Security Threats in Cloud Computing Models: Domains and Proposals

This work displays metrics about publications available in the literature which deal with some of the seven security threats in Cloud Computing based in the guide entitled "Top Threats to Cloud Computing" from the Cloud Security Alliance (CSA). Through this research, it is identified the most explored threats, distributed the results between fifteen Security Domains and identified between eight types of solutions proposed for the threats. In face of those results, it was observed that publications in the literature mostly show a certain trend as the proposals presented for the involved Threats. However, in some cases some variations occur, what motivated us to fulfill an analysis of standard deviation in the results obtained in our research. Based on these data, we present our conception regarding this behavior.

[1]  Robert R. Harmon,et al.  Building Trust and Compliance in the Cloud for Services , 2012, 2012 Annual SRII Global Conference.

[2]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[3]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[4]  Barbara Kitchenham,et al.  Procedures for Performing Systematic Reviews , 2004 .

[5]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[6]  Rhonda Farrell,et al.  Securing the Cloud—Governance, Risk, and Compliance Issues Reign Supreme , 2010, Inf. Secur. J. A Glob. Perspect..

[7]  A. B. M. Shawkat Ali,et al.  Trust Issues that Create Threats for Cyber Attacks in Cloud Computing , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[8]  Kai Petersen,et al.  Systematic Mapping Studies in Software Engineering , 2008, EASE.

[9]  Ronald L. Graham,et al.  Concrete mathematics - a foundation for computer science , 1991 .

[10]  R. E. Wheeler Statistical distributions , 1983, APLQ.

[11]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[12]  Kouichi Sakurai,et al.  Towards Countermeasure of Insider Threat in Network Security , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[13]  Pearl Brereton,et al.  Using Mapping Studies in Software Engineering , 2008, PPIG.

[14]  Yongzhao Zhan,et al.  Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.

[15]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[16]  Manuel Vega,et al.  Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing , 2013 .