Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions
Abstract
:1. Introduction
2. Background and Related Work
3. Scope of the Systematic Review
3.1. Inclusion Criteria
- Research publications that dealt with cloud-based security risk management for business process were extracted.
- Research publications with the content of CC security risk challenges/threats were extracted.
- Research publications written only in English language were considered.
- Research publications written and published within the last eleven years were considered.
- Research publications with similar title to our area of review were extracted.
- Research publications that possess common keywords to our specified search strings/words were considered.
3.2. Exclusion Criteria
- Research publications centered on cloud-based SRM were excluded.
- Research publications on security risk-aware business process were not considered.
- Research publications on business intelligence in CC were excluded.
- Research publications on cloud-based SRM “Something-as-a-Service” were excluded.
- Non-English language documented papers were excluded.
- Duplicated publications were excluded.
- Research publications on cloud security and not cloud security risks were excluded.
- Management process-based papers were not considered.
- Research works with the year of publication from 2009 and earlier were not considered.
4. Literature Search Procedure
4.1. Focus
- Establish research approach and detailed study which consider security risk management in the business process as a means of security measure for cloud-based business process.
- Discover an approach incorporating security risk management in any of the business process management phases deployed to the cloud.
- Establish the incorporation of existing security risk assessment techniques as the basis of their analysis.
- Know whether the security risk standard is integrated in building a secure cloud-based business process.
4.2. Search Quality and Amplitude
- Cloud security.
- Cloud-based business process security risk management,
- Business process risk management in the cloud environment.
- Business process risk-aware systems
- Business process security risk management
- Security risk as a service
5. Research Methodology
5.1. Selection of Sources Used
5.2. Studies Selection Procedure
5.3. How the Information Was Extracted
5.4. Analysis of the Extracted Studies
5.5. Taxonomy of Cloud Security Risks That May Affect Cloud-Based Business Processes
5.5.1. Data Security
5.5.2. Logical Access/Secrecy Issues
5.5.3. Network Security
5.5.4. Physical Access
5.5.5. Compliance
5.5.6. Virtualization
5.6. Mapping of Cloud-Based Security Risk Taxonomy
5.7. Literature Evaluation Framework
5.7.1. Business Process Lifecycle Evaluation
- Identification phase: Does the approach propose any means of risk identification in business process models and principles/guidelines that can reduce business process security risks?
- Modeling phase: Does the approach give risk assessment technique(s) to assess business process security risks during the modeling phase?
- Implementation phase: Is there any suggestion by the approach regarding technique(s) to assess business process security risks at the implementation phase?
- Monitoring phase: Is there any suggestion by the approach regarding techniques to assess security risks in the business process (during the monitoring phase) on the logs documentation from implementing the process?
5.7.2. Influence of Risk Management Domain on Cloud-Based Business Process Security
Security Risk Analysis Technique
- Is there anywhere any of the existing risk analysis techniques are applied in the approach?
- Is there any way any of the existing security risk analysis techniques are adapted for use?
- Does the proposed approach use any existing security risk analysis method or not?
Usage of Security Risk Standard
Domain Applicability
6. Trends and Critical Analysis
6.1. Business Process Life Cycle Evaluation Result
6.2. Influence of Risk Management Domain Evaluation Result
6.2.1. Domain Applicability Evaluation Result
6.2.2. Evaluation Result for Usage of Existing Risk Management Techniques
6.2.3. Evaluation Result for the Integration of Security Risk Standards
6.3. Future Directions
7. Summary and Conclusions
- For the business process lifecycle evaluation, the result shows that most of the evaluated works that dealt with risk assessment do not incorporate it into the business process lifecycle; only 17.6% did so, which constitutes 3 studies out of 17 evaluated works.
- For domain applicability evaluation result, 53% of the evaluated works were tested in real time and therefore the works were validated and reused.
- The evaluation result for the usage of existing security risk analysis techniques shows that 9 authors out of 17 (52.9%) carried out their research work using the existing risk analysis technique.
- The evaluation result for the integration of security risk standards indicates that it was tedious to implement a methodology/process that incorporated all the stated conditions and the security restrictions. Consequently, many methodologies/processes do not integrate these standards in an easily understandable and methodical way. Five authors constituted 29.4% integrated security risk standards in their work.
