An Enhanced Cloud Security Model through Z Formal Method

Authors

  • Kassem Mulapnen Haruna
  • Hosea Isaac Gungbias

DOI:

https://doi.org/10.46610/JoISSCCR.2025.v02i01.001

Keywords:

Accounting, Auditing, Authentication, Authorization, Availability, Cloud computing, Confidentiality, Formal methods, Integrity, Non-repudiation, Validation, Verification

Abstract

Cloud computing has changed how people and organizations use technology, allowing them to lower IT expenses, offer more services, and launch new business models. Despite its tremendous advantages, the downside that tends to discourage existing and intending users is the issue of security. Security issues ranging from vulnerability of the cloud systems to threats and attacks imply that users' data and resources are not safe and secure. The security issues of cloud computing systems often stem from the security requirements that are either inadequate or ambiguous, as well as the technique used to collect these requirements for developing cloud systems. To ensure enhanced security for cloud data, this study applies the Z specification technique to cloud security requirements. The Z Word Tool validates these requirements, ensuring completeness, consistency, and correctness. Comparative analysis with existing research highlights this study's novelty in employing Z Word Tool's type checker to verify and validate security requirements schema. The proposed enhanced model offers a robust guide for cloud system developers, achieving superior validation accuracy.

Published

2025-01-23

How to Cite

Mulapnen Haruna, K., & Isaac Gungbias, H. (2025). An Enhanced Cloud Security Model through Z Formal Method. Journal of Information Security System and Cyber Criminology Research, 2(1), 1–13. https://doi.org/10.46610/JoISSCCR.2025.v02i01.001