CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

A Systematic Mapping Study on Cloud Computing Security

by Noman Mazher, Imran Ashraf
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 16
Year of Publication: 2014
Authors: Noman Mazher, Imran Ashraf
10.5120/15713-4448

Noman Mazher, Imran Ashraf . A Systematic Mapping Study on Cloud Computing Security. International Journal of Computer Applications. 89, 16 ( March 2014), 6-9. DOI=10.5120/15713-4448

@article{ 10.5120/15713-4448,
author = { Noman Mazher, Imran Ashraf },
title = { A Systematic Mapping Study on Cloud Computing Security },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 16 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number16/15713-4448/ },
doi = { 10.5120/15713-4448 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:09:23.240963+05:30
%A Noman Mazher
%A Imran Ashraf
%T A Systematic Mapping Study on Cloud Computing Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 16
%P 6-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

From last two decades hype of cloud computing has been increased largely. With all of its advantageous cloud computing has some potential disadvantages. One of which is security . Cloud computing security has been discussed by many researchers. Researchers are paying their much attention about security of cloud computing. In this research we will investigate major areas of research in domain of cloud computing security. By using empirical study method we will statically prove that in which area there is most research in domain of cloud computing security.

References
  1. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 12/31/2008 2008.
  2. S. e. o. c. Pearson and G. e. o. c. Yee, Privacy and security for cloud computing.
  3. D. G. Rosado, Security engineering for cloud computing : approaches and tools.
  4. B. R. Kandukuri, V. R. Paturi, and A. Rakshit, "Cloud security issues," in Services Computing, 2009. SCC'09. IEEE International Conference on, 2009, pp. 517-520.
  5. Y. Chen, V. Paxson, and R. H. Katz, "What's new about cloud computing security," University of California, Berkeley Report No. UCB/EECS-2010-5 January, vol. 20, pp. 2010-5, 2010.
  6. C. Almond, "A practical guide to cloud computing security," A white paper from Accenture and Microsoft, 2009.
  7. H. Takabi, J. B. Joshi, and G. -J. Ahn, "Security and privacy challenges in cloud computing environments," Security & Privacy, IEEE, vol. 8, pp. 24-31, 2010.
  8. K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson, "Systematic mapping studies in software engineering," in 12th International Conference on Evaluation and Assessment in Software Engineering, 2008, p. 1.
  9. N. Condori-Fernandez, M. Daneva, K. Sikkel, R. Wieringa, O. Dieste, and O. Pastor, "A systematic mapping study on empirical evaluation of software requirements specifications techniques," in Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement, 2009, pp. 502-505.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing cloud computing security empirical study.