Limitation of the Study
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviation
BPM | Business Process Management |
BP | Business Process |
BPLC | Business Process Life Cycle |
SRM | Security Risk Management |
CC | Cloud Computing |
ENISA | European Network of Information Security Agencies |
CVSS | Common Vulnerability Scoring System |
CWRAF | Common Weakness Risk Assessment Framework |
CFS | Critical Factor of the Success |
References
- Van der Aalst, V.M. Business process management: A comprehensive survey. ISRN Softw. Eng. 2013, 2013, 507984. [Google Scholar] [CrossRef] [Green Version]
- Mahal, A. How Work Gets Done: Business Process Management, Basics and Beyond; Technics Publications, LLC: Lavallette, NJ, USA, 2010. [Google Scholar]
- Damelio, R. The Basics of Process Mapping; Taylor & Francis: Boca Raton, FL, USA, 2011. [Google Scholar]
- Van Looy, A.; Shafagatova, A. Business process performance measurement: A structured literature review of indicators, measures and metrics. SpringerPlus 2016, 5, 1797. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Harmon, P. Business Process Change: A Guide for Business Managers and BPM and Six Sigma Professionals, 2nd ed.; Morgan Kaufmann: Burlington, MA, USA, 2010. [Google Scholar]
- Vaquero, L.; Rodero-Marino, L.; Caceres, J.; Lindner, M. A Break in the Clouds: Towards a Cloud Definition. SIGCOMM Comput. Commun. Rev. 2008, 39, 137–150. [Google Scholar] [CrossRef]
- NIST. The NIST Definition of Cloud Computing; Gartner: Stamford, CT, USA, 2012. [Google Scholar]
- Ratcliffe, J. Intelligence-Led Policing. Trends Issues Crime Crim. Justice 2003, 248, 1–6. [Google Scholar]
- Tang, C.; Liu, J. Selecting a trusted cloud service provider for your SaaS program. Comput. Secur. 2015, 50, 60–73. [Google Scholar] [CrossRef]
- Goettelmann, E.; Mayer, N.; Godart, C. A general approach for a trusted deployment of a business process in clouds. In Proceedings of the Fifth International Conference on Tangible, Embedded, and Embodied Interaction, Luxembourg, 28–31 October 2013; pp. 92–99. [Google Scholar] [CrossRef]
- Chen, D.; Zhao, H. Data Security and Privacy Protection Issues in Cloud Computing. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 23–25 March 2012; pp. 647–651. [Google Scholar]
- Jansen, W.A. Cloud Hooks: Security and Privacy Issues in Cloud Computing. In Proceedings of the 2011 44th Hawaii International Conference on System Sciences, Kauai, HI, USA, 4–7 January 2011; pp. 1–10. [Google Scholar]
- Leuprecht, C.; Skillicorn, D.B.; Tait, V.E. Beyond the Castle Model of cyber-risk and cyber-security. Gov. Inf. Q. 2016, 33, 250–257. [Google Scholar] [CrossRef]
- Kuo A., M. Opportunities and challenges of cloud computing to improve health care services. J. Med. Internet Res. 2011, 13, e67. [Google Scholar] [CrossRef]
- Bhagawat, V.C.; Kumar, A.L.S. Survey on data security issues in cloud environment. Int. J. Innov. Res. Adv. Eng. 2015, 2, 31–35. [Google Scholar]
- Conforti, R.; Fortino, G.; La Rosa, M.; ter Hofstede, A. History-aware Real-time Risk Detection in Business Processes. In CoopIS, DOA-SVI, and ODBASE LNCS; Meersman, R., Dillon, T., Herrero, P., Kumar, A., Reichert, M., Qing, L., Ooi, B., Damiani, E., Schmidt, D., White, J., et al., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; Volume 7044, p. 100. [Google Scholar]
- Kitchenham, B. Procedures for Perfoming Systematic Review; Joint Technical Report; Software Engineering Group, Department of Computer Science, Keele University: Keele, UK; Empirical Software Engineering, National ICT Australia Ltd: Sydney, Australia, 2004. [Google Scholar]
- Kitchenham, B. Guideline for Performing Systematic Literature Reviews in Software Engineering; Version 2.3; University of Keele and Durham: Keele, UK, 2007. [Google Scholar]
- Brereton, P.; Kitchenham, B.; Budgen, D.; Turner, M.; Khalil, M. Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Softw. 2007, 80, 571–583. [Google Scholar] [CrossRef] [Green Version]
- Biolchini, J.; Mian, P.G.; Natali, A.C.C.; Travassos, G.H. Systematic Review in Software Engineering; Systems Engineering and Computer Science Department COPPE/UFRJ: Rio de Janeiro, Brazil, 2005. [Google Scholar]
- Jakoubi, S.; Tjoa, S.; Goluch, G.; Quirchmayr, G. A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management. In Proceedings of the 2009 20th International Workshop on Database and Expert Systems Application, DEXA’09, Linz, Austria, 31 August–4 September 2009; pp. 127–132. [Google Scholar] [CrossRef] [Green Version]
- Rikhardsson, P.; Best, P.; Green, P.; Rosemann, M. Business Process Risk Management and Internal Control: A Proposed Research Agenda in the Context of Compliance and ERP Systems. 2006. Available online: https://eprints.qut.edu.au/5192 (accessed on 3 September 2020).
