Design of FAHP based Security Framework under Agile Software Development

Authors

  • Sangeeta Mishra Ph.d., Research Scholar, Computer Science & Engineering, Integral University, Lucknow, Uttar Pradesh, India
  • Mohd. Haroon Professor, Computer Science & Engineering,Integral University, Lucknow, Uttar Pradesh, India

Keywords:

Software security, Agile software development, Analytic Hierarchy Process (AHP), Fuzzy AHP

Abstract

Software security is becoming complex under projects development phase. It has challenges for assessment of security type and level with cost-effective solutions. Agile Software Development (ASD) is significantly associated with self-management. Thus, product development team and the owners expects to manage security prioritization. This paper is addressing a framework that influences the priority given to security under Agile Software Development through support & interactions of teams rather than fixed priorities and activities. To perform this task effectively it is desired to understand the factors that supports or hinders in decision of prioritizing the security. Based on the deep study of vast number of literature an insight of strategy applied for influencing the priority of security  by security professional is framed under environment of agile software development process. The result are helpful in influencing the process of finding factors under priority during security framework design using approach of Fuzzy Analytic Hierarchy Process (FAHP) that helps to understand the key features for security system design.

Downloads

Download data is not yet available.

References

F. Moyon, K. Beckers, S. Klepper, P. Lachberger, and B. Bruegge,“Towards continuous security compliance in agile software development at scale,” in 4th International Workshop RCoSE. Sweden: ACM, 2018.

J. Wayrynen, M. Bod ¨ en, and G. Bostr ´ om, “Security Engineering and ¨ eXtreme Programming: An Impossible Marriage?” in Extreme Programming and Agile Methods-XP/Agile Universe. Germany: Springer, 2004.

K. Rindell, S. Hyrynsalmi, and V. Leppanen, “A comparison of security ¨ assurance support of agile software development methods,” in Proceedings of the 16th International on CompSysTech. Ireland: ACM, 2015.

K. Rindell, S. Hyrynsalmi, and V. Leppanen, “Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency,” in 11th ARES. Austria: IEEE, 2016.

S. Dannart, F. Moy ¨ on, and K. Beckers, “An Assessment Model for ´ Continuous Security Compliance in Large Scale Agile Environments: Exploratory Paper,” in Advanced Information Systems Engineering. Switzerland: Springer, 2019.

Tondel, I.A., Cruzes, D.S., Jaatun, M.G., 2020a. Achieving" Good Enough" software security: the role of objectivity. In: EASE ’20: Proceedings of the Evaluation and Assessment in Software Engineering, pp. 360–365. doi:10.1145/3383219. 3383267.

K. Beck, M. Beedle, A. Van Bennekum, A. Cockburn, W. Cunningham, M. Fowler, J. Grenning, J. Highsmith, A. Hunt, R. Jeffries (2001) Manifesto for agile software development. https://agilemanifesto.org/

Blaine, J.D., Cleland-Huang, J., 2008. Software quality requirements: how to balance competing priorities. IEEE Softw. 25 (2), 22–24. doi:10.1109/MS.2008.46.

S. Türpe, A. Poller (2017) Managing security work in scrum: tensions and challenges. SecSE@ ESORICS 2017:34–49.

Inayat, I., Salim, S.S., Marczak, S., Daneva, M., Shamshirband, S., 2015. A systematic literature review on agile requirements engineering practices and challenges. Comput. Hum. Behav. 51, 915–929. doi:10.1016/j.chb.2014.10.046.

Oueslati, H., Rahman, M.M., Lb, O., 2015. Literature Review of the challenges of developing secure software using the agile approach. In: Proceedings of the 10th International Conference on Availability, Reliability and Security, pp. 540–547. doi:10.1109/ares.2015.69 24-27 Aug. 2015.

Khaim, R., Naz, S., Abbas, F., Iqbal, N., Hamayun, M., 2016. A review of security integration technique in agile software development. Int. J. Softw. Eng. Appl. 7, 49–68 IJSEA3.

Alsaqaf, W., Daneva, M., Wieringa, R., 2019. Quality requirements challenges in the context of large-scale distributed agile: an empirical study. Inf. Softw. Technol.110, 39–55. doi:10.1016/j.infsof.2019.01.009

Behutiye, W., Karhapää, P., López, L., Burgués, X., Martínez-Fernández, S., Vollmer, A.M., Rodríguez, P., Franch, X., Oivo, M., 2020. Management of quality requirements in agile and rapid software development: a systematic mapping study. Inf. Softw. Technol. 123, 106225. doi:10.1016/j.infsof.2019.106225.

Jarzebowicz, ˛ A., Weichbroth, P., Przybyłek, A., Miler, J., Poth, A., Riel, A., 2021. A Systematic literature review on implementing non-functional requirements in agile software development: issues and facilitating practices. In: Lean and Agile Software Development, LASD 2021, 408. Springer, Cham, pp. 91–110. doi:10.1007/ 978-3-030-67084-9_6.

Rindell, K., Hyrynsalmi, S., Leppänen, V., 2017. Busting a myth: review of agile security engineering methods. In: ARES ’17: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1–10. doi:10.1145/ 3098954.3103170.

Schwaber, K., 2004. Agile Project Management with Scrum. Microsoft press.

Williams, L., Meneely, A., Shipley, G., 2010. Protection poker: the new software security "Game". IEEE Secur. Priv. 14–20. doi:10.1109/msp.2010.58, 8.3.

Pohl, C., Hof, H.J., 2015. Secure scrum: development of secure software with scrum. arXiv Prepr. arXiv:1507.02992.

Koç, G., Aydos, M., 2017. Trustworthy scrum: development of secure software with scrum. In: Proceedings of the International Conference on Computer Science and Engineering (UBMK), IEEE.

Baldassarre, M.T., Barletta, V.S., Caivano, D., Piccinno, A., 2021. Integrating Security and Privacy in HCD-Scrum. In: Proceedings of the 14th Biannual Conference of the Italian SIGCHI Chapter. Bolzano, Italy, p. 37. doi:10.1145/3464385.3464746.

Weir, C., Rashid, A., Noble, J., 2020b. Challenging software developers: dialectic as a foundation for security assurance techniques. J. Cybersecur. 6 (1). doi:10.1093/ cybsec/tyaa007.

Siddiqui, Z. A., & Haroon, M. (2023). Research on significant factors affecting adoption of blockchain technology for enterprise distributed applications based on integrated MCDM FCEM-MULTIMOORA-FG method. Engineering Applications of Artificial Intelligence, 118, 105699.

Khan, M., &Haroon, M. (2023, August). Artificial Neural Network-based Intrusion Detection in Cloud Computing using CSE-CIC-IDS2018 Datasets. In 2023 3rd Asian Conference on Innovation in Technology (ASIANCON) (pp. 1-4). IEEE.

Siddiqui, Z. A., &Haroon, M. (2023). Research on significant factors affecting adoption of blockchain technology for enterprise distributed applications based on integrated MCDM FCEM-MULTIMOORA-FG method. Engineering Applications of Artificial Intelligence, 118, 105699.

Downloads

Published

24.03.2024

How to Cite

Mishra, S. ., & Haroon , M. . (2024). Design of FAHP based Security Framework under Agile Software Development. International Journal of Intelligent Systems and Applications in Engineering, 12(18s), 292–302. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4973

Issue

Section

Research Article