Advertisement

Bibliometric Analysis on the Rise of Cloud Security

  • Lim Sze Thiam
  • Tooska Dargahi
  • Ali DehghantanhaEmail author
Chapter

Abstract

Cloud storage systems are becoming a gold mine for cyber attackers as they storage a lot of private and confidential information. Therefore, a lot of research is directed toward securing cloud platforms. Majority of cloud security related research or studies are emphasising on looking into prevention, detection, and mitigation methods against the threat in cloud computing. Although there are many research studies in this area, there are still no evidence of any bibliometric analysis on the cloud security context. This paper provides a bibliometric analysis of research development in cloud security from 2010 to 2018. A dataset of 656 academic papers are used for analysis in term of most productive countries, institutions, journals, authors, research areas, keywords, and also highly cited articles. We found that countries of China, India and United States are the top contributor of the findings. Trends in number of publication in the area of cloud security increases and the number of related keywords increases as well.

Keywords

Cloud computing Security Bibliometric analysis Cloud security 

References

  1. 1.
    Y.-Y. Teing, A. Dehghantanha, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017.Google Scholar
  2. 2.
    Z. P. Gariba and J. A. Van Der Poll, “Security Failure Trends of Cloud Computing,” 2017 IEEE 3rd Int. Conf. Collab. Internet Comput., no. Vm, pp. 247–256, 2017.Google Scholar
  3. 3.
    F. Daryabar, A. Dehghantanha, and K.-K. R. Choo, “Cloud storage forensics: MEGA as a case study,” Aust. J. Forensic Sci., pp. 1–14, Apr. 2016.Google Scholar
  4. 4.
    M. Shariati, A. Dehghantanha, and K.-K. R. Choo, “SugarSync forensic analysis,” Aust. J. Forensic Sci., vol. 48, no. 1, pp. 95–117, Apr. 2015.Google Scholar
  5. 5.
    Y.-Y. Teing, D. Ali, K.-K. R. Choo, and M. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., no. 2016, 2016.Google Scholar
  6. 6.
    F. Daryabar, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices,” Aust. J. Forensic Sci., vol. 48, no. 6, pp. 615–642, Nov. 2016.Google Scholar
  7. 7.
    Y.-Y. Teing, A. Dehghantanha, and K.-K. R. Choo, “CloudMe forensics: A case of big data forensic investigation,” Concurr. Comput. Pract. Exp., p. e4277, Jul. 2017.Google Scholar
  8. 8.
    O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016.Google Scholar
  9. 9.
    Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, T. Dargahi, and M. Conti, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensic Sci., vol. 62, no. 3, 2017.Google Scholar
  10. 10.
    A. A. James Baldwin, Omar Alhawi, Simone Shaughnessy and A. Dehghantanha, Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies. Cyber Threat Intelligence- Springer Book, 2017.Google Scholar
  11. 11.
    T. Dargahi, A. Dehghantanha, and M. Conti, Investigating Storage as a Service Cloud Platform: PCloud as a Case Study. 2016.Google Scholar
  12. 12.
    S. H. Mohtasebi, A. Dehghantanha, and K.-K. R. Choo, Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. 2016.Google Scholar
  13. 13.
    A. Dehghantanha and T. Dargahi, Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies. 2016.Google Scholar
  14. 14.
    M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, and A. Dehghantanha, An Android Cloud Storage Apps Forensic Taxonomy. 2016.Google Scholar
  15. 15.
    J. Gill, I. Okere, H. HaddadPajouh, and A. Dehghantanha, Mobile forensics: A bibliometric analysis, vol. 70. 2018.Google Scholar
  16. 16.
    H. L. Dqj et al., “Global Research Trends in Agro-Geoinformatics during 1991-2015: A Bibliometric Analysis,” 2017 6th Int. Conf. Agro-Geoinformatics, 2017.Google Scholar
  17. 17.
    M. El Ansary and M. Oubrich, “State of the art and trends of the research on XBRL bibliometric analysis from 2000-2014,” Colloq. Inf. Sci. Technol. Cist, pp. 243–250, 2017.Google Scholar
