Security Risk Assessment on Cloud: A Systematic Mapping Study

被引:0
|
作者
Annunziata, Giusy [1 ]
Sheykina, Alexandra [1 ]
Palomba, Fabio [1 ]
De Lucia, Andrea [1 ]
Catolino, Gemma [1 ]
Ferrucci, Filomena [1 ]
机构
[1] Univ Salerno, Salerno, Italy
关键词
Risk assessment; security testing; cloud computing;
D O I
10.1145/3661167.3661287
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has become integral to modern organizational operations, offering efficiency and agility. However, security challenges such as data loss and downtime necessitate tailored compliance solutions. Risk assessment is crucial for identifying and mitigating cloud-related threats, yet a standardized approach remains elusive. Our study aims to fill this gap by conducting a systematic mapping study on the prevailing methodologies. Through a meticulous analysis of 21 scholarly papers, we explore various aspects of security risk assessment for the cloud. The results provide valuable insights into delivery models, standards, and validation practices, contributing to a comprehensive understanding of cloud risk assessment.
引用
收藏
页码:604 / 613
页数:10
相关论文
共 50 条
  • [1] Security of Mobile Cloud Computing: A Systematic Mapping Study
    Jara Juarez, Diego X.
    Cedillo, Priscila
    [J]. 2017 IEEE SECOND ECUADOR TECHNICAL CHAPTERS MEETING (ETCM), 2017,
  • [2] A Systematic Mapping Study on Approaches for AI-Supported Security Risk Assessment
    Erdogan, Gencer
    Garcia-Ceja, Enrique
    Hugo, Asmund
    Nguyen, Phu H.
    Sen, Sagar
    [J]. 2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 755 - 760
  • [3] Security and Risk Assessment in the Cloud
    Madria, Sanjay K.
    [J]. COMPUTER, 2016, 49 (09) : 110 - 113
  • [4] Security Governance in a Multi-Cloud Environment: A systematic Mapping Study
    Witti, Hamad
    Ghedira-Guegan, Chirine
    Disson, Eric
    Boukadi, Khouloud
    [J]. PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 81 - 86
  • [5] Security in Cloud Computing: a Mapping Study
    Cruz Zapata, Belen
    Luis Fernandez-Aleman, Jose
    Toval, Ambrosio
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 12 (01) : 161 - 184
  • [6] Security Risk Assessment of Cloud Carrier
    Lenkala, Swetha Reddy
    Shetty, Sachin
    Xiong, Kaiqi
    [J]. PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013), 2013, : 442 - 449
  • [7] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    [J]. Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95
  • [8] Cloud Broker: A Systematic Mapping Study
    Faculty of Engineering, Ferdowsi University of Mashhad, Department of Computer Engineering, Mashhad
    9177948944, Iran
    [J]. IEEE Trans. Serv. Comput., 2024, 5 (2989-3005):
  • [9] A Quantitative Methodology for Cloud Security Risk Assessment
    Basu, Srijita
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 92 - 103
  • [10] Research for cloud computing security risk assessment
    Tang, Hua
    Yang, Jiejun
    Wang, Xiaofang
    Zhou, Qi
    [J]. Open Cybernetics and Systemics Journal, 2016, 10 : 210 - 217