2021
DOI: 10.1109/access.2021.3073203
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

Abstract: Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and challenges. This SLR examined the research studies published between 2010 and 2020 within the popular digital libraries. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 197 publications
(91 citation statements)
references
References 70 publications
0
64
0
1
Order By: Relevance
“…There have been many attempts in the literature to solve the security problem in the remote execution platforms in general such as the cloud computing. Many recent papers surveyed the latest state of art work in that endeavor, such as [27]- [30]. However, to the best of our knowledge, none of them has considered using dynamic compilation technology to secure remote code execution.…”
Section: ) Cloud Securitymentioning
confidence: 99%
“…There have been many attempts in the literature to solve the security problem in the remote execution platforms in general such as the cloud computing. Many recent papers surveyed the latest state of art work in that endeavor, such as [27]- [30]. However, to the best of our knowledge, none of them has considered using dynamic compilation technology to secure remote code execution.…”
Section: ) Cloud Securitymentioning
confidence: 99%
“…Keraguan tersebut mengenai saat digunakannya media cloud dapat dimasuki oleh pihak yang tidak seharusnya atau pihak. Maka dari itu pengguna merasa ketakutan terhadap hal tersebut karena cloud computing pada dasarnya berada di dunia maya [5]. Tujuan penelitian ini yaitu melakukan evaluasi layanan cloud storage.…”
Section: Pendahuluanunclassified
“…Similarly, with the use of literature review and multiple case studies, the authors of [ 17 ] discussed big data analytics in industrial applications. There are also papers that have widely discussed the use of cloud computing in industry and related security problems [ 18 , 19 ]. However, we did not find any publications presenting literature reviews related to edge computing application in industry.…”
Section: Introductionmentioning
confidence: 99%