  18. 18.
    M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, “The rise of ‘malware’: Bibliometric analysis of malware study,” J. Netw. Comput. Appl., vol. 75, pp. 58–76, 2016.Google Scholar
  19. 19.
    F. Blanco-Mesa, J. M. M. Lindahl, and A. M. Gil-Lafuente, “A bibliometric analysis of fuzzy decision making research,” 2016 Annu. Conf. North Am. Fuzzy Inf. Process. Soc., pp. 1–4, 2016.Google Scholar
  20. 20.
    J. M. Merigo, F. Blanco-Mesa, A. M. Gil-Lafuente, and R. R. Yager, “A bibliometric analysis of the first thirty years of the International Journal of Intelligent Systems,” 2016 IEEE Symp. Ser. Comput. Intell., pp. 1–6, 2016.Google Scholar
  21. 21.
    G. Buela-Casal, O. Gutiérrez-Martínez, M. P. Bermúdez-Sánchez, and O. Vadillo-Muñoz, “Comparative study of international academic rankings of universities,” Scientometrics, vol. 71, no. 3, pp. 349–365, 2007.Google Scholar
  22. 22.
    T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. K. Liu, “Towards secure and reliable cloud storage against data re-outsourcing,” Futur. Gener. Comput. Syst., vol. 52, pp. 86–94, 2015.Google Scholar
  23. 23.
    J. Sun, M. H. Wang, and Y. S. Ho, “A historical review and bibliometric analysis of research on estuary pollution,” Mar. Pollut. Bull., vol. 64, no. 1, pp. 13–21, 2012.Google Scholar
  24. 24.
    B. Blakeley, C. Cooney, A. Dehghantanha, and R. Aspin, “Cloud Storage Forensic: hubiC as a Case-Study,” in 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015, pp. 536–541.Google Scholar
  25. 25.
    M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 23–27.Google Scholar
  26. 26.
    Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, Z. Muda, M. T. Abdullah, and W.-C. Chai, “A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts,” in Security, Privacy and Anonymity in Computation, Communication and Storage, G. Wang, I. Ray, J. M. A. Calero, and S. M. Thampi, Eds. Springer International Publishing, 2016, pp. 342–357.Google Scholar
  27. 27.
    H. Lv and Y. Hu, “Analysis and research about cloud computing security protect policy,” Proc. - 2011 Int. Conf. Intell. Sci. Inf. Eng. ISIE 2011, pp. 214–216, 2011.Google Scholar
  28. 28.
    M. Shariati, A. Dehghantanha, B. Martini, and K.-K. R. Choo, “Chapter 19 - Ubuntu One investigation: Detecting evidences on client machines,” in The Cloud Security Ecosystem, R. K.-K. R. Choo, Ed. Boston: Syngress, 2015, pp. 429–446.Google Scholar
  29. 29.
    A. Dehghantanha and K. Franke, “Privacy-respecting digital investigation,” in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2014, pp. 129–138.Google Scholar
  30. 30.
    T. Y. Yang, A. Dehghantanha, K. R. Choo, and Z. Muda, “Windows Instant Messaging App Forensics: Facebook and Skype as case studies,” PLoS One, Feb. 2016.Google Scholar
  31. 31.
    F. Norouzizadeh Dezfouli, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms,” Aust. J. Forensic Sci., pp. 1–20, Aug. 2015.Google Scholar
  32. 32.
    M. Damshenas, A. Dehghantanha, K.-K. R. Choo, and R. Mahmud, “M0Droid: An Android Behavioral-Based Malware Detection Model,” J. Inf. Priv. Secur., Sep. 2015.Google Scholar
  33. 33.
    N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng., vol. 61, 2017.Google Scholar
  34. 34.
    M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018.Google Scholar
  35. 35.
    S. Watson and A. Dehghantanha, “Digital forensics: the missing piece of the Internet of Things promise,” Comput. Fraud Secur., vol. 2016, no. 6, pp. 5–8, Jun. 2016.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Lim Sze Thiam
    • 1
  • Tooska Dargahi
    • 2
  • Ali Dehghantanha
    • 3
    Email author
  1. 1.School of Computing, Science and EngineeringUniversity of SalfordManchesterUK
  2. 2.Department of Computer Science, School of Computing, Science and EngineeringUniversity of SalfordManchesterUK
  3. 3.Cyber Science Lab, School of Computer ScienceUniversity of GuelphGuelphCanada

Personalised recommendations