- Suriadi, S.; Weiß, B.; Winkelmann, A.; Arthur, H.M.; Hofstede, T.; Adams, M.; Conforti, R.; Fidge, C.; La Rosa, M.; Ouyang, C.; et al. Current Research in Risk-aware Business Process Management―Overview, Comparison, and Gap Analysis. Commun. Assoc. Inf. Syst. (CAIS) 2014, 34, 52. [Google Scholar] [CrossRef]
- Aguilar-Saven, R.S. Business process modeling: Review and framework. Int. J. Prod. Econ. 2004, 90, 129–149. [Google Scholar] [CrossRef] [Green Version]
- Thabet, R.; Bork, D.; Boufaied, A.; Lamine, E.; Korbaa, O.; Pingaud, H. Risk-aware business process management using multi-view modeling: Method and tool. Requir. Eng. 2021, 26, 371–397. [Google Scholar] [CrossRef]
- Lamine, E.; Thabet, R.; Sienou, A.; Bork, D.; Fontanili, F.; Pingaud, H. BPRIM: An integrated framework for business process management and risk management. Comput. Ind. 2020, 117, 1–17. [Google Scholar] [CrossRef] [Green Version]
- Dixon, J. BPM Survey Insights: Maturity Advances as BPM Goes Mainstream; Gartner: Stamford, CT, USA, 2011. [Google Scholar]
- Dixon, J.; Jones, T. Hype Cycle for Business Process Management; Gartner: Stamford, CT, USA, 2011. [Google Scholar]
- Vollmer, K.; Leganza, G.; Pilecki, M.; Smillie, K. The EA View: BPM Has Become Mainstream; Forrester: Cambridge, MA, USA, 2008. [Google Scholar]
- Gengler, B. BPM to Buck Slowing Spend Trend. The Australian. 2008. Available online: http://www.theaustralian.com.au/news/ (accessed on 3 September 2020).
