Skip to main content
Top

2019 | OriginalPaper | Chapter

Bibliometric Analysis on the Rise of Cloud Security

Authors : Lim Sze Thiam, Tooska Dargahi, Ali Dehghantanha

Published in: Handbook of Big Data and IoT Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud storage systems are becoming a gold mine for cyber attackers as they storage a lot of private and confidential information. Therefore, a lot of research is directed toward securing cloud platforms. Majority of cloud security related research or studies are emphasising on looking into prevention, detection, and mitigation methods against the threat in cloud computing. Although there are many research studies in this area, there are still no evidence of any bibliometric analysis on the cloud security context. This paper provides a bibliometric analysis of research development in cloud security from 2010 to 2018. A dataset of 656 academic papers are used for analysis in term of most productive countries, institutions, journals, authors, research areas, keywords, and also highly cited articles. We found that countries of China, India and United States are the top contributor of the findings. Trends in number of publication in the area of cloud security increases and the number of related keywords increases as well.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Y.-Y. Teing, A. Dehghantanha, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017. Y.-Y. Teing, A. Dehghantanha, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017.
2.
go back to reference Z. P. Gariba and J. A. Van Der Poll, “Security Failure Trends of Cloud Computing,” 2017 IEEE 3rd Int. Conf. Collab. Internet Comput., no. Vm, pp. 247–256, 2017. Z. P. Gariba and J. A. Van Der Poll, “Security Failure Trends of Cloud Computing,” 2017 IEEE 3rd Int. Conf. Collab. Internet Comput., no. Vm, pp. 247–256, 2017.
3.
go back to reference F. Daryabar, A. Dehghantanha, and K.-K. R. Choo, “Cloud storage forensics: MEGA as a case study,” Aust. J. Forensic Sci., pp. 1–14, Apr. 2016. F. Daryabar, A. Dehghantanha, and K.-K. R. Choo, “Cloud storage forensics: MEGA as a case study,” Aust. J. Forensic Sci., pp. 1–14, Apr. 2016.
4.
go back to reference M. Shariati, A. Dehghantanha, and K.-K. R. Choo, “SugarSync forensic analysis,” Aust. J. Forensic Sci., vol. 48, no. 1, pp. 95–117, Apr. 2015. M. Shariati, A. Dehghantanha, and K.-K. R. Choo, “SugarSync forensic analysis,” Aust. J. Forensic Sci., vol. 48, no. 1, pp. 95–117, Apr. 2015.
5.
go back to reference Y.-Y. Teing, D. Ali, K.-K. R. Choo, and M. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., no. 2016, 2016. Y.-Y. Teing, D. Ali, K.-K. R. Choo, and M. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., no. 2016, 2016.
6.
go back to reference F. Daryabar, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices,” Aust. J. Forensic Sci., vol. 48, no. 6, pp. 615–642, Nov. 2016. F. Daryabar, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices,” Aust. J. Forensic Sci., vol. 48, no. 6, pp. 615–642, Nov. 2016.
7.
go back to reference Y.-Y. Teing, A. Dehghantanha, and K.-K. R. Choo, “CloudMe forensics: A case of big data forensic investigation,” Concurr. Comput. Pract. Exp., p. e4277, Jul. 2017. Y.-Y. Teing, A. Dehghantanha, and K.-K. R. Choo, “CloudMe forensics: A case of big data forensic investigation,” Concurr. Comput. Pract. Exp., p. e4277, Jul. 2017.
8.
go back to reference O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016. O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016.
9.
go back to reference Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, T. Dargahi, and M. Conti, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensic Sci., vol. 62, no. 3, 2017. Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, T. Dargahi, and M. Conti, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensic Sci., vol. 62, no. 3, 2017.
10.
go back to reference A. A. James Baldwin, Omar Alhawi, Simone Shaughnessy and A. Dehghantanha, Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies. Cyber Threat Intelligence- Springer Book, 2017. A. A. James Baldwin, Omar Alhawi, Simone Shaughnessy and A. Dehghantanha, Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies. Cyber Threat Intelligence- Springer Book, 2017.
11.
