Cloud Computing Security Requirements and Solutions: a Systematic Literature Review
نویسنده
چکیده
Although the technology and its application are not new, the rising awareness and implementations of cloud services and its underlying technologies cause the need for security requirements being up to date. Cloud computing security requirements have been addressed in publications earlier, but it is still difficult to estimate what kinds of requirements have been researched most, and which are still under-researched. This paper carries out a systematic literature review by identifying cloud computing security requirements from publications between January 2011 and March 2013. It will categorize these requirements in a framework and assess their frequency of research. The paper will then identify changes in the assessment of requirements and proposed solutions compared to publications prior to 2011. It has been found that the most researched sub-factors of security requirements are: Access Control, Data Integrity and Privacy & Confidentiality. Most under-researched areas are Recovery and Prosecution, with Non-repudiation and Physical Protection closely followed. Various improvements and nested methodologies in current approaches were identified rather than new solutions.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملRanking CloudService Providers using SWARA and VIKOR (A case of Irancell Company)
Cloud computing is a recent computing paradigm that represents a fundamental change of information commu- nication technology (ICT) services and Cloud services continue to grow rapidly with increasing functionality and more users. As a result of this growth, it is a critical issue to select a suitable Cloud service which meets all the business strategies and the objectives of firms. This paper ...
متن کاملRanking CloudService Providers using SWARA and VIKOR (A case of Irancell Company)
Cloud computing is a recent computing paradigm that represents a fundamental change of information commu- nication technology (ICT) services and Cloud services continue to grow rapidly with increasing functionality and more users. As a result of this growth, it is a critical issue to select a suitable Cloud service which meets all the business strategies and the objectives of firms. This paper ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013