Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Systematic Mapping Study on Cloud Computing Security

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 89 - Number 16
Year of Publication: 2014
Authors:
Noman Mazher
Imran Ashraf
10.5120/15713-4448

Noman Mazher and Imran Ashraf. Article: A Systematic Mapping Study on Cloud Computing Security. International Journal of Computer Applications 89(16):6-9, March 2014. Full text available. BibTeX

@article{key:article,
	author = {Noman Mazher and Imran Ashraf},
	title = {Article: A Systematic Mapping Study on Cloud Computing Security},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {89},
	number = {16},
	pages = {6-9},
	month = {March},
	note = {Full text available}
}

Abstract

From last two decades hype of cloud computing has been increased largely. With all of its advantageous cloud computing has some potential disadvantages. One of which is security . Cloud computing security has been discussed by many researchers. Researchers are paying their much attention about security of cloud computing. In this research we will investigate major areas of research in domain of cloud computing security. By using empirical study method we will statically prove that in which area there is most research in domain of cloud computing security.

References

  • L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 12/31/2008 2008.
  • S. e. o. c. Pearson and G. e. o. c. Yee, Privacy and security for cloud computing.
  • D. G. Rosado, Security engineering for cloud computing : approaches and tools.
  • B. R. Kandukuri, V. R. Paturi, and A. Rakshit, "Cloud security issues," in Services Computing, 2009. SCC'09. IEEE International Conference on, 2009, pp. 517-520.
  • Y. Chen, V. Paxson, and R. H. Katz, "What's new about cloud computing security," University of California, Berkeley Report No. UCB/EECS-2010-5 January, vol. 20, pp. 2010-5, 2010.
  • C. Almond, "A practical guide to cloud computing security," A white paper from Accenture and Microsoft, 2009.
  • H. Takabi, J. B. Joshi, and G. -J. Ahn, "Security and privacy challenges in cloud computing environments," Security & Privacy, IEEE, vol. 8, pp. 24-31, 2010.
  • K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson, "Systematic mapping studies in software engineering," in 12th International Conference on Evaluation and Assessment in Software Engineering, 2008, p. 1.
  • N. Condori-Fernandez, M. Daneva, K. Sikkel, R. Wieringa, O. Dieste, and O. Pastor, "A systematic mapping study on empirical evaluation of software requirements specifications techniques," in Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement, 2009, pp. 502-505.