Security in Cloud Computing: a Mapping Study

被引:17
作者
Cruz Zapata, Belen [1 ]
Luis Fernandez-Aleman, Jose [1 ]
Toval, Ambrosio [1 ]
机构
[1] Univ Murcia, Fac Comp Sci, Murcia 30100, Spain
关键词
cloud computing; security; mapping study; PERSONAL HEALTH RECORDS; INFORMATION SECURITY; ARCHITECTURE; PRIVACY; DESIGN; ISSUES;
D O I
10.2298/CSIS140205086C
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A number of cloud applications are currently widely used. However, one of the main reasons for the slowing down in the growth of cloud computing is that of security. Even though some research has been done in the security field, it is necessary to assess the current state of research and practice. This paper aims for the study of the existing research about security in cloud computing to analyze the state of art and to identify future directions. The method selected to investigate the security in cloud computing is a systematic mapping study. A total of 344 papers were selected and classified by security goal, research type and contribution type. The main security specific issues extracted are data protection (30.29%), access management (20.14%), software isolation (16.70%), availability (16.00%), trust (13.60%) and governance (3.27%). Our results demonstrate that cloud computing seems to be a promising area for security research and evaluation.
引用
收藏
页码:161 / 184
页数:24
相关论文
共 68 条
  • [11] Personal Health Records: New Means to Safely Handle Health Data?
    Carrion Senor, Inmaculada
    Fernandez Aleman, Jose Luis
    Toval, Ambrosio
    [J]. COMPUTER, 2012, 45 (11) : 27 - 33
  • [12] Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies
    Carrion Senor, Inmaculada
    Luis Fernandez-Aleman, Jose
    Toval, Ambrosio
    [J]. JOURNAL OF MEDICAL INTERNET RESEARCH, 2012, 14 (04) : e114
  • [13] Cearly D., CASE STUDIES CLOUD C
  • [14] Cellan-Jones R., SIDEKICK CLOUD DISAS
  • [15] What are ontologies, and why do we need them?
    Chandrasekaran, B
    Josephson, JR
    Benjamins, VR
    [J]. IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1999, 14 (01): : 20 - 26
  • [16] A Secure Mobile DRM System Based on Cloud Architecture
    Chen, Chin-Ling
    Tsaur, Woei-Jiunn
    Chen, Yu-Yi
    Chang, Yao-Chung
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (03) : 925 - 941
  • [17] Chi-Chun Lo, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P280, DOI 10.1109/ICPPW.2010.46
  • [18] Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    Chonka, Ashley
    Xiang, Yang
    Zhou, Wanlei
    Bonti, Alessio
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1097 - 1107
  • [19] Dahbur K., 2011, P 2011 INT C INT SEM
  • [20] Dhage S.N., 2011, International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) ' TCET, P235