2014
DOI: 10.1007/978-3-642-40861-8_42
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Risk Assessment: A Systematic Literature Review

Abstract: Cloud computing security is a broad research domain with a large number of concerns, ranging from protecting hardware and platform technologies to protecting clouds data and resource access (through different end-user devices). Although the advantages of cloud computing are tremendous, the security and privacy concerns of cloud computing have always been the focus of numerous cloud customers and impediment to its widespread adaptation by businesses and organizations. The paper presents a systematic literature … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
38
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 70 publications
(42 citation statements)
references
References 23 publications
1
38
0
1
Order By: Relevance
“…Risk assessment in the CC domain is an issue dealt intensively in literature [40] [41]. Researchers state that security risks are among the biggest obstacles to adoption cloud services [9].…”
Section: Risk Optimizationmentioning
confidence: 99%
“…Risk assessment in the CC domain is an issue dealt intensively in literature [40] [41]. Researchers state that security risks are among the biggest obstacles to adoption cloud services [9].…”
Section: Risk Optimizationmentioning
confidence: 99%
“…The network traffic around VMs (virtual machines) along with the data centers in the cloud must be encrypted for security and privacy reasons for any human or network failures. The breach in confidential data files and its privacy will ultimately lead to data leakage and heavy damage to the applications throughout the disaster process [1]. Hardware, software security during disaster management is considered as important issues under cloud computing.…”
Section: Introductionmentioning
confidence: 99%
“…Businesses and research are reluctant in shifting the control of digital assets to the third-party service providers [2].Organizations does not enjoy administrative control of cloud services and infrastructure [3]. The security measures taken by the cloud service providers (CSP) are transparent to the organization [4].The presence of large number of users from different organizations aggravates the situation further [2]; the users might be trusted by the CSP but may not trust each other [4]. The above reasons increase the customers' uncertainty about their digital assets on the cloud resulting in reluctance to adopt cloud computing [2].This paper exploits certain information security risks namely data, user identity and access control and contractual and legal issues.…”
mentioning
confidence: 99%
“…The security measures taken by the cloud service providers (CSP) are transparent to the organization [4].The presence of large number of users from different organizations aggravates the situation further [2]; the users might be trusted by the CSP but may not trust each other [4]. The above reasons increase the customers' uncertainty about their digital assets on the cloud resulting in reluctance to adopt cloud computing [2].This paper exploits certain information security risks namely data, user identity and access control and contractual and legal issues. Moreover, the manuscript presents a comprehensive solution in literature to cater for all security risks.…”
mentioning
confidence: 99%