IITM Journal of management and IT

  • Year: 2014
  • Volume: 5
  • Issue: 1

Issues and Challenges in Securing the Cloud Environment: A Literature Review

  • Author:
  • Surbhi Gaur, Savleen Kaur
  • Total Page Count: 11
  • DOI:
  • Page Number: 87 to 97

IINTM, GGSIPU

Abstract

The emerging awareness and implementations of cloud services and its underlying technologies instigate the urge for security requirements being up to date, despite of the fact that this technology and its application are not latest. It is still challenging to assess what types of requirements have been researched most, and which are still under-researched even though cloud computing security requirements have been inscribed in publications earlier as well. A systematic literature review has been carried out by this paper by describing cloud computing security requirements from publications between January 2012 and December 2013. Requirements will be categorized in a framework and their frequency of research will be assessed by this. Changes will be identified in the assessment of requirements and proposed solutions. It has been observed that the most researched subfactors of security requirements are: Access Control, Data Integrity and Privacy & Confidentiality. Most under-researched areas are Recovery and Prosecution, with Non-repudiation and Physical Protection closely followed. Instead of the new solutions several enhancements and nested methodologies in current approaches were identified.

Keywords

Access control, Cloud Computing, Data integrity, Recovery, Repudiation, Security Requirements, Security factors, Software as a Service