Security Risk Assessment on Cloud: A Systematic Mapping Study

被引:0
|
作者
Annunziata, Giusy [1 ]
Sheykina, Alexandra [1 ]
Palomba, Fabio [1 ]
De Lucia, Andrea [1 ]
Catolino, Gemma [1 ]
Ferrucci, Filomena [1 ]
机构
[1] Univ Salerno, Salerno, Italy
关键词
Risk assessment; security testing; cloud computing;
D O I
10.1145/3661167.3661287
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has become integral to modern organizational operations, offering efficiency and agility. However, security challenges such as data loss and downtime necessitate tailored compliance solutions. Risk assessment is crucial for identifying and mitigating cloud-related threats, yet a standardized approach remains elusive. Our study aims to fill this gap by conducting a systematic mapping study on the prevailing methodologies. Through a meticulous analysis of 21 scholarly papers, we explore various aspects of security risk assessment for the cloud. The results provide valuable insights into delivery models, standards, and validation practices, contributing to a comprehensive understanding of cloud risk assessment.
引用
收藏
页码:604 / 613
页数:10
相关论文
共 50 条
  • [21] A Review of Security Risk Assessment Methods in Cloud Computing
    Alturkistani, Fatimah M.
    Emam, Ahmed Z.
    [J]. NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2014, 275 : 443 - 453
  • [22] Security risk assessment framework for cloud computing environments
    Albakri, Sameer Hasan
    Shanmugam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2114 - 2124
  • [23] Security and Privacy for Blockchain: A Systematic Mapping Study
    Yang, Jinmei
    Bi, Huang
    Dai, Fei
    Liang, Zhihong
    Qiang, Zhenping
    [J]. 2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 446 - 453
  • [24] A systematic mapping study on security for systems of systems
    Olivero, Miguel Angel
    Bertolino, Antonia
    Dominguez-Mayo, Francisco Jose
    Escalona, Maria Jose
    Matteucci, Ilaria
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 787 - 817
  • [25] A systematic mapping study of usability vs security
    Merdanoglu, Nur
    Onay Durdu, Pinar
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING & INFORMATION TECHNOLOGY (CEIT), 2018,
  • [26] Security In The Internet Of Things - A Systematic Mapping Study
    Porras, Jari
    Pankalainen, Jouni
    Knutas, Antti
    Khakurel, Jayden
    [J]. PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 3750 - 3759
  • [27] A systematic mapping study on security for systems of systems
    Miguel Angel Olivero
    Antonia Bertolino
    Francisco José Dominguez-Mayo
    María José Escalona
    Ilaria Matteucci
    [J]. International Journal of Information Security, 2024, 23 : 787 - 817
  • [28] Mapping and Integrating Security and Risk Standards: a Systematic Literature Review
    Fernandes, Andre
    Cruz, Joao
    da Silva, Miguel Mira
    Pereira, Ruben
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (04) : 433 - 448
  • [29] Cloud designs and deployment models: a systematic mapping study
    Isaac Odun-Ayo
    Rowland Goddy-Worlu
    Victoria Samuel
    Victor Geteloma
    [J]. BMC Research Notes, 12
  • [30] Security Risk Assessment of Cloud Computing Services in a Networked Environment
    Weintraub, Eli
    Cohen, Yuval
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (11) : 79 - 90