go back to reference T. Dargahi, A. Dehghantanha, and M. Conti, Investigating Storage as a Service Cloud Platform: PCloud as a Case Study. 2016. T. Dargahi, A. Dehghantanha, and M. Conti, Investigating Storage as a Service Cloud Platform: PCloud as a Case Study. 2016.
12.
go back to reference S. H. Mohtasebi, A. Dehghantanha, and K.-K. R. Choo, Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. 2016. S. H. Mohtasebi, A. Dehghantanha, and K.-K. R. Choo, Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. 2016.
13.
go back to reference A. Dehghantanha and T. Dargahi, Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies. 2016. A. Dehghantanha and T. Dargahi, Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies. 2016.
14.
go back to reference M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, and A. Dehghantanha, An Android Cloud Storage Apps Forensic Taxonomy. 2016. M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, and A. Dehghantanha, An Android Cloud Storage Apps Forensic Taxonomy. 2016.
15.
go back to reference J. Gill, I. Okere, H. HaddadPajouh, and A. Dehghantanha, Mobile forensics: A bibliometric analysis, vol. 70. 2018. J. Gill, I. Okere, H. HaddadPajouh, and A. Dehghantanha, Mobile forensics: A bibliometric analysis, vol. 70. 2018.
16.
go back to reference H. L. Dqj et al., “Global Research Trends in Agro-Geoinformatics during 1991-2015: A Bibliometric Analysis,” 2017 6th Int. Conf. Agro-Geoinformatics, 2017. H. L. Dqj et al., “Global Research Trends in Agro-Geoinformatics during 1991-2015: A Bibliometric Analysis,” 2017 6th Int. Conf. Agro-Geoinformatics, 2017.
17.
go back to reference M. El Ansary and M. Oubrich, “State of the art and trends of the research on XBRL bibliometric analysis from 2000-2014,” Colloq. Inf. Sci. Technol. Cist, pp. 243–250, 2017. M. El Ansary and M. Oubrich, “State of the art and trends of the research on XBRL bibliometric analysis from 2000-2014,” Colloq. Inf. Sci. Technol. Cist, pp. 243–250, 2017.
18.
go back to reference M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, “The rise of ‘malware’: Bibliometric analysis of malware study,” J. Netw. Comput. Appl., vol. 75, pp. 58–76, 2016. M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, “The rise of ‘malware’: Bibliometric analysis of malware study,” J. Netw. Comput. Appl., vol. 75, pp. 58–76, 2016.
19.
go back to reference F. Blanco-Mesa, J. M. M. Lindahl, and A. M. Gil-Lafuente, “A bibliometric analysis of fuzzy decision making research,” 2016 Annu. Conf. North Am. Fuzzy Inf. Process. Soc., pp. 1–4, 2016. F. Blanco-Mesa, J. M. M. Lindahl, and A. M. Gil-Lafuente, “A bibliometric analysis of fuzzy decision making research,” 2016 Annu. Conf. North Am. Fuzzy Inf. Process. Soc., pp. 1–4, 2016.
20.
go back to reference J. M. Merigo, F. Blanco-Mesa, A. M. Gil-Lafuente, and R. R. Yager, “A bibliometric analysis of the first thirty years of the International Journal of Intelligent Systems,” 2016 IEEE Symp. Ser. Comput. Intell., pp. 1–6, 2016. J. M. Merigo, F. Blanco-Mesa, A. M. Gil-Lafuente, and R. R. Yager, “A bibliometric analysis of the first thirty years of the International Journal of Intelligent Systems,” 2016 IEEE Symp. Ser. Comput. Intell., pp. 1–6, 2016.
21.
go back to reference G. Buela-Casal, O. Gutiérrez-Martínez, M. P. Bermúdez-Sánchez, and O. Vadillo-Muñoz, “Comparative study of international academic rankings of universities,” Scientometrics, vol. 71, no. 3, pp. 349–365, 2007. G. Buela-Casal, O. Gutiérrez-Martínez, M. P. Bermúdez-Sánchez, and O. Vadillo-Muñoz, “Comparative study of international academic rankings of universities,” Scientometrics, vol. 71, no. 3, pp. 349–365, 2007.
22.
go back to reference T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. K. Liu, “Towards secure and reliable cloud storage against data re-outsourcing,” Futur. Gener. Comput. Syst., vol. 52, pp. 86–94, 2015. T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. K. Liu, “Towards secure and reliable cloud storage against data re-outsourcing,” Futur. Gener. Comput. Syst., vol. 52, pp. 86–94, 2015.
23.
go back to reference J. Sun, M. H. Wang, and Y. S. Ho, “A historical review and bibliometric analysis of research on estuary pollution,” Mar. Pollut. Bull., vol. 64, no. 1, pp. 13–21, 2012. J. Sun, M. H. Wang, and Y. S. Ho, “A historical review and bibliometric analysis of research on estuary pollution,” Mar. Pollut. Bull., vol. 64, no. 1, pp. 13–21, 2012.
