Skip to main content

Cloud Computing Risk Assessment: A Systematic Literature Review

  • Conference paper
Book cover Future Information Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 276))

Abstract

Cloud computing security is a broad research domain with a large number of concerns, ranging from protecting hardware and platform technologies to protecting clouds data and resource access (through different end- user devices). Although the advantages of cloud computing are tremendous, the security and privacy concerns of cloud computing have always been the focus of numerous cloud customers and impediment to its widespread adaptation by businesses and organizations. The paper presents a systematic literature review in the field of cloud computing with a focus on risk assessment. This would help future research and cloud users/business organizations to have an overview of the risk factors in a cloud environment. And to proactively map their indigenous needs with this technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rebollo, O., Mellado, D.: Systematic Review of Information Security Governance Frameworks in the Cloud Computing. Journal of Universal Computer Sc. 18(6), 798–815 (2012)

    Google Scholar 

  2. From hype to future: KPMG’s 2010 Cloud Computing survey, http://www.techrepublic.com/whitepapers/fromhype-to-futurekpmgs-2010-cloud-computing-survey/2384291

  3. Rittinghouse, J., Ransome, J.: Security in the Cloud: Cloud Computing. Implementation, Management, and Security, 1st edn. CRC Press (2009)

    Google Scholar 

  4. Hannay, J.E., Sjøberg, D.I.K.: A Systematic Review of Theory Use in Software Engineering Experiments. Journal of IEEE Transaction on Software Engineering 33(2), 87–107 (2007)

    Article  Google Scholar 

  5. Kitchenham, B., Brereton, O.P.: Systematic literature reviews in software engineering –A systematic literature review. Journal: Information and Software Technology, 7-15 (2009)

    Google Scholar 

  6. Djemame, K., Armstrong, D.: Risk Assessment Framework and Software Toolkit for Cloud Service Ecosystems. In: Int. Conference on Cloud Computing, GRIDs, and Virtualization (2011)

    Google Scholar 

  7. Harauz, J., Kauifman, M., Potter, B.: Data Security in the world of cloud computing. IEEE Security & Privacy 7(4), 61–64 (2009)

    Article  Google Scholar 

  8. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011)

    Article  Google Scholar 

  9. Takabi, H., Joshi, J.B.D.: Security and Privacy Challenges in Cloud Computing Environments. Published. IEEE Security and Privacy 8(6), 24–31 (2010)

    Article  Google Scholar 

  10. Chen, D., Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. In: Int. Conference on Computer Science and Electronics Engineering, pp. 647–651 (2012)

    Google Scholar 

  11. Rahul, S.S., Rai, J.K.: Security & Privacy Issues In Cloud Computing. International Journal of Engineering Research & Technology (IJERT) 2(3) (March 2013)

    Google Scholar 

  12. Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5) (2013)

    Google Scholar 

  13. Reddy, V.K., Thirumala, R.B., Reddy, L.S.S., Kiran, S.: Research Issues in Cloud Computing. Global Journal of Computer Science and Technology 11(11) (July 2011)

    Google Scholar 

  14. Pal, D., Krishna, R., Srivastava, P., Kumar, S.: A Novel Open Security Framework for Cloud Computing. Int. Journal of Cloud Computing and Services Science 1(2) (2012)

    Google Scholar 

  15. Argall, K.: Compliance in a Cloud Computing Environment. HIPAA and PCI DSS (2010)

    Google Scholar 

  16. Ren, K., Wang, C., Wang, Q.: Security Challenges for the Public Cloud. Journal of Internet Computing IEEE 16(1) (2012)

    Google Scholar 

  17. Lovell, R.: White Paper: Introduction to cloud computing (October 2009)

    Google Scholar 

  18. Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In: 2nd Int Conference on Cloud Computing Technology and Science (2010)

    Google Scholar 

  19. Ayala, L.C., Vega, M., Vargas, L.M.: Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing. In: Elleithy, K., Sobh, T. (eds.) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. LNEE, vol. 152, pp. 37–52. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  20. Rana, S., Joshi, P.K.: Risk Analysis in Web Applications by Using Cloud Computing. International Journal of Multidisciplinary Research 2 (January 2012)

    Google Scholar 

  21. Khajeh- Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision Support Tools for Cloud Migration in the Enterprise. In: IEEE CLOUD 2011 (November 2011)

    Google Scholar 

  22. Chou, Y., Oetting, J.: Risk Assessment for Cloud-Based IT Systems. International Journal of Grid and High Performance Computing, 1–13 (April -June 2011)

    Google Scholar 

  23. Kumar, V., Swetha, M.S.: Cloud Computing: Towards Case Study of Data Security Mechanisms. International Journal of Advanced Technology & Engineering Research 2(4) (2012)

    Google Scholar 

  24. Julisch, K., Hall, M.: Security and Control in the Cloud. Information Security Journal: A Global Perspective, 299–309 (2010)

    Google Scholar 

  25. Kumar, A.: World of Cloud Computing & Security. International Journal of Cloud Computing and Services Science (IJ-CLOSER) 1(2) (June 2012)

    Google Scholar 

  26. Che, J., Duan, Y., Zhang, T.: Study on the Security Models and strategies of cloud Computing. In: Proc: Int Conference on Power Electronics and Engineering Application (2011)

    Google Scholar 

  27. Prasad, M., Naik, R., Bapuji, V.: Cloud Computing: Research Issues and Implications. International Journal of Cloud Computing and Services Science 2(2), 134–140 (2013)

    Google Scholar 

  28. Dahbur, K., Mohammad, B.: A Survey of Risks, Threats and Vulnerabilities in Cloud Computing. In: Int Conference on Intelligent Semantic Web-Services and Applications (2011)

    Google Scholar 

  29. Bisong, A., Rahman, S.M.: An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & its Applications 3(1) (January 2011)

    Google Scholar 

  30. Cloud Security Alliance CSA: The Notorious Nine Cloud Computing Threats 2013 (2013)

    Google Scholar 

  31. Ahmad, T., Amanul, H.M., Al-Nafjan, M., Ansari, A.: Development of Cloud Computing and Security Issues. Information and Knowledge Management 3(1) (2013), www.iiste.org

  32. Popović, K., Hocenski, Ž.: Cloud computing security issues and challenges. MIPRO (2010)

    Google Scholar 

  33. Jansen, W., Grance, T.: Guidelines on Security and Privacy in Cloud Computing. NIST (2011)

    Google Scholar 

  34. Peiyu, L., Dong, L.: Risk Assessment Model for Information System in Cloud Computing Environment. Advanced in Control Engineering and Information Science. V. 15 (2011)

    Google Scholar 

  35. Rosado, D.R., Gomez, R.D., Mellado, Medina, E.F.: Security Analysis in the Migration to Cloud Environment. Journal: Future Internet, 469–487 (May 2012)

    Google Scholar 

  36. Lee, K.: Security Threats in Cloud Computing Environments. International Journal of Security and Applications 6(4) (October 2012)

    Google Scholar 

  37. Sharma, M., Bansal, H., Sharma, A.K.: Cloud Computing: Different Approach & Security Challenge. International Journal of Soft Computing and Engineering 2(1) (March 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rabia Latif .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Latif, R., Abbas, H., Assar, S., Ali, Q. (2014). Cloud Computing Risk Assessment: A Systematic Literature Review. In: Park, J., Stojmenovic, I., Choi, M., Xhafa, F. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40861-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40861-8_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40860-1

  • Online ISBN: 978-3-642-40861-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics