) Devices Lack of ability to model the threat of unauthorized physical access to device
types in edge computing systems
<<ComputingContinuumDevice
>>, <<EndDevice>>,
<<EdgeNode>>, <<Cloud>>
Lack of ability to model threats between components on the same node <<internal>>
(R-3) Actors Lack of ability to model relationships between actors and data <<Actor>>,
<<DataTraceability>>
rights,
obligations
Lack of ability to model trust relationships between actors <<Actor>> trusts
Lack of ability to model actors with multiple data-specific roles <<Actor>> roles
(R-4) Data properties
Already covered by UMLsec
SOFTWARE SYSTEMS ENGINEERING
UMLsec4Edge profile
22
SOFTWARE SYSTEMS ENGINEERING
23
Research Approach
Creation of the
UML profile
secEdge
Previous work: [1] This work
Application of
UMLsec4Edge
to real-world
use cases
Data protection-related
requirements secEdge UMLsec4Edge UMLsec4Edge deployment &
class diagrams
Integration of the
secEdge profile
into the UMLsec
profile
SOFTWARE SYSTEMS ENGINEERING
Example of the restrictions of UMLsec in deployment
diagrams
24
No possibility to define threats emerging from wireless communication types
No possibility to define threats emerging from end
devices, edge nodes and cloud data centers
SOFTWARE SYSTEMS ENGINEERING
Example of the restrictions of UMLsec in class diagrams
25
No possibility to model a relationship
between the stored data and actors
No possibility to model that it is an actor with date-
specific roles
SOFTWARE SYSTEMS ENGINEERING
UMLsec4Edge overcoming the restrictions in
deployment diagrams
26
Stereotype Threats
<<5G>> {read}
<<Cloud>> {access}
<<EdgeNode>> {access}
<<EndDevice>> {access}
<<internal>> {delete, read, insert}
SOFTWARE SYSTEMS ENGINEERING
UMLsec4Edge overcoming the restrictions in class
diagrams
27
SOFTWARE SYSTEMS ENGINEERING
Conclusion
We presented UMLsec4Edge as an extension to UMLsec
UMLsec4Edge enables modeling of data protection aspects in the static design of edge computing
systems
• Possible to evaluate data protection in edge computing systems at design time
• Possible to identify threats to data protection in edge computing systems
Future work:
• Application of the results of this paper to related domains (e.g., IoT) / additional use cases
• Evaluation of further UMLsec diagram types
• Automated analysis of UMLsec4Edge diagrams using for example the Object Constraint Language
28
More details can be found in the paper
Thank you for your attention
Sven Smolka, Jan Laufer, Zoltán Ádám Mann, Klaus Pohl
48th Euromicro Conference Series on Software Engineering and Advanced Applications
SOFTWARE SYSTEMS ENGINEERING
Literature
[1] J. Laufer, Z. A. Mann, and A. Metzger, “Modelling data protection in fog computing
systems using UMLsec and SysML-Sec,” in MODELS-C. IEEE, 2021, pp. 777–786.
30

More Related Content

Similar to MDEML_UMLsec4Edge Extending UMLsec to model data-protection-compliant edge computing systems.pdf

CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DESIRJET Journal
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxsirajmohammed35
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Hamza Malik
 
Bhadale group of companies technology ecosystem for CPSoS
Bhadale group of companies technology ecosystem for CPSoSBhadale group of companies technology ecosystem for CPSoS
Bhadale group of companies technology ecosystem for CPSoSVijayananda Mohire
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingIOSR Journals
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGijccsa
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 

Similar to MDEML_UMLsec4Edge Extending UMLsec to model data-protection-compliant edge computing systems.pdf (20)

CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1Ccna v5-S1-Chapter 1
Ccna v5-S1-Chapter 1
 
Bhadale group of companies technology ecosystem for CPSoS
Bhadale group of companies technology ecosystem for CPSoSBhadale group of companies technology ecosystem for CPSoS
Bhadale group of companies technology ecosystem for CPSoS
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
 
G017214849
G017214849G017214849
G017214849
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 

More from SEAA 2022

Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...
Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...
Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...SEAA 2022
 