- Dumas, M.; Van der Aalst, V.; ter Hofstede, V. Process-Aware Information Systems: Bridging People and Software through Process Technology; John Wiley & Sons: Hoboken, NJ, USA, 2005. [Google Scholar]
- Dumas, M.; La Rosa, M.; Mendling, J.; Reijers, H.A. Fundamentals of Business Process Management; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Bernardo, R.; Galina, S.V.R.; de Pádua, S.I.D. The BPM lifecycle: How to incorporate a view external to the organization through dynamic capability. Bus. Process Manag. J. 2017, 23, 155–175. [Google Scholar] [CrossRef]
- Klems, M.; Nimis, J.; Tai, S. Do Clouds Compute? A Framework for Estimating the Value of Cloud Computing. Lect. Notes Bus. Inf. Process. 2009, 22, 110–123. [Google Scholar] [CrossRef]
- Cearley, D. Hype Cycle for Applications Development; Gartner Group Reporter Number G00147982; Gartner: Stamford, CT, USA, 2009. [Google Scholar]
- Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I.; et al. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef] [Green Version]
- Aljabre, A. Cloud Computing for Increased Business Value. Int. J. Bus. Soc. Sci. 2012, 3, 234–239. [Google Scholar]
- Morin, J.-H.; Aubert, J.; Gateau, B. Towards Cloud Computing SLA Risk Management: Issues and Challenges. In Proceedings of the 2012 45th Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2012; pp. 5509–5514. [Google Scholar]
- Jiang, S. Research on Risk Evaluation of Information Security Based on Cloud Computer. In Proceedings of the 2018 International Conference on Internet and e-Business, Singapore, 25–27 April 2018. [Google Scholar] [CrossRef]
- Choo, K.-K.R. A Cloud Security Risk-Management Strategy. IEEE Cloud Comput. 2014, 1, 52–56. [Google Scholar] [CrossRef]
- Gupta, S.; Saini, A.K. Modeling Risk Management in Cloud Adoption. In Proceedings of the IEEE 5th International Conference on System Modeling & Advancement in Research Trends, Moradabad, India, 25–27 November 2016; pp. 238–241. [Google Scholar]
- Razaque, A.; Li, Y.; Liu, Q.; Khan, M.J.; Doulat, A.; Almiani, M.; Alflahat, A. Enhanced Risk Minimization Framework for Cloud Computing Environment. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Islam, S.; Fenz, S.; Weippl, E.; Mouratidis, H. A Risk Management Framework for Cloud Migration Decision Support. J. Risk Financ. Manag. 2017, 10, 10. [Google Scholar] [CrossRef] [Green Version]
- Gupta, S.; Saxena, K.B.C.; Saini, A.K. Towards Risk Managed Cloud Adoption: A Conceptual Framework. In Proceedings of the 2016 International Conference on Industrial Engineering and Operations Management, Kuala Lumpur, Malaysia, 8–10 March 2016; pp. 1–7. [Google Scholar]
- Basu, S.; Sengupta, A.; Mazumdar, C. A Quantitative Methodology for Cloud Security Risk Assessment. In Proceedings of the 7th International Conference Proceedings on Cloud Computing and Services Science (CLOSER 2017), Porto, Portugal, 24–26 April 2017; pp. 92–103. [Google Scholar]
- Al-Anzi, F.S.; Yadav, S.K.; Soni, J. Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance. In Proceedings of the 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC), Delhi, India, 5–6 September 2014; pp. 1–6. [Google Scholar]
- Aruna, E.; Shri, A.; Lakkshmanan, A. Security concerns and risk at different levels in Cloud Computing. In Proceedings of the 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), Chennai, India, 12–14 December 2013; pp. 743–746. [Google Scholar]
- Aswin, M.; Kavitha, M. Cloud intelligent track—Risk analysis and privacy data management in the cloud computing. In Proceedings of the 2012 International Conference on Recent Trends in Information Technology, Chennai, India, 19–21 April 2012; pp. 222–227. [Google Scholar]
- Chang, V.; Ramachandran, M. Towards Achieving Data Security with the Cloud Computing Adoption Framework. IEEE Trans. Serv. Comput. 2016, 9, 138–151. [Google Scholar] [CrossRef] [Green Version]
- Dahbur, K.; Mohammad, B.; Tarakji, A.B. A survey of risks, threats and vulnerabilities in cloud computing. In Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications, Amman, Jordan, 18–20 April 2011; p. 12. [Google Scholar]
- Damenu, T.K.; Balakrishna, C. Cloud Security Risk Management: A Critical Review. In Proceedings of the 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, Cambridge, UK, 9–11 September 2015; pp. 370–375. [Google Scholar]