24.
go back to reference B. Blakeley, C. Cooney, A. Dehghantanha, and R. Aspin, “Cloud Storage Forensic: hubiC as a Case-Study,” in 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015, pp. 536–541. B. Blakeley, C. Cooney, A. Dehghantanha, and R. Aspin, “Cloud Storage Forensic: hubiC as a Case-Study,” in 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015, pp. 536–541.
25.
go back to reference M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 23–27. M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 23–27.
26.
go back to reference Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, Z. Muda, M. T. Abdullah, and W.-C. Chai, “A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts,” in Security, Privacy and Anonymity in Computation, Communication and Storage, G. Wang, I. Ray, J. M. A. Calero, and S. M. Thampi, Eds. Springer International Publishing, 2016, pp. 342–357. Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, Z. Muda, M. T. Abdullah, and W.-C. Chai, “A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts,” in Security, Privacy and Anonymity in Computation, Communication and Storage, G. Wang, I. Ray, J. M. A. Calero, and S. M. Thampi, Eds. Springer International Publishing, 2016, pp. 342–357.
27.
go back to reference H. Lv and Y. Hu, “Analysis and research about cloud computing security protect policy,” Proc. - 2011 Int. Conf. Intell. Sci. Inf. Eng. ISIE 2011, pp. 214–216, 2011. H. Lv and Y. Hu, “Analysis and research about cloud computing security protect policy,” Proc. - 2011 Int. Conf. Intell. Sci. Inf. Eng. ISIE 2011, pp. 214–216, 2011.
28.
go back to reference M. Shariati, A. Dehghantanha, B. Martini, and K.-K. R. Choo, “Chapter 19 - Ubuntu One investigation: Detecting evidences on client machines,” in The Cloud Security Ecosystem, R. K.-K. R. Choo, Ed. Boston: Syngress, 2015, pp. 429–446. M. Shariati, A. Dehghantanha, B. Martini, and K.-K. R. Choo, “Chapter 19 - Ubuntu One investigation: Detecting evidences on client machines,” in The Cloud Security Ecosystem, R. K.-K. R. Choo, Ed. Boston: Syngress, 2015, pp. 429–446.
29.
go back to reference A. Dehghantanha and K. Franke, “Privacy-respecting digital investigation,” in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014, pp. 129–138. A. Dehghantanha and K. Franke, “Privacy-respecting digital investigation,” in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014, pp. 129–138.
30.
go back to reference T. Y. Yang, A. Dehghantanha, K. R. Choo, and Z. Muda, “Windows Instant Messaging App Forensics: Facebook and Skype as case studies,” PLoS One, Feb. 2016. T. Y. Yang, A. Dehghantanha, K. R. Choo, and Z. Muda, “Windows Instant Messaging App Forensics: Facebook and Skype as case studies,” PLoS One, Feb. 2016.
31.
go back to reference F. Norouzizadeh Dezfouli, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms,” Aust. J. Forensic Sci., pp. 1–20, Aug. 2015. F. Norouzizadeh Dezfouli, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms,” Aust. J. Forensic Sci., pp. 1–20, Aug. 2015.
32.
go back to reference M. Damshenas, A. Dehghantanha, K.-K. R. Choo, and R. Mahmud, “M0Droid: An Android Behavioral-Based Malware Detection Model,” J. Inf. Priv. Secur., Sep. 2015. M. Damshenas, A. Dehghantanha, K.-K. R. Choo, and R. Mahmud, “M0Droid: An Android Behavioral-Based Malware Detection Model,” J. Inf. Priv. Secur., Sep. 2015.
33.
go back to reference N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng., vol. 61, 2017. N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng., vol. 61, 2017.
34.
go back to reference M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018. M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018.
35.
go back to reference S. Watson and A. Dehghantanha, “Digital forensics: the missing piece of the Internet of Things promise,” Comput. Fraud Secur., vol. 2016, no. 6, pp. 5–8, Jun. 2016. S. Watson and A. Dehghantanha, “Digital forensics: the missing piece of the Internet of Things promise,” Comput. Fraud Secur., vol. 2016, no. 6, pp. 5–8, Jun. 2016.
Metadata
Title
Bibliometric Analysis on the Rise of Cloud Security
Authors
Lim Sze Thiam
Tooska Dargahi
Ali Dehghantanha
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-10543-3_14

Premium Partner