Bad Smells in Industrial Automation: Sniffing out Feature Envy
Bad Smells in Industrial Automation: Sniffing out Feature EnvyBad Smells in Industrial Automation: Sniffing out Feature Envy
Bad Smells in Industrial Automation: Sniffing out Feature EnvySEAA 2022
 
Software Architecture Challenges in Process Automation - From Code Generation...
Software Architecture Challenges in Process Automation - From Code Generation...Software Architecture Challenges in Process Automation - From Code Generation...
Software Architecture Challenges in Process Automation - From Code Generation...SEAA 2022
 
From Traditional to Digital: How software, data and AI are transforming the e...
From Traditional to Digital: How software, data and AI are transforming the e...From Traditional to Digital: How software, data and AI are transforming the e...
From Traditional to Digital: How software, data and AI are transforming the e...SEAA 2022
 
Exploiting dynamic analysis for architectural smell detection: a preliminary ...
Exploiting dynamic analysis for architectural smell detection: a preliminary ...Exploiting dynamic analysis for architectural smell detection: a preliminary ...
Exploiting dynamic analysis for architectural smell detection: a preliminary ...SEAA 2022
 
On the Role of Personality Traits in Implementation Tasks: A Preliminary Inve...
On the Role of Personality Traits in Implementation Tasks: A Preliminary Inve...On the Role of Personality Traits in Implementation Tasks: A Preliminary Inve...
On the Role of Personality Traits in Implementation Tasks: A Preliminary Inve...SEAA 2022
 
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...SEAA 2022
 
Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-G...
Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-G...Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-G...
Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-G...SEAA 2022
 
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...SEAA 2022
 
An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Met...
An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Met...An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Met...
An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Met...SEAA 2022
 
The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial ...
The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial ...The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial ...
The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial ...SEAA 2022
 
Service Classification through Machine Learning: Aiding in the Efficient Ide...
 Service Classification through Machine Learning: Aiding in the Efficient Ide... Service Classification through Machine Learning: Aiding in the Efficient Ide...
Service Classification through Machine Learning: Aiding in the Efficient Ide...SEAA 2022
 
Maintainability Challenges inML:ASLR
Maintainability Challenges inML:ASLRMaintainability Challenges inML:ASLR
Maintainability Challenges inML:ASLRSEAA 2022
 
Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj...
 Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj... Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj...
Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj...SEAA 2022
 
An Industrial Experience Report about Challenges from Continuous Monitoring, ...
An Industrial Experience Report about Challenges from Continuous Monitoring, ...An Industrial Experience Report about Challenges from Continuous Monitoring, ...
An Industrial Experience Report about Challenges from Continuous Monitoring, ...SEAA 2022
 
API Deprecation: A Systematic Mapping Study
API Deprecation: A Systematic Mapping StudyAPI Deprecation: A Systematic Mapping Study
API Deprecation: A Systematic Mapping StudySEAA 2022
 
EMMM: A Unified Meta-Model for Tracking Machine Learning Experiments
 EMMM: A Unified Meta-Model for Tracking Machine Learning Experiments EMMM: A Unified Meta-Model for Tracking Machine Learning Experiments
EMMM: A Unified Meta-Model for Tracking Machine Learning ExperimentsSEAA 2022
 
Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning i...
Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning i...Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning i...
Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning i...SEAA 2022
 

More from SEAA 2022 (18)

Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...
Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...
Risk and Engineering Knowledge Integration in Cyber-physical Production Syste...
 
Bad Smells in Industrial Automation: Sniffing out Feature Envy
Bad Smells in Industrial Automation: Sniffing out Feature EnvyBad Smells in Industrial Automation: Sniffing out Feature Envy
Bad Smells in Industrial Automation: Sniffing out Feature Envy
 
Software Architecture Challenges in Process Automation - From Code Generation...
Software Architecture Challenges in Process Automation - From Code Generation...Software Architecture Challenges in Process Automation - From Code Generation...
Software Architecture Challenges in Process Automation - From Code Generation...
 
From Traditional to Digital: How software, data and AI are transforming the e...
From Traditional to Digital: How software, data and AI are transforming the e...From Traditional to Digital: How software, data and AI are transforming the e...
From Traditional to Digital: How software, data and AI are transforming the e...
 
