Abstract
Many publications have dealt with various types of security requirements in cloud computing but not all types have been explored in sufficient depth. It is also hard to understand which types of requirements have been under-researched and which are most investigated. This paper's goal is to provide a comprehensive and structured overview of cloud computing security requirements and solutions. We carried out a systematic review and identified security requirements from previous publications that we classified in nine sub-areas: Access Control, Attack/Harm Detection, Non-repudiation, Integrity, Security Auditing, Physical Protection, Privacy, Recovery, and Prosecution. We found that (i) the least researched sub-areas are non-repudiation, physical protection, recovery and prosecution, and that (ii) access control, integrity and auditability are the most researched sub-areas.
Original language | Undefined |
---|---|
Title of host publication | Proceedings of the Sixth International Conference on Research Challenges in Information Science, RCIS 2012 |
Editors | C Rolland, J. Castro, O Pastor |
Place of Publication | USA |
Publisher | IEEE Computer Society |
Pages | 1-7 |
Number of pages | 7 |
ISBN (Print) | 978-1-4577-1936-3 |
DOIs | |
Publication status | Published - May 2012 |
Event | Sixth International Conference on Research Challenges in Information Science, RCIS 2012 - Universitat Politècnica de València, Valencia, Spain Duration: 16 May 2012 → 18 May 2012 Conference number: 6 |
Publication series
Name | |
---|---|
Publisher | IEEE Computer Society |
Conference
Conference | Sixth International Conference on Research Challenges in Information Science, RCIS 2012 |
---|---|
Abbreviated title | RCIS 2012 |
Country/Territory | Spain |
City | Valencia |
Period | 16/05/12 → 18/05/12 |
Keywords
- SCS-Services
- least researched sub-areas
- systematic literature review
- sequirity requirements engineering
- auditing
- most researched sub-areas
- harm detection
- physical protection
- data integrity
- data privacy
- data recovery
- prosecution
- EWI-23178
- Empirical Study
- nonrepudiation
- Software-as-a-Service
- Attack Detection
- IR-85244
- Cloud computing
- Access Control
- Data Security
- METIS-296358