- Djemame, K.; Armstrong, D.; Guitart, J.; Macias, M. A Risk Assessment Framework for Cloud Computing. IEEE Trans. Cloud Comput. 2014, 4, 265–278. [Google Scholar] [CrossRef] [Green Version]
- El Kefel, M.D.; Mohamed, B. Risk Management in Cloud Computing. In Proceedings of the 2013 Third International Conference on Innovative Computing Technology (INTECH), London, UK, 29–31 August 2013; pp. 127–131. [Google Scholar]
- Khan, A.U.; Oriol, M.; Kiran, M.; Jiang, M.; Djemame, K.; Khan, A.U. Security risks and their management in cloud computing. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, Taipei, Taiwan, 3–6 December 2012; pp. 121–128. [Google Scholar]
- Marbukh, V. Systemic Risks in the Cloud Computing Model: Complex Systems Perspective. In Proceedings of the 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 27 June–2 July 2016; pp. 863–866. [Google Scholar]
- Albakri, S.H.; Shanmugam, B.; Samy, G.N.; Idris, N.B.; Ahmed, A. Security risk assessment framework for cloud computing environments. Secur. Commun. Netw. 2014, 7, 2114–2124. [Google Scholar] [CrossRef]
- Drissi, S.; Houmani, H.; Medromi, H. Survey: Risk Assessment for Cloud Computing. Int. J. Adv. Comput. Sci. Appl. 2013, 4, 143–148. [Google Scholar] [CrossRef] [Green Version]
- Wu, J.; Wang, Z.; Gao, S. Assessing the cloud migration readiness: A fuzzy AHP approach based on BTR framework. In Proceedings of the 2014 11th International Conference on Service Systems and Service Management (ICSSSM), Beijing, China, 25–27 June 2014; pp. 1–6. [Google Scholar] [CrossRef]
- Xie, F.; Peng, Y.; Zhao, W.; Chen, D.; Wang, X.; Huo, X. A risk management framework for cloud computing. In Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, Hangzhou, China, 30 October–1 November 2012; Volume 1, pp. 476–480. [Google Scholar]
- Mircea, M.; Ghilic, B.; Stoica, M. Combining Business Intelligence with Cloud Computing to Delivery Agility in Actual Economy. J. Econ. Comput. Econ. Cybern. Stud. Res. 2012, 45, 39–54. [Google Scholar]
- Islam, S.; Weippl, E.R.; Krombholz, K. A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives. In Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, Hanoi, Vietnam, 4 December 2014; pp. 185–189. [Google Scholar]
- Griffy-Brown, C.; Lazarikos, D.; Chun, M. Agile Business Growth and Cyber Risk. In Proceedings of the 2018 IEEE Technology and Engineering Management Conference (TEMSCON), Evanston, IL, USA, 28 June–1 July 2018; pp. 1–6. [Google Scholar]
- Chen, W.; Sharieh, S.; Blainey, B. A Security-as-a-Service Solution for Applications in Cloud Computing Environment. In Proceedings of the Society for Modeling and Simulation (SCS) International, Baltimore, MD, USA, 15–18 April 2018. [Google Scholar] [CrossRef]
- Peake, C. Security in the cloud: Understanding the risks of cloud-as-a-service. In Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 13–15 November 2012; pp. 336–340. [Google Scholar]
- Iqbal, S.; Kiah, M.L.M.; Dhaghighi, B.; Hussain, M.; Khan, S.; Khan, M.K.; Choo, K.-K.R. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 2016, 74, 98–120. [Google Scholar] [CrossRef]
- Fall, D.; Okuda, T.; Kadobayashi, Y.; Yamaguchi, S. Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms. J. Inf. Process. 2015, 23, 465–475. [Google Scholar] [CrossRef] [Green Version]
- Hussain, M.; Abdulsalam, H. SECaaS: Security as a Service for Cloud-based Applications. In Proceedings of the 2nd Kuwait Conference on E-Services and E-Systems, Kuwait City, Kuwait, 5–7 April 2011; pp. 1–4. [Google Scholar]
- Senk, C. Adoption of security as a service. J. Internet Serv. Appl. 2013, 4, 11. [Google Scholar] [CrossRef] [Green Version]
- Al-Qurishi, M.; Al-Rakhami, M.; AlRubaian, M.; Alamri, A. A Framework of Knowledge Management as a Service over Cloud Computing Platform. In Proceedings of the International Conference on Big Data and Internet of Thing, IPAC’15, Batna, Algeria, 23 November 2015; pp. 1–4. [Google Scholar] [CrossRef]
- Duan, Y.; Fu, G.; Zhou, N.; Sun, X.; Narendra, N.C.; Hu, B. Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends. In Proceedings of the 8th International Conference on Cloud Computing, New York, NY, USA, 27 June–2 July 2015; pp. 621–626. [Google Scholar]
