A Systematic Mapping Study of Security, Trust and Privacy in Clouds

Isaac Odun-Ayo, Toro-Abasi Williams, Jamaiah Yahaya

Abstract


Cloud computing is a dynamic paradigm that thrives around trust and security in the relationship between the cloud service providers and cloud users. Cloud trust ensures understanding and openness in the relationship between the CSP and users, while cloud privacy is the assurance that no unauthorized person has access to user information. There are studies on security, trust and privacy in cloud services on the cloud landscape focusing on areas such as attacks, use of virtual machines and user’s trust. Despite this, there is still a dearth of publications in some aspects of this field of study. A systematic mapping study allows for the synthesis of activities in a field of study with a view to producing a visual summary. The objective of this study was to conduct a systematic mapping study of security, trust and privacy in the cloud. The systematic mapping procedure was carried out in three categories of facets namely; the topic, contribution, and research facets. The results obtained indicated that there were more publications in terms of privacy issues and challenges in the area of metric with 4.76%, more articles were published on cloud trust in the area of tool with 8.75%, also, more papers were published on design in the area of model with 12.38%, and more publications on privacy issues and challenges in the area of process with 8.57%. In addition, there were more articles published on privacy issues and challenges in the area of evaluation research with 10.43%, more publications on design in terms of validation research with 7.83%, there were more papers published on frameworks and techniques in the area of solution research with 5.22% each and more articles published on privacy issues and challenges in respect to philosophical research. This study clearly identified gaps in the field of security, trust and privacy in the cloud which should stimulate interest for further studies by both researchers and industry practitioners.

Keywords


Systematic mapping Cloud computing; Cloud security; Cloud privacy; Cloud trust



DOI: https://doi.org/10.11591/eei.v10i3.1887

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Bulletin of EEI Stats