메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Cloud computing security requirements: A systematic review

Author keywords

cloud computing; empirical study; sequirity requirements engineering; Software as a Service; systematic literature review

Indexed keywords

COMPUTING SECURITY; EMPIRICAL STUDIES; NON-REPUDIATION; PHYSICAL PROTECTION; SECURITY REQUIREMENTS; SOFTWARE-AS-A-SERVICE; SUB-AREAS; SYSTEMATIC LITERATURE REVIEW; SYSTEMATIC REVIEW;

EID: 84865031080     PISSN: 21511349     EISSN: 21511357     Source Type: Conference Proceeding    
DOI: 10.1109/RCIS.2012.6240421     Document Type: Conference Paper
Times cited : (64)

References (63)
  • 3
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • D. Firesmith, "Specifying reusable security requirements," J of Object Technology, 3(1), 2004, pp. 61-75.
    • (2004) J of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 4
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on IaaS cloud security
    • L. M. Vaquero, L. Rodero-Merino, and D. Morán, "Locking the sky: A survey on IaaS cloud security," Computing 91(1), 2011, pp. 93-118.
    • (2011) Computing , vol.91 , Issue.1 , pp. 93-118
    • Vaquero, L.M.1    Rodero-Merino, L.2    Morán, D.3
  • 5
    • 79952979621 scopus 로고    scopus 로고
    • Storm clouds rising: Security challenges for IaaS cloud computing
    • B. Hay, K. Nance, and M. Bishop, "Storm clouds rising: Security challenges for IaaS cloud computing," HICSS, 2011, pp. 1-7.
    • (2011) HICSS , pp. 1-7
    • Hay, B.1    Nance, K.2    Bishop, M.3
  • 7
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the Past to Prepare for the Future: Writing a Literature Review
    • J. Webster and R. Watson, "Analyzing the Past to Prepare for the Future: Writing a Literature Review," MISQ, 26(2) 2002, pp. 13-23.
    • (2002) MISQ , vol.26 , Issue.2 , pp. 13-23
    • Webster, J.1    Watson, R.2
  • 9
    • 77956580783 scopus 로고    scopus 로고
    • Cloud computing security management
    • S.A. Almulla and C. Y. Yeun, "Cloud computing security management," ICESMA 2010, pp. 1-7.
    • ICESMA 2010 , pp. 1-7
    • Almulla, S.A.1    Yeun, C.Y.2
  • 10
    • 79955718012 scopus 로고    scopus 로고
    • Building a security aware cloud by extending internal control to cloud
    • H. Sato, A. Kanai, and S. Tanimoto, "Building a security aware cloud by extending internal control to cloud," ISADS 2011, pp. 323-326.
    • ISADS 2011 , pp. 323-326
    • Sato, H.1    Kanai, A.2    Tanimoto, S.3
  • 14
    • 67649651643 scopus 로고    scopus 로고
    • Secure enterprise services consumption for SaaS technology platforms
    • Y. Karabulut and I. Nassi, "Secure enterprise services consumption for SaaS technology platforms," ICDE 2009, pp. 1749-1756.
    • ICDE 2009 , pp. 1749-1756
    • Karabulut, Y.1    Nassi, I.2
  • 17
    • 79952498688 scopus 로고    scopus 로고
    • Managing a security program in a cloud computing environment
    • M. Townsend, "Managing a security program in a cloud computing environment," IInfoSecCD 2009, pp. 128-133.
    • IInfoSecCD 2009 , pp. 128-133
    • Townsend, M.1
  • 19
  • 20
    • 77955905901 scopus 로고    scopus 로고
    • Security and cloud computing: Intercloud identity management infrastructure
    • A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and cloud computing: Intercloud identity management infrastructure," WET ICE 2010, pp. 263-265.
    • WET ICE 2010 , pp. 263-265
    • Celesti, A.1    Tusa, F.2    Villari, M.3    Puliafito, A.4
  • 21
    • 78650052308 scopus 로고    scopus 로고
    • An in-VM measuring framework for increasing virtual machine security in clouds
    • Q. Liu, C. Weng, M. Li, and Y. Luo, "An In-VM measuring framework for increasing virtual machine security in clouds," IEEE Security & Privacy, 8(6), pp. 56-62, 2010.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 56-62
    • Liu, Q.1    Weng, C.2    Li, M.3    Luo, Y.4
  • 23
    • 71749100243 scopus 로고    scopus 로고
    • Finding security in the cloud
    • N. Hawthorn, "Finding security in the cloud," Computer Fraud and Security, 2009(10), pp. 19-20, 2009.
    • (2009) Computer Fraud and Security , vol.2009 , Issue.10 , pp. 19-20
    • Hawthorn, N.1
  • 24
    • 77952779347 scopus 로고    scopus 로고
