Security in Cloud Computing: a Mapping Study

被引:17
作者
Cruz Zapata, Belen [1 ]
Luis Fernandez-Aleman, Jose [1 ]
Toval, Ambrosio [1 ]
机构
[1] Univ Murcia, Fac Comp Sci, Murcia 30100, Spain
关键词
cloud computing; security; mapping study; PERSONAL HEALTH RECORDS; INFORMATION SECURITY; ARCHITECTURE; PRIVACY; DESIGN; ISSUES;
D O I
10.2298/CSIS140205086C
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A number of cloud applications are currently widely used. However, one of the main reasons for the slowing down in the growth of cloud computing is that of security. Even though some research has been done in the security field, it is necessary to assess the current state of research and practice. This paper aims for the study of the existing research about security in cloud computing to analyze the state of art and to identify future directions. The method selected to investigate the security in cloud computing is a systematic mapping study. A total of 344 papers were selected and classified by security goal, research type and contribution type. The main security specific issues extracted are data protection (30.29%), access management (20.14%), software isolation (16.70%), availability (16.00%), trust (13.60%) and governance (3.27%). Our results demonstrate that cloud computing seems to be a promising area for security research and evaluation.
引用
收藏
页码:161 / 184
页数:24
相关论文
共 68 条
  • [1] Airton Pereira da Silva F., 2012, P 8 INT C GRID COMP, P3
  • [2] A Cloud-Based Pervasive Serious Game Framework to Support Obesity Treatment
    Alamri, Atif
    Hossain, M. Anwar
    Hassan, Mohammad Mehedi
    Hossain, M. Shamim
    Alnuem, Mohammed
    Ahmed, Dewan Tanvir
    El Saddik, Abdulmotaleb
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (03) : 1229 - 1246
  • [3] Research state of the art on GoF design patterns: A mapping study
    Ampatzoglou, Apostolos
    Charalampidou, Sofia
    Stamelos, Ioannis
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (07) : 1945 - 1964
  • [4] [Anonymous], 27017 ISOIEC DIS
  • [5] [Anonymous], 2009, NIST DEFINITION CLOU
  • [6] [Anonymous], 2013, NIST SPEC PUBL, V500-299
  • [7] Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI DOI 10.1145/2245276.2232005
  • [8] Presenting software engineering results using structured abstracts: a randomised experiment
    Budgen, David
    Kitchenham, Barbara A.
    Charters, Stuart M.
    Turner, Mark
    Brereton, Pearl
    Linkman, Stephen G.
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2008, 13 (04) : 435 - 468
  • [9] Cachin Christian, 2009, SIGACT News, V40, P81, DOI 10.1145/1556154.1556173
  • [10] Campbell R., 2009, P 2009 C HOT TOP CLO