- Karadsheh, L. Applying security policies and service level agreement to IaaS service model to enhance security and transition. Comput. Secur. 2012, 31, 315–326. [Google Scholar] [CrossRef]
- Elsayed, M.; Zulkernine, M. Offering security diagnosis as a service for cloud SaaS applications. J. Inf. Secur. Appl. 2018, 44, 32–48. [Google Scholar] [CrossRef]
- Benlian, A.; Hess, T. Opportunities and risks of software-as-a-service: Findings from a survey of IT executives. Decis. Support Syst. 2011, 52, 232–246. [Google Scholar] [CrossRef]
- Ferreira, F.S.; Alves, C.F.; Cavalcanti, R.C. R-BPM: Uma Metodologia para Gerenciamento de Processos de Negócios Consciente dos Riscos. Rev. Bras. Sist. Inf. Rio J. 2016, 9, 15–37. [Google Scholar] [CrossRef]
- Röhrig, S.; Knorr, K. Security analysis of electronic business process. Electron. Commer. Res. 2004, 4, 59–81. [Google Scholar] [CrossRef]
- Taubenberger, S.; Jürjen, J. IT Security Risk Analysis Based on Business Process Models Enhanced with Security Re-quirements. In Proceedings of the Workshop on Modelling Security (MODSEC08) Held as Part of the 2008 International Conference on Model Driven Engineering Languages and Systems (MODELS), Toulouse, France, 28 September 2008. [Google Scholar]
- Suh, B.; Han, I. The IS risk analysis based on a business model. Inf. Manag. 2003, 41, 149–158. [Google Scholar] [CrossRef]
- Lambert, J.H.; Jennings, R.K.; Joshi, N.N. Integration of risk identification with business process models. Syst. Eng. 2006, 9, 187–198. [Google Scholar] [CrossRef]
- Bhandari, R.; Suman, U. Secure integrated framework for business processes. In Proceedings of the International Conference on Computer Communication and Control (IC4), Indore, India, 10–12 September 2015; pp. 1–6. [Google Scholar] [CrossRef]
- Yu, W.Y.; Yan, C.G.; Ding, Z.J.; Jiang, C.J.; Zhou, M.C. Modeling and verification of online shopping business processes by considering malicious behavior patterns. IEEE Trans. Autom. Sci. Eng. 2016, 13, 647–662. [Google Scholar] [CrossRef]
- Gonzalez, N.; Miers, C.; Redıgolo, F.; Simplıcio, M.; Carvalho, T.; Naslund, M.; Pourzandi, M. A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 2012, 1, 1–18. [Google Scholar] [CrossRef] [Green Version]
- Bouayad, A.; Blilat, A.; Mejhed, N.E.H.; El Ghazi, M. Cloud computing: Security challenges. In Proceedings of the 2012 Colloquium in Information Science and Technology, Fez, Morocco, 22–24 October 2012; pp. 26–31. [Google Scholar] [CrossRef]
- Almorsy, M.; Grundy, J.; Ibrahim, A.S. Collaboration-Based Cloud Computing Security Management Framework. In Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing, Washington, DC, USA, 4–9 July 2011; pp. 364–371. [Google Scholar] [CrossRef]
- Ogîgău-Neamțiu, F. Cryptographic Key Management in Cloud Computing. In Proceedings of the 10th International Scientific Conference “Defense Resources Management in the 21st Century”, Braşov, Romania, 15 November 2015; pp. 1–6. [Google Scholar]
- Saeed, M.Y.; Khan, M. Data Protection Techniques for Building Trust in Cloud Computing. Int. J. Mod. Educ. Comput. Sci. 2015, 7, 38–47. [Google Scholar] [CrossRef] [Green Version]
- Birje, M.N.; Challagidad, P.S.; Goudar, R.H.; Tapale, M.T. Cloud computing review: Concepts, technology, challenges and security. Int. J. Cloud Comput. 2017, 6, 32–57. [Google Scholar] [CrossRef]
- Sumter, L.-Q. Cloud Computing: Security Risk. In Proceedings of the ACMSE’10, Oxford, MS, USA, 15 April 2010; pp. 1–4. [Google Scholar]
- Gao, Z.; Tang, H.; Zhu, Z.; Li, Y. Management process based cloud service security model. In Proceedings of the International Conference on Cyberspace Technology (CCT 2013), Beijing, China, 23 November 2013; pp. 278–281. [Google Scholar]
- Ratansingham, P.; Kumer, K. Trading partner trust in electronic commerce participation. In Proceedings of the 21st International Conference on Information Systems, Brisbane, Australia, 10–13 December 2000; pp. 544–552. [Google Scholar]
- Caroll, M.C.; Merwe, A.V.D.; Kortze, P. Secure Cloud Computing: Benefits, Risks and Control. In Proceedings of the Information Security for South Africa, Johannesburg, South Africa, 15–17 August 2011; pp. 1–9. [Google Scholar]
- Weitz, C.; Hindley, N.; Ilse, R. A Balancing Act: What Cloud Computing Means for Business, and How to Capitalize on It. 2010. Available online: www.deloitte.com (accessed on 3 September 2020).