    • The construction and realization of the intelligent NIPS based on the cloud security
    • T. Jia and X. Wang, "The construction and realization of the intelligent NIPS based on the cloud security," Int. Conf on Information Science and Engineering, 2009, pp. 1885-1888.
    • Int. Conf on Information Science and Engineering, 2009 , pp. 1885-1888
    • Jia, T.1    Wang, X.2
  • 25
    • 78449234587 scopus 로고    scopus 로고
    • Construction of a trusted SaaS platform
    • C. Zhong, J. Zhang, Y. Xia, and H. Yu, "Construction of a trusted SaaS platform," SOSE 2010, pp. 244-251.
    • SOSE 2010 , pp. 244-251
    • Zhong, C.1    Zhang, J.2    Xia, Y.3    Yu, H.4
  • 28
    • 77956971530 scopus 로고    scopus 로고
    • Deployment models: Towards eliminating security concerns from cloud computing
    • G. Zhao, C. Rong, M. G. Jaatun, and F. E. Sandnes, "Deployment models: Towards eliminating security concerns from cloud computing," HPCS 2010, pp. 189-195.
    • HPCS 2010 , pp. 189-195
    • Zhao, G.1    Rong, C.2    Jaatun, M.G.3    Sandnes, F.E.4
  • 31
    • 77954983075 scopus 로고    scopus 로고
    • Security for the cloud infrastructure: Trusted virtual data center implementation
    • S. Berger et al., "Security for the cloud infrastructure: Trusted virtual data center implementation," IBM Journal of Research and Development, 53(4), 2009.
    • (2009) IBM Journal of Research and Development , vol.53 , Issue.4
    • Berger, S.1
  • 32
  • 34
    • 79551559146 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing using Sobol sequence
    • P. S. Kumar, R. Subramanian, and D. T. Selvam, "Ensuring data storage security in cloud computing using Sobol sequence," PDGC 2010, pp. 217-222.
    • PDGC 2010 , pp. 217-222
    • Kumar, P.S.1    Subramanian, R.2    Selvam, D.T.3
  • 35
    • 79951783095 scopus 로고    scopus 로고
    • Analysis on cloud-based security vulnerability assessment
    • H.-C. Li, P. Liang, J. Yang, and S. Chen, "Analysis on cloud-based security vulnerability assessment," ICEBE 2010, pp. 490-494.
    • ICEBE 2010 , pp. 490-494
    • Li, H.-C.1    Liang, P.2    Yang, J.3    Chen, S.4
  • 36
  • 37
    • 79951486911 scopus 로고    scopus 로고
    • An investigation into cloud configuration and security
    • K. Wood and E. Pereira, "An investigation into cloud configuration and security," ICITST 2010, pp. 1-6.
    • ICITST 2010 , pp. 1-6
    • Wood, K.1    Pereira, E.2
  • 38
  • 39
    • 79959322079 scopus 로고    scopus 로고
    • Cloud application logging for forensics
    • R. Marty, "Cloud application logging for forensics," ACM SAC, 2011, pp. 178-184.
    • (2011) ACM SAC , pp. 178-184
    • Marty, R.1
  • 41
    • 77953172125 scopus 로고    scopus 로고
    • Infrastructure as a service security: Challenges and solutions
    • W. Dawoud, I. Takouna, and C. Meinel, "Infrastructure as a service security: Challenges and solutions," INFOS 2010, pp.1-8.
    • INFOS 2010 , pp. 1-8
    • Dawoud, W.1    Takouna, I.2    Meinel, C.3
  • 43
    • 78649624954 scopus 로고    scopus 로고
    • Towards wider cloud service applicability by security, privacy and trust measurements
    • R. M. Savola, A. Juhola, and I. Uusitalo, "Towards wider cloud service applicability by security, privacy and trust measurements," AICT 2010.
    • AICT 2010
    • Savola, R.M.1    Juhola, A.2    Uusitalo, I.3
  • 45
    • 79952393404 scopus 로고    scopus 로고
    • Meta-data driven data chunk based secure data storage for SaaS
    • Y. Shi, K. Zhang, and Q. Li, "Meta-data driven data chunk based secure data storage for SaaS," IJ DCTA, 5(1), 2011pp. 173-185.
    • (2011) IJ DCTA , vol.5 , Issue.1 , pp. 173-185
    • Shi, Y.1    Zhang, K.2    Li, Q.3
  • 47
    • 77957263904 scopus 로고    scopus 로고
    • The security of cloud computing system enabled by trusted computing technology
    • Z. Shen and Q. Tong, "The security of cloud computing system enabled by trusted computing technology," ICSPS 2010 (2), p. V211-V215
    • ICSPS 2010 , Issue.2
    • Shen, Z.1    Tong, Q.2
  • 48
    • 79957885122 scopus 로고    scopus 로고
    • Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
    • J. Feng, Y. Chen, D. Summerville, W.-S. Ku, and Z. Su, "Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol," CNNC 2011, pp. 521-522.
    • CNNC 2011 , pp. 521-522