Exploiting dynamic analysis for architectural smell detection: a preliminary ...
Exploiting dynamic analysis for architectural smell detection: a preliminary ...Exploiting dynamic analysis for architectural smell detection: a preliminary ...
Exploiting dynamic analysis for architectural smell detection: a preliminary ...
 
On the Role of Personality Traits in Implementation Tasks: A Preliminary Inve...
On the Role of Personality Traits in Implementation Tasks: A Preliminary Inve...On the Role of Personality Traits in Implementation Tasks: A Preliminary Inve...
On the Role of Personality Traits in Implementation Tasks: A Preliminary Inve...
 
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
An Empirical Analysis of Microservices Systems Using Consumer-Driven Contract...
 
Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-G...
Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-G...Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-G...
Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-G...
 
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
 
An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Met...
An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Met...An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Met...
An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Met...
 
The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial ...
The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial ...The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial ...
The Impact of Forced Working-From-Home on Code Technical Debt: An Industrial ...
 
Service Classification through Machine Learning: Aiding in the Efficient Ide...
 Service Classification through Machine Learning: Aiding in the Efficient Ide... Service Classification through Machine Learning: Aiding in the Efficient Ide...
Service Classification through Machine Learning: Aiding in the Efficient Ide...
 
Maintainability Challenges inML:ASLR
Maintainability Challenges inML:ASLRMaintainability Challenges inML:ASLR
Maintainability Challenges inML:ASLR
 
Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj...
 Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj... Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj...
Model-Driven Optimization: Generating Smart Mutation Operators for Multi-Obj...
 
An Industrial Experience Report about Challenges from Continuous Monitoring, ...
An Industrial Experience Report about Challenges from Continuous Monitoring, ...An Industrial Experience Report about Challenges from Continuous Monitoring, ...
An Industrial Experience Report about Challenges from Continuous Monitoring, ...
 
API Deprecation: A Systematic Mapping Study
API Deprecation: A Systematic Mapping StudyAPI Deprecation: A Systematic Mapping Study
API Deprecation: A Systematic Mapping Study
 
EMMM: A Unified Meta-Model for Tracking Machine Learning Experiments
 EMMM: A Unified Meta-Model for Tracking Machine Learning Experiments EMMM: A Unified Meta-Model for Tracking Machine Learning Experiments
EMMM: A Unified Meta-Model for Tracking Machine Learning Experiments
 
Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning i...
Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning i...Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning i...
Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning i...
 

Recently uploaded

Genomic DNA And Complementary DNA Libraries construction.
Genomic DNA And Complementary DNA Libraries construction.Genomic DNA And Complementary DNA Libraries construction.
Genomic DNA And Complementary DNA Libraries construction.k64182334
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)DHURKADEVIBASKAR
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 

Recently uploaded (20)

Genomic DNA And Complementary DNA Libraries construction.
Genomic DNA And Complementary DNA Libraries construction.Genomic DNA And Complementary DNA Libraries construction.
Genomic DNA And Complementary DNA Libraries construction.
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 

MDEML_UMLsec4Edge Extending UMLsec to model data-protection-compliant edge computing systems.pdf

