Abstract
Cloud storage systems are becoming a gold mine for cyber attackers as they storage a lot of private and confidential information. Therefore, a lot of research is directed toward securing cloud platforms. Majority of cloud security related research or studies are emphasising on looking into prevention, detection, and mitigation methods against the threat in cloud computing. Although there are many research studies in this area, there are still no evidence of any bibliometric analysis on the cloud security context. This paper provides a bibliometric analysis of research development in cloud security from 2010 to 2018. A dataset of 656 academic papers are used for analysis in term of most productive countries, institutions, journals, authors, research areas, keywords, and also highly cited articles. We found that countries of China, India and United States are the top contributor of the findings. Trends in number of publication in the area of cloud security increases and the number of related keywords increases as well.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Y.-Y. Teing, A. Dehghantanha, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017.
Z. P. Gariba and J. A. Van Der Poll, “Security Failure Trends of Cloud Computing,” 2017 IEEE 3rd Int. Conf. Collab. Internet Comput., no. Vm, pp. 247–256, 2017.
F. Daryabar, A. Dehghantanha, and K.-K. R. Choo, “Cloud storage forensics: MEGA as a case study,” Aust. J. Forensic Sci., pp. 1–14, Apr. 2016.
M. Shariati, A. Dehghantanha, and K.-K. R. Choo, “SugarSync forensic analysis,” Aust. J. Forensic Sci., vol. 48, no. 1, pp. 95–117, Apr. 2015.
Y.-Y. Teing, D. Ali, K.-K. R. Choo, and M. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., no. 2016, 2016.
F. Daryabar, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices,” Aust. J. Forensic Sci., vol. 48, no. 6, pp. 615–642, Nov. 2016.
Y.-Y. Teing, A. Dehghantanha, and K.-K. R. Choo, “CloudMe forensics: A case of big data forensic investigation,” Concurr. Comput. Pract. Exp., p. e4277, Jul. 2017.
O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016.
Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, T. Dargahi, and M. Conti, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensic Sci., vol. 62, no. 3, 2017.
A. A. James Baldwin, Omar Alhawi, Simone Shaughnessy and A. Dehghantanha, Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies. Cyber Threat Intelligence- Springer Book, 2017.
T. Dargahi, A. Dehghantanha, and M. Conti, Investigating Storage as a Service Cloud Platform: PCloud as a Case Study. 2016.
S. H. Mohtasebi, A. Dehghantanha, and K.-K. R. Choo, Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. 2016.
A. Dehghantanha and T. Dargahi, Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies. 2016.
M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, and A. Dehghantanha, An Android Cloud Storage Apps Forensic Taxonomy. 2016.
J. Gill, I. Okere, H. HaddadPajouh, and A. Dehghantanha, Mobile forensics: A bibliometric analysis, vol. 70. 2018.
H. L. Dqj et al., “Global Research Trends in Agro-Geoinformatics during 1991-2015: A Bibliometric Analysis,” 2017 6th Int. Conf. Agro-Geoinformatics, 2017.
M. El Ansary and M. Oubrich, “State of the art and trends of the research on XBRL bibliometric analysis from 2000-2014,” Colloq. Inf. Sci. Technol. Cist, pp. 243–250, 2017.
M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, “The rise of ‘malware’: Bibliometric analysis of malware study,” J. Netw. Comput. Appl., vol. 75, pp. 58–76, 2016.
F. Blanco-Mesa, J. M. M. Lindahl, and A. M. Gil-Lafuente, “A bibliometric analysis of fuzzy decision making research,” 2016 Annu. Conf. North Am. Fuzzy Inf. Process. Soc., pp. 1–4, 2016.
J. M. Merigo, F. Blanco-Mesa, A. M. Gil-Lafuente, and R. R. Yager, “A bibliometric analysis of the first thirty years of the International Journal of Intelligent Systems,” 2016 IEEE Symp. Ser. Comput. Intell., pp. 1–6, 2016.
G. Buela-Casal, O. Gutiérrez-Martínez, M. P. Bermúdez-Sánchez, and O. Vadillo-Muñoz, “Comparative study of international academic rankings of universities,” Scientometrics, vol. 71, no. 3, pp. 349–365, 2007.
T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. K. Liu, “Towards secure and reliable cloud storage against data re-outsourcing,” Futur. Gener. Comput. Syst., vol. 52, pp. 86–94, 2015.
J. Sun, M. H. Wang, and Y. S. Ho, “A historical review and bibliometric analysis of research on estuary pollution,” Mar. Pollut. Bull., vol. 64, no. 1, pp. 13–21, 2012.
B. Blakeley, C. Cooney, A. Dehghantanha, and R. Aspin, “Cloud Storage Forensic: hubiC as a Case-Study,” in 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015, pp. 536–541.
M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 23–27.
Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, Z. Muda, M. T. Abdullah, and W.-C. Chai, “A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts,” in Security, Privacy and Anonymity in Computation, Communication and Storage, G. Wang, I. Ray, J. M. A. Calero, and S. M. Thampi, Eds. Springer International Publishing, 2016, pp. 342–357.
H. Lv and Y. Hu, “Analysis and research about cloud computing security protect policy,” Proc. - 2011 Int. Conf. Intell. Sci. Inf. Eng. ISIE 2011, pp. 214–216, 2011.
M. Shariati, A. Dehghantanha, B. Martini, and K.-K. R. Choo, “Chapter 19 - Ubuntu One investigation: Detecting evidences on client machines,” in The Cloud Security Ecosystem, R. K.-K. R. Choo, Ed. Boston: Syngress, 2015, pp. 429–446.
A. Dehghantanha and K. Franke, “Privacy-respecting digital investigation,” in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014, pp. 129–138.
T. Y. Yang, A. Dehghantanha, K. R. Choo, and Z. Muda, “Windows Instant Messaging App Forensics: Facebook and Skype as case studies,” PLoS One, Feb. 2016.
F. Norouzizadeh Dezfouli, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms,” Aust. J. Forensic Sci., pp. 1–20, Aug. 2015.
M. Damshenas, A. Dehghantanha, K.-K. R. Choo, and R. Mahmud, “M0Droid: An Android Behavioral-Based Malware Detection Model,” J. Inf. Priv. Secur., Sep. 2015.
N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng., vol. 61, 2017.
M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018.
S. Watson and A. Dehghantanha, “Digital forensics: the missing piece of the Internet of Things promise,” Comput. Fraud Secur., vol. 2016, no. 6, pp. 5–8, Jun. 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Thiam, L.S., Dargahi, T., Dehghantanha, A. (2019). Bibliometric Analysis on the Rise of Cloud Security. In: Dehghantanha, A., Choo, KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-10543-3_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-10542-6
Online ISBN: 978-3-030-10543-3
eBook Packages: Computer ScienceComputer Science (R0)