    • Feng, J.1    Chen, Y.2    Summerville, D.3    Ku, W.-S.4    Su, Z.5
  • 49
    • 79951609863 scopus 로고    scopus 로고
    • A view about cloud data security from data life cycle," cycle
    • X. Yu and Q. Wen, "A view about cloud data security from data life cycle," cycle," CiSE 2010.
    • CiSE 2010
    • Yu, X.1    Wen, Q.2
  • 50
    • 77949632117 scopus 로고    scopus 로고
    • Quantification of security for compute intensive workloads in clouds
    • J. Arshad, P. Townend, and J. Xu, "Quantification of security for compute intensive workloads in clouds," ICPADS, 2009, pp. 479-486.
    • (2009) ICPADS , pp. 479-486
    • Arshad, J.1    Townend, P.2    Xu, J.3
  • 51
    • 77958132271 scopus 로고    scopus 로고
    • Don't trust. and verify: A security architecture stack for the cloud
    • G. Peterson, "Don't trust. and verify: A security architecture stack for the cloud," IEEE Security & Privacy, 8(5), 2010, pp. 83-86.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.5 , pp. 83-86
    • Peterson, G.1
  • 52
    • 79952749520 scopus 로고    scopus 로고
    • Information security of cloud computing for enterprises
    • C.-L. Tsai and U.-C. Lin, "Information security of cloud computing for enterprises," Advances in ISSS 3(1), 2011, pp. 132-142.
    • (2011) Advances in ISSS , vol.3 , Issue.1 , pp. 132-142
    • Tsai, C.-L.1    Lin, U.-C.2
  • 53
    • 79952367895 scopus 로고    scopus 로고
    • Privacy, security and trust issues arising from cloud computing
    • S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing," CloudCom 2010, pp. 693-702.
    • CloudCom 2010 , pp. 693-702
    • Pearson, S.1    Benameur, A.2
  • 54
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, 8(6), 2010, pp. 24-31.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 55
    • 68649085917 scopus 로고    scopus 로고
    • Security dynamics of cloud computing
    • K. M. Khan, "Security dynamics of cloud computing," Cutter IT Journal, 22(6-7), 2009, pp. 38-43.
    • (2009) Cutter IT Journal , vol.22 , Issue.6-7 , pp. 38-43
    • Khan, K.M.1
  • 56
    • 79952483316 scopus 로고    scopus 로고
    • User experience and security in the cloud - An empirical study in the Finnish Cloud Consortium
    • N. Oza, K. Karppinen, and R. Savola, "User experience and security in the cloud - An empirical study in the Finnish Cloud Consortium," CloudCom 2010, pp. 621-628.
    • CloudCom 2010 , pp. 621-628
    • Oza, N.1    Karppinen, K.2    Savola, R.3
  • 58
    • 78349299500 scopus 로고    scopus 로고
    • The management of security in cloud computing
    • S. Ramgovind, M. M. Eloff, and E. Smith, "The management of security in cloud computing," ISSA 2010, pp. 1-7.
    • ISSA 2010 , pp. 1-7
    • Ramgovind, S.1    Eloff, M.M.2    Smith, E.3
  • 59
    • 79952677080 scopus 로고    scopus 로고
    • SPIE - The International Society for Optical Engineering
    • Z. He and Y. He, "Analysis on the security of cloud computing," SPIE - The International Society for Optical Engineering, 2011, vol. 7752.
    • (2011) Analysis on the Security of Cloud Computing , vol.7752
    • He, Z.1    He, Y.2
  • 60
    • 79952952264 scopus 로고    scopus 로고
    • Cloud hooks: Security and privacy issues in cloud computing
    • W. A. Jansen, "Cloud hooks: Security and privacy issues in cloud computing," in HICSS 2011, pp.1-10.
    • HICSS 2011 , pp. 1-10
    • Jansen, W.A.1
  • 61
    • 79957737703 scopus 로고    scopus 로고
    • Managing data access on clouds: A generic framework for enforcing security policies
    • C. Bǎsescu, C. Leordeanu, A. Costan, A. Carpen-Amarie, and G. Antoniu, "Managing data access on clouds: A generic framework for enforcing security policies," AINA, 2011, pp. 459-466.
    • (2011) AINA , pp. 459-466
    • Bǎsescu, C.1    Leordeanu, C.2    Costan, A.3    Carpen-Amarie, A.4    Antoniu, G.5
  • 62
    • 84865017009 scopus 로고    scopus 로고
    • [Online]. Available: Accessed: 24-Sep-2011
    • P. Wainewright, "Lightning strike zaps EC2 Ireland | ZDNET," 2011. [Online]. Available: http://www.zdnet.com/blog/saas/lightning-strike-zaps- ec2-ireland/1382?tag=search-results-rivers;item0. [Accessed: 24-Sep-2011].
    • (2011) Lightning Strike Zaps EC2 Ireland | ZDNET
    • Wainewright, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.