z-logo
open-access-imgOpen Access
Security in cloud computing: A mapping study
Author(s) -
Zapata Cruz,
José Luis FernándezAlemán,
Ambrosio Toval
Publication year - 2014
Publication title -
computer science and information systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.244
H-Index - 24
eISSN - 2406-1018
pISSN - 1820-0214
DOI - 10.2298/csis140205086c
Subject(s) - computer science , cloud computing , cloud computing security , computer security , field (mathematics) , data security , data science , encryption , operating system , mathematics , pure mathematics
A number of cloud applications are currently widely used. However, one of the main reasons for the slowing down in the growth of cloud computing is that of security. Even though some research has been done in the security field, it is necessary to assess the current state of research and practice. This paper aims for the study of the existing research about security in cloud computing to analyze the state of art and to identify future directions. The method selected to investigate the security in cloud computing is a systematic mapping study. A total of 344 papers were selected and classified by security goal, research type and contribution type. The main security specific issues extracted are data protection (30.29%), access management (20.14%), software isolation (16.70%), availability (16.00%), trust (13.60%) and governance (3.27%). Our results demonstrate that cloud computing seems to be a promising area for security research and evaluation.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom