Security in Cloud Computing: a Mapping Study

I have a new article published. For my PhD I write scientific articles that are submitted to scientific journals or conferences. This article is in English and it is published in Computer Science and Information Systems. The Computer Science and Information Systems journal is indexed in the Journal Citation Reports (JCR) and it has a two year impact factor of 0.575 (2013).

ComSIS publishes original papers of lasting value covering both theoretical foundations of computer science and commercial, industrial, or educational aspects that provide new insights into design and implementation of software and information systems.

Here is the reference and the link to my article:

Zapata, B. C., Fernández-Alemán, J. L., Toval, A.: Security in Cloud Computing: a Mapping Study. Computer Science and Information Systems, Vol. 12, No. 1, 161–184. (2015)

The abstract of the article:

JMS

A number of cloud applications are currently widely used. However, one of the main reasons for the slowing down in the growth of cloud computing is that of security. Even though some research has been done in the security field, it is necessary to assess the current state of research and practice. This paper aims for the study of the existing research about security in cloud computing to analyze the state of art and to identify future directions. The method selected to investigate the security in cloud computing is a systematic mapping study. A total of 344 papers were selected and classified by security goal, research type and contribution type. The main security specific issues extracted are data protection (30.29%), access management (20.14%), software isolation (16.7%), availability (16%), trust (13.6%) and governance (3.27%). Our results demonstrate that cloud computing seems to be a promising area for security research and evaluation.

Share Button

Leave a Reply

Your email address will not be published.

Time limit is exhausted. Please reload the CAPTCHA.