  • 1. UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems Sven Smolka, Jan Laufer, Zoltán Ádám Mann, Klaus Pohl 48th Euromicro Conference Series on Software Engineering and Advanced Applications
  • 2. SOFTWARE SYSTEMS ENGINEERING Agenda 1. Motivation 2. Aim of the paper 3. Research Approach 4. Conclusion & Future work 2
  • 3. SOFTWARE SYSTEMS ENGINEERING Motivation: Overview 3 Information Security and Data Protection Edge Computing
  • 4. SOFTWARE SYSTEMS ENGINEERING Motivation: Information Security and Data Protection 4 Data Protection (e.g., GDPR) Information Security (ISO 27000:2018)
  • 5. SOFTWARE SYSTEMS ENGINEERING Motivation: Information Security Source: International Organization for Standardization. Information technology –security techniques– information security management systems– overview and vocabulary. International Organization for Standardization Std, 27(000):2018,2018 5 Data Protection (e.g., GDPR) Information Security (ISO 27000:2018) Information Security (ISO 27000:2018) Preservation of: • confidentiality, • integrity, • availability of information Moreover: • authenticity, • accountability, • non-repudiation, • reliability
  • 6. SOFTWARE SYSTEMS ENGINEERING Motivation: Data Protection European General Data Protection Regulation (GDPR) Goal: “Protection of natural persons with regard to the processing of personal data and on the free movement of such data” Personal data: “any information relating to an identified or identifiable natural person” (e.g., name, address, location data) GDPR defines data-related roles: Data Subject, Data Controller, Data Processor, Third Party GDPR stipulates the need for data protection by design Source: General Data Protection Regulation, “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC,” Official Journal of the European Union, p. L119, 016. 6 Data Protection (e.g., GDPR) Information Security (ISO 27000:2018)
  • 7. SOFTWARE SYSTEMS ENGINEERING Motivation: Overview 7 Edge Computing Data Protection (e.g., GDPR) Information Security (ISO 27000:2018) Measures for personal data protection
  • 8. SOFTWARE SYSTEMS ENGINEERING Motivation: The need for Edge Computing 8 Cloud End devices
  • 9. SOFTWARE SYSTEMS ENGINEERING Motivation: The need for Edge Computing 9 Cloud End devices
  • 10. SOFTWARE SYSTEMS ENGINEERING Motivation: The need for Edge Computing 10 Cloud End devices Two major problems: • High communication latencies • Network bandwidth congestion Data processing at the edge of the network (Edge computing)
  • 11. SOFTWARE SYSTEMS ENGINEERING Motivation: Edge Computing 11 Edge nodes End devices Cloud
  • 12. SOFTWARE SYSTEMS ENGINEERING Motivation: Overview 12 Measures for personal data protection Data Protection (e.g., GDPR) Information Security (ISO 27000:2018) Edge nodes End devices Cloud
  • 13. SOFTWARE SYSTEMS ENGINEERING Motivation: Complexity of Edge computing systems 13 Edge nodes End devices Cloud Enforcing Privacy by design is difficult Edge computing systems are complex: • Heterogeneous devices and networks • Unknown & untrusted actors with different data-related roles • Resource constrained devices • Dynamic network structures • …
  • 14. SOFTWARE SYSTEMS ENGINEERING Data-protection-related requirements on modeling languages for modeling the static architecture of edge computing systems [1]: • (R-1) Network properties • (R-2) Devices • (R-3) Actors • (R-4) Data properties Motivation: Privacy by design in Edge computing 14 No modeling language which covers all requirements GDPR requires systems processing personal data to ensure data protection by design Data protection challenges must be considered already in the static architectural design of the system Modeling languages are commonly used for the architectural design of a system
  • 15. paluno – The Ruhr Institute for Software Technology Aim of the paper: - Create a modeling language which satisfies the identified four requirements concerning the design of the architecture of edge computing systems, accounting for data protection 15 UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems
  • 16. SOFTWARE SYSTEMS ENGINEERING Privacy by design in Edge Computing using UMLsec 16 Data-protection-related requirements on modeling languages for modeling the static architecture of edge computing systems [1]: • (R-1) Network properties • (R-2) Devices • (R-3) Actors • (R-4) Data properties Partially fulfilled by UMLsec Fulfilled by UMLsec UMLsec is capable of modeling information security aspects for software systems We identified the UML profile UMLsec as a promising starting point for modeling data protection concerns in edge computing systems We have investigated several related works in order to find a modeling language that we can use as a starting point
