[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 427))

Abstract

Security issues over cloud computing is definitely one of the major concerns that many companies are trying to recognize. However, some companies are also concerned about regulatory issues. Market observers say that a lot of the participants in the survey worry that they will be tied to one provider of cloud storage. Experts opine that cloud computing is at its nascent stage and providers will have to address issues related security, availability, and more to expand in the future. This paper presents a literature review of privacy and security approaches for cloud computing, and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve. This work will be done following the Systematic Review approach. Our results concluded that the research field of security approaches for cloud is still poor of methods and metrics for evaluating and comparing different techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Suby, M.: Best Practice Security In a Cloud-Enabled WorldCloud. An Executive Brief Sponsored by IBM (2014)

    Google Scholar 

  2. Encina, O., et al.: Towards secure inter-cloud architectures. In: Proceedings of Nordic pattern conference on Pattern Languages of Programs, Sagadi Manor, Estonia (2014)

    Google Scholar 

  3. Cloud Computing Use Case Discussion Group. Cloud Computing UseCases V. 3.0 (2010)

    Google Scholar 

  4. ENISA: Cloud computing: benefits, risks and recommendations for information security (2010). http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computingrisk-assessment

  5. Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt), pp. 31–35, June 2008

    Google Scholar 

  6. Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S.: Securing elastic applications on mobile devices for cloud computing. In: Proceeding ACM workshop on Cloud computing security, CCSW ’09, Chicago, IL, USA, November. 2009

    Google Scholar 

  7. Sen, J.: Security and Privacy Issues in Cloud Computing Innovation. Labs, Tata Consultancy Services Ltd., Kolkata (2013)

    Google Scholar 

  8. Wang, S., Wang, X.S.: In-device spatial cloaking for mobile user privacy assisted by the cloud. In: Proceeding 11th International Conference on Mobile Data Management,MDM ’10, Missouri, USA, May 2010

    Google Scholar 

  9. Huan, D., Zhang, X., Kang , M., Luo , J.: MobiCloud: building secure cloud framework for mobile computing and communication, In: Proceeding 5th IEEE International Symposium on Service Oriented System Engineering, SOSE ’10, Nanjing, China, June 2010

    Google Scholar 

  10. Niranjanamurthy, M., et al.: Comparative Study on Cloud Computing (CC) and Mobile Cloud Computing (MCC). Int. J. Comput. Sci. Mob. Comput., 3(10), 280–290 (2014)

    Google Scholar 

  11. Suo, H., et al.: Security and privacy in mobile cloud computing. In: Wireless Communications and Mobile Computing Conference (IWCMC). pp. 655–659. IEEE. Sardinia (2013)

    Google Scholar 

  12. Clément, Q : Cloud environment selection and configuration: a software product lines-based approach. Ph.D’s thesis, University of Lille 1, France (2014)

    Google Scholar 

  13. Kitchenham, B., Charters, S.: Guidelines for performing Systematic Literature reviews in Software Engineering Version 2.3, Keele University (2007)

    Google Scholar 

  14. Itani, W., Kayssi, A., Chehab, A.: Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: Proceeding International Conference on Energy Aware Computing, ICEAC ’10, Cairo, Egypt, December 2010

    Google Scholar 

  15. Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.,: SDSM: a secure data service mechanism in mobile cloud computing. In: Proceeding IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, April 2011

    Google Scholar 

  16. Huang, D., Zhou, Z., Xu, L., Xing, T., Zhong, Y.: Secure data processing framework for mobilecloud computing, In: Proceeding IEEE INFOCOM Workshop on Cloud Computing, INFOCOM ’11, Shanghai, China, June 2011

    Google Scholar 

  17. Clément Q., et al.:Automated selection and configuration of cloud environments using software product lines principles. In: Proceedings of the 7th IEEE International Conference on Cloud Computing, CLOUD’14.Anchorage, Alaska (USA) (2014)

    Google Scholar 

  18. Balachandra, R.K., Ramakrishna, P.V., Rakshit, A.: Cloud security issues. In: PROC‘09 IEEE International Conference on Services Computing, 2009, pp 517–520 (2009)

    Google Scholar 

  19. Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud computing security issues and challenges. Int. J. Comput. Netw. (IJCN), 3(5) (2011)

    Google Scholar 

  20. Hashizume, K., et al.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 5 (2013)

    Article  Google Scholar 

  21. Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M.: Systematic literature reviews in software engineering–a Systematic literature reviews, Keele University (2008)

    Google Scholar 

  22. Fernandez, E.B., Monge, R., Hashizume, K.: Building a security reference architecture for cloud systems, Requir. Eng. (2015)

    Google Scholar 

  23. Fernandez, E.B., Yoshioka, N., Washizaki, H.: Cloud Access Security Broker (CASB): a pattern for secure access to cloud services. In: 4th Asian Conference on Pattern Languages of Programs, Asian PLoP’15, Tokyo, Japan (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Amoud .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Amoud, M., Roudiès, O. (2016). A Systematic Review of Security in Cloud Computing. In: Abraham, A., Wegrzyn-Wolska, K., Hassanien, A., Snasel, V., Alimi, A. (eds) Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015. Advances in Intelligent Systems and Computing, vol 427. Springer, Cham. https://doi.org/10.1007/978-3-319-29504-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29504-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29503-9

  • Online ISBN: 978-3-319-29504-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics