Abstract
Security issues over cloud computing is definitely one of the major concerns that many companies are trying to recognize. However, some companies are also concerned about regulatory issues. Market observers say that a lot of the participants in the survey worry that they will be tied to one provider of cloud storage. Experts opine that cloud computing is at its nascent stage and providers will have to address issues related security, availability, and more to expand in the future. This paper presents a literature review of privacy and security approaches for cloud computing, and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve. This work will be done following the Systematic Review approach. Our results concluded that the research field of security approaches for cloud is still poor of methods and metrics for evaluating and comparing different techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Suby, M.: Best Practice Security In a Cloud-Enabled WorldCloud. An Executive Brief Sponsored by IBM (2014)
Encina, O., et al.: Towards secure inter-cloud architectures. In: Proceedings of Nordic pattern conference on Pattern Languages of Programs, Sagadi Manor, Estonia (2014)
Cloud Computing Use Case Discussion Group. Cloud Computing UseCases V. 3.0 (2010)
ENISA: Cloud computing: benefits, risks and recommendations for information security (2010). http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computingrisk-assessment
Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt), pp. 31–35, June 2008
Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S.: Securing elastic applications on mobile devices for cloud computing. In: Proceeding ACM workshop on Cloud computing security, CCSW ’09, Chicago, IL, USA, November. 2009
Sen, J.: Security and Privacy Issues in Cloud Computing Innovation. Labs, Tata Consultancy Services Ltd., Kolkata (2013)
Wang, S., Wang, X.S.: In-device spatial cloaking for mobile user privacy assisted by the cloud. In: Proceeding 11th International Conference on Mobile Data Management,MDM ’10, Missouri, USA, May 2010
Huan, D., Zhang, X., Kang , M., Luo , J.: MobiCloud: building secure cloud framework for mobile computing and communication, In: Proceeding 5th IEEE International Symposium on Service Oriented System Engineering, SOSE ’10, Nanjing, China, June 2010
Niranjanamurthy, M., et al.: Comparative Study on Cloud Computing (CC) and Mobile Cloud Computing (MCC). Int. J. Comput. Sci. Mob. Comput., 3(10), 280–290 (2014)
Suo, H., et al.: Security and privacy in mobile cloud computing. In: Wireless Communications and Mobile Computing Conference (IWCMC). pp. 655–659. IEEE. Sardinia (2013)
Clément, Q : Cloud environment selection and configuration: a software product lines-based approach. Ph.D’s thesis, University of Lille 1, France (2014)
Kitchenham, B., Charters, S.: Guidelines for performing Systematic Literature reviews in Software Engineering Version 2.3, Keele University (2007)
Itani, W., Kayssi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: Proceeding International Conference on Energy Aware Computing, ICEAC ’10, Cairo, Egypt, December 2010
Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.,: SDSM: a secure data service mechanism in mobile cloud computing. In: Proceeding IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, April 2011
Huang, D., Zhou, Z., Xu, L., Xing, T., Zhong, Y.: Secure data processing framework for mobilecloud computing, In: Proceeding IEEE INFOCOM Workshop on Cloud Computing, INFOCOM ’11, Shanghai, China, June 2011
Clément Q., et al.:Automated selection and configuration of cloud environments using software product lines principles. In: Proceedings of the 7th IEEE International Conference on Cloud Computing, CLOUD’14.Anchorage, Alaska (USA) (2014)
Balachandra, R.K., Ramakrishna, P.V., Rakshit, A.: Cloud security issues. In: PROC‘09 IEEE International Conference on Services Computing, 2009, pp 517–520 (2009)
Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. (IJCN), 3(5) (2011)
Hashizume, K., et al.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 5 (2013)
Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M.: Systematic literature reviews in software engineering–a Systematic literature reviews, Keele University (2008)
Fernandez, E.B., Monge, R., Hashizume, K.: Building a security reference architecture for cloud systems, Requir. Eng. (2015)
Fernandez, E.B., Yoshioka, N., Washizaki, H.: Cloud Access Security Broker (CASB): a pattern for secure access to cloud services. In: 4th Asian Conference on Pattern Languages of Programs, Asian PLoP’15, Tokyo, Japan (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Amoud, M., Roudiès, O. (2016). A Systematic Review of Security in Cloud Computing. In: Abraham, A., Wegrzyn-Wolska, K., Hassanien, A., Snasel, V., Alimi, A. (eds) Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015. Advances in Intelligent Systems and Computing, vol 427. Springer, Cham. https://doi.org/10.1007/978-3-319-29504-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-29504-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-29503-9
Online ISBN: 978-3-319-29504-6
eBook Packages: EngineeringEngineering (R0)