  • 17. SOFTWARE SYSTEMS ENGINEERING 17 Research Approach Creation of the UML profile secEdge Previous work: [1] This work Application of UMLsec4Edge to real-world use cases Data protection-related requirements secEdge UMLsec4Edge UMLsec4Edge deployment & class diagrams Integration of the secEdge profile into the UMLsec profile
  • 18. SOFTWARE SYSTEMS ENGINEERING 18 Research Approach Creation of the UML profile secEdge Previous work: [1] This work Application of UMLsec4Edge to real-world use cases Data protection-related requirements secEdge UMLsec4Edge UMLsec4Edge deployment & class diagrams Integration of the secEdge profile into the UMLsec profile
  • 19. SOFTWARE SYSTEMS ENGINEERING 19 Restriction of UMLsec leading to non-fulfilment of the requirements Data protection-related requirement Restriction of UMLsec leading to non-fulfilment of the requirement (R-1) Network properties Lack of ability to model wireless data transmission (R-2) Devices Lack of ability to model the threat of unauthorized physical access to device types in edge computing systems Lack of ability to model threats between components on the same node (R-3) Actors Lack of ability to model relationships between actors and data Lack of ability to model trust relationships between actors Lack of ability to model actors with multiple data-specific roles (R-4) Data properties Already covered by UMLsec We extend UMLsec with respect to deployment diagrams We extend UMLsec with respect to class diagrams
  • 20. SOFTWARE SYSTEMS ENGINEERING 20 Research Approach Creation of the UML profile secEdge Previous work: [1] This work Application of UMLsec4Edge to real-world use cases Data protection-related requirements secEdge UMLsec4Edge UMLsec4Edge deployment & class diagrams Integration of the secEdge profile into the UMLsec profile
  • 21. SOFTWARE SYSTEMS ENGINEERING 21 Solution provided by UMLsec4Edge to satisfy the requirements Data protection-related requirement Restriction of UMLsec leading to non-fulfilment of the requirement Solution provided by UMLsec4Edge Stereotype Tag (R-1) Network properties Lack of ability to model wireless data transmission <<Wireless>>, <<3G>>, <<4G>>, <<5G>>, <<RFID>>, <<NFC>>, <<Bluetooth>>, <<WLAN>> (R-2) Devices Lack of ability to model the threat of unauthorized physical access to device types in edge computing systems <<ComputingContinuumDevice >>, <<EndDevice>>, <<EdgeNode>>, <<Cloud>> Lack of ability to model threats between components on the same node <<internal>> (R-3) Actors Lack of ability to model relationships between actors and data <<Actor>>, <<DataTraceability>> rights, obligations Lack of ability to model trust relationships between actors <<Actor>> trusts Lack of ability to model actors with multiple data-specific roles <<Actor>> roles (R-4) Data properties Already covered by UMLsec
  • 23. SOFTWARE SYSTEMS ENGINEERING 23 Research Approach Creation of the UML profile secEdge Previous work: [1] This work Application of UMLsec4Edge to real-world use cases Data protection-related requirements secEdge UMLsec4Edge UMLsec4Edge deployment & class diagrams Integration of the secEdge profile into the UMLsec profile
  • 24. SOFTWARE SYSTEMS ENGINEERING Example of the restrictions of UMLsec in deployment diagrams 24 No possibility to define threats emerging from wireless communication types No possibility to define threats emerging from end devices, edge nodes and cloud data centers
  • 25. SOFTWARE SYSTEMS ENGINEERING Example of the restrictions of UMLsec in class diagrams 25 No possibility to model a relationship between the stored data and actors No possibility to model that it is an actor with date- specific roles
  • 26. SOFTWARE SYSTEMS ENGINEERING UMLsec4Edge overcoming the restrictions in deployment diagrams 26 Stereotype Threats <<5G>> {read} <<Cloud>> {access} <<EdgeNode>> {access} <<EndDevice>> {access} <<internal>> {delete, read, insert}
  • 27. SOFTWARE SYSTEMS ENGINEERING UMLsec4Edge overcoming the restrictions in class diagrams 27
  • 28. SOFTWARE SYSTEMS ENGINEERING Conclusion We presented UMLsec4Edge as an extension to UMLsec UMLsec4Edge enables modeling of data protection aspects in the static design of edge computing systems • Possible to evaluate data protection in edge computing systems at design time • Possible to identify threats to data protection in edge computing systems Future work: • Application of the results of this paper to related domains (e.g., IoT) / additional use cases • Evaluation of further UMLsec diagram types • Automated analysis of UMLsec4Edge diagrams using for example the Object Constraint Language 28 More details can be found in the paper
  • 29. Thank you for your attention Sven Smolka, Jan Laufer, Zoltán Ádám Mann, Klaus Pohl 48th Euromicro Conference Series on Software Engineering and Advanced Applications
  • 30. SOFTWARE SYSTEMS ENGINEERING Literature [1] J. Laufer, Z. A. Mann, and A. Metzger, “Modelling data protection in fog computing systems using UMLsec and SysML-Sec,” in MODELS-C. IEEE, 2021, pp. 777–786. 30