- Ponemon, L. Security of Cloud Computing Users: A Study of Practitioners in the US & Europe. 2010. Available online: http://www.ca.com/~/media/Files/IndustryResearch/security-cloud-computing-users_235659.pdf (accessed on 3 September 2020).
- Raval, V. Risk Landscape of Cloud Computing. ISACA J. 2010, 1, 26. [Google Scholar]
- Gregg, M. 10 Security Concerns for Cloud Computing. 2010. Available online: www.globalknowledge.com (accessed on 3 September 2020).
- Rittinghouse, J.W.; Ransome, J.F. Cloud Computing Implementation, Management, and Security; CRC Press: Boca Raton, FL, USA, 2010. [Google Scholar]
- Centre for the Protection of National Infrastructure (CPNI). Information Security Briefing 01/2010: Cloud Computing. Available online: http://www.cpni.gov.uk/Docs/cloud-computing-briefing.pdf (accessed on 3 September 2020).
- Kelson, N. Cloud Computing Management Audit/Assurance Program. 2010. Available online: www.isaca.org (accessed on 3 September 2020).
- Clavister: Security in the Cloud. 2010. Available online: www.clavister.com/resources/ (accessed on 3 September 2020).
- Third Brigade. Cloud Computing Security: Making Virtual Machines Cloud-Ready [White Paper]. 2009. Available online: http://resources.thirdbrigade.com/ (accessed on 3 September 2020).
- Open Cloud Manifesto. Open Cloud Manifesto: Dedicated to the Belief That the Cloud Should Be Open 2009. Available online: www.opencloudmanifesto.org/ (accessed on 3 September 2020).
- Azeez, N.; Odufuwa, O.; Misra, S.; Oluranti, J.; Damaševičius, R. Windows PE Malware Detection Using Ensemble Learning. Informatics 2021, 8, 10. [Google Scholar] [CrossRef]
- Alharbi, A.; Alosaimi, W.; Alyami, H.; Rauf, H.; Damaševičius, R. Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things. Electronics 2021, 10, 1341. [Google Scholar] [CrossRef]
- Toldinas, J.; Venčkauskas, A.; Damaševičius, R.; Grigaliūnas, Š.; Morkevičius, N.; Baranauskas, E. A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition. Electronics 2021, 10, 1854. [Google Scholar] [CrossRef]
- Azeez, N.A.; Salaudeen, B.B.; Misra, S.; Damaševičius, R.; Maskeliunas, R. Identifying phishing attacks in communication networks using URL consistency features. Int. J. Electron. Secur. Digit. Forensics 2020, 12, 200. [Google Scholar] [CrossRef]
- Hevner, A.R.; March, S.T.; Park, J.; Ram, S. Design Science in Information Systems Research. MIS Q. 2004, 28, 75. [Google Scholar] [CrossRef] [Green Version]
- March, S.T.; Smith, G.F. Design and natural science research on information technology. Decis. Support Syst. 1995, 15, 251–266. [Google Scholar] [CrossRef]
- Goettelmann, E.; Mayer, N.; Godart, C. Integrating Security Risk Management into Business Process Management for the Cloud. In Proceedings of the 2014 IEEE 16th Conference on Business Informatics, Geneva, Switzerland, 14–17 July 2014; Volume 1, pp. 86–93. [Google Scholar]
- Vasiljeva, T.; Shaikhulina, S.; Kreslins, K. Cloud Computing: Business Perspectives, Benefits and Challenges for Small and Medium Enterprises (Case of Latvia). Procedia Eng. 2017, 178, 443–451. [Google Scholar] [CrossRef]
- Kateeb, I.; Almadallah, M. Risk Management Framework in Cloud Computing Security in Business and Organizations. In Proceedings of the IAJC/ISAM Joint International Conference, Orlando, FL, USA, 25–27 September 2014. [Google Scholar]
