Security in Cloud Computing: a Mapping Study

Belén Cruz Zapata1, José Luis Fernández-Alemán1 and Ambrosio Toval1

  1. University of Murcia
    Spain
    {b.cruzzapata, aleman, atoval}@um.es

Abstract

A number of cloud applications are currently widely used. However, one of the main reasons for the slowing down in the growth of cloud computing is that of security. Even though some research has been done in the security field, it is necessary to assess the current state of research and practice. This paper aims for the study of the existing research about security in cloud computing to analyze the state of art and to identify future directions. The method selected to investigate the security in cloud computing is a systematic mapping study. A total of 344 papers were selected and classified by security goal, research type and contribution type. The main security specific issues extracted are data protection (30.29%), access management (20.14%), software isolation (16.7%), availability (16%), trust (13.6%) and governance (3.27%). Our results demonstrate that cloud computing seems to be a promising area for security research and evaluation.

Key words

cloud computing, security, mapping study

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS140205086C

Publication information

Volume 12, Issue 1 (January 2015)
Year of Publication: 2015
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Zapata, B. C., Fernández-Alemán, J. L., Toval, A.: Security in Cloud Computing: a Mapping Study. Computer Science and Information Systems, Vol. 12, No. 1, 161–184. (2015), https://doi.org/10.2298/CSIS140205086C