Security in cloud computing: A mapping study

25Citations
Citations of this article
85Readers
Mendeley users who have this article in their library.

Abstract

A number of cloud applications are currently widely used. However, one of the main reasons for the slowing down in the growth of cloud computing is that of security. Even though some research has been done in the security field, it is necessary to assess the current state of research and practice. This paper aims for the study of the existing research about security in cloud computing to analyze the state of art and to identify future directions. The method selected to investigate the security in cloud computing is a systematic mapping study. A total of 344 papers were selected and classified by security goal, research type and contribution type. The main security specific issues extracted are data protection (30.29%), access management (20.14%), software isolation (16.70%), availability (16.00%), trust (13.60%) and governance (3.27%). Our results demonstrate that cloud computing seems to be a promising area for security research and evaluation.

Author supplied keywords

Cite

CITATION STYLE

APA

Cruz Zapata, B., Fernández-Alemán, J. L., & Toval, A. (2015). Security in cloud computing: A mapping study. Computer Science and Information Systems, 12(1), 161–184. https://doi.org/10.2298/CSIS140205086C

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free