Skip to main content

Advances, Systems and Applications

Table 1 Catalogue of requirements

From: Data security in decentralized cloud systems – system comparison, requirements analysis and organizational levels

ID

Description

CO

Basic system requirements

 CO1

System as central authority of trust (“Trusted Party”)

 CO2

Use of services offered at the market, which need little user configuration

 CO3

Basic use of system without user costs

 CO4

Alternative selection of data security level

 CO5

Provide possibility for data encryption on storage medium

 CO6

Integration of user management

 CO7

Complete availability of necessary resources in the form of data

DS

Data Security

 DS1

Data security has to be highlighted visually for the user

 DS2

Control over data usage with an option for (automatic) deletion

 DS3

Simple rights management to avoid conflicts

 DS4

User anonymity within the system

 DS5

Personal data protection through user or authority for data management

 DS6

Attached protection policies for data

 DS7

Co-data security for jointly created user data (Co-Privacy)

 DS8

Recommendation for data security settings

TR

Trust

 TR1

Centralization of trust

 TR2

Creation of trust of the user (i.e., via support from other user)

RM

Relationship Management

 RM1

Support for contact management

 RM2

Automatic derivation of relations

SY

System Design

 SY1

High number of data sources through a high abstraction of the access layer

 SY2

Concept for the availability and non-availability of user data

 SY3

System robustness against attacks and incorrect data

 SY4

Fine granular

 SY5

Inoperability

 SY6

Rights and interaction management based on relationships

 SY7

High-performance search within the network

 SY8

Self-presentation management (monitoring/feedback)