Open Access iconOpen Access



Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City

Muhammad Usman Tariq1, Muhammad Babar2, Mian Ahmad Jan3,4,5,*, Akmal Saeed Khattak6, Mohammad Dahman Alshehri7, Abid Yahya8

1 Abu Dhabi School of Management, Abu Dhabi, 6844, United Arab Emirates
2 Department of Computing and Technology, Iqra University, Islamabad, 44000, Pakistan
3 Institute of Research and Development, Duy Tan University, Da Nang, 550000, Vietnam
4 The Faculty of Information Technology, Duy Tan University, Da Nang, 550000, Vietnam
5 Department of Computer Sciences, Abdul Wali Khan University, Mardan, 23200, Pakistan
6 Department of Computer Sciences, Quaid-i-Azam University, Islamabad, 44000, Pakistan
7 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
8 Botswana International University of Science and Technology, Palapye, 016, Botswana

* Corresponding Author: Mian Ahmad Jan. Email: email

(This article belongs to the Special Issue: Machine Learning-based Secured and Privacy-preserved Smart City)

Computers, Materials & Continua 2021, 67(1), 625-639.


The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, and privacy. The key reason for cloud- and IoT-enabled smart city application failure is improper security practices at the early stages of development. This article proposes a framework to collect security requirements during the initial development phase of cloud-assisted IoT-enabled smart city applications. Its three-layered architecture includes privacy preserved stakeholder analysis (PPSA), security requirement modeling and validation (SRMV), and secure cloud-assistance (SCA). A case study highlights the applicability and effectiveness of the proposed framework. A hybrid survey enables the identification and evaluation of significant challenges.


Cite This Article

APA Style
Tariq, M.U., Babar, M., Jan, M.A., Khattak, A.S., Alshehri, M.D. et al. (2021). Security requirement management for cloud-assisted and internet of things—enabled smart city. Computers, Materials & Continua, 67(1), 625-639.
Vancouver Style
Tariq MU, Babar M, Jan MA, Khattak AS, Alshehri MD, Yahya A. Security requirement management for cloud-assisted and internet of things—enabled smart city. Comput Mater Contin. 2021;67(1):625-639
IEEE Style
M.U. Tariq, M. Babar, M.A. Jan, A.S. Khattak, M.D. Alshehri, and A. Yahya "Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City," Comput. Mater. Contin., vol. 67, no. 1, pp. 625-639. 2021.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2832


  • 1662


  • 0


Share Link