Systematic Mapping Study On Security Threats in Cloud Computing

Carlo Marcelo Revoredo da Silva,Jose Lutiano Costa da Silva,Ricardo Batista Rodrigues,Leandro Marques do Nascimento,Vinicius Cardoso Garcia
DOI: https://doi.org/10.48550/arXiv.1303.6782
2013-03-27
Abstract:Today, Cloud Computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the Confidentiality, Integrity and Availability of the services provided. Our work is a Systematic Mapping where we hope to present metrics about publications available in literature that deal with some of the seven security threats in Cloud Computing, based in the guide entitled "Top Threats to Cloud Computing" from the Cloud Security Alliance (CSA). In our research we identified the more explored threats, distributed the results between fifteen Security Domains and identified the types of solutions proposed for the threats. In face of those results, we highlight the publications that are concerned to fulfill some standard of compliance.
Cryptography and Security
What problem does this paper attempt to address?