- Ali, A.; Warren, D.; Mathiassen, L. Cloud-based business services innovation: A risk management model. Int. J. Inf. Manag. 2017, 37, 639–649. [Google Scholar] [CrossRef]
- Damasceno, J.; Lins, F.; Medeiros, R.; Silva, B.; Souza, A.; Aragaão, D.; Maciel, P.; Rosa, N.; Stephenson, B.; Li, J. Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud. In Proceedings of the 2011 IEEE International Conference on Web Services, Washington, DC, USA, 4–9 July 2011; pp. 137–144. [Google Scholar] [CrossRef]
- Goettelmann, E.; Dahman, K.; Gateau, B.; Dubois, E.; Godart, C. A Security Risk Assessment Model for Business Process De-ployment in the Cloud. In Proceedings of the IEEE International Conference on Services Computing, Anchorage, AK, USA, 27 June–2 July 2014; pp. 307–314. [Google Scholar]
- Kozlov, A.D.; Noga, N.L. Risk Management for Information Security of Corporate Information Systems Using Cloud Technology. In Proceedings of the 2018 Eleventh International Conference “Management of Large-Scale System Development” (MLSD), Moscow, Russia, 1–3 October 2018; pp. 1–5. [Google Scholar]
- Goettelman, E.; Amina, A.-N.; Youcef, S.; Godart, C. Paving the way towards semi-automatic design-time business process model obfuscation. In Proceedings of the IEEE International Conference on Web Services, New York, NY, USA, 27 June–2 July 2015. [Google Scholar]
- Hutchings, A.; Smith, R.G.; James, L. Cloud Computing for Small Business: Criminal and Security Threats and Preventive Measures. Trends Issues Crime Crim. Justice 2013, 456, 1–8. [Google Scholar] [CrossRef]
- Jakoubi, S.; Tjoa, S.; Goluch, S.; Kitzler, G. Risk-aware Business Process Management―Establishing the Link between Business and Security. In Complex Intelligent Systems and Their Applications, Springer Optimization and Its Applications; Xhafa, F., Barolli, L., Papajorgji, P., Eds.; Springer: New York, NY, USA, 2010; Volume 41, pp. 109–135. [Google Scholar]
- Belov, V.M.; Pestunov, A.; Pestunova, T.M. On the Issue of Information Security Risks Assessment of Business Processes. In Proceedings of the 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE), Novosibirsk, Russia, 2–6 October 2018; pp. 136–139. [Google Scholar]
- Ciovică, L.; Cristescu, M.P.; Frăţilă, L.A. Cloud Based Business Processes Orchestration. Procedia Econ. Financ. 2014, 16, 592–596. [Google Scholar] [CrossRef] [Green Version]
- Youssef, A. A Framework for Cloud Security Risk Management based on the Business Objectives of Organizations. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 186–194. [Google Scholar] [CrossRef] [Green Version]
- Rupra, S.S.; Omamo, A. A Cloud Computing Security Assessment Framework for Small and Medium Enterprises. J. Inf. Secur. 2020, 11, 201–224. [Google Scholar] [CrossRef]
- Ali, O.; Shrestha, A.; Chatfield, A.; Murray, P. Assessing information security risks in the cloud: A case study of Australian local government authorities. Gov. Inf. Q. 2020, 37, 101419. [Google Scholar] [CrossRef]
- Mustapha, A.M.; Arogundade, O.; Misra, S.; Damasevicius, R.; Maskeliunas, R. A systematic literature review on compliance requirements management of business processes. Int. J. Syst. Assur. Eng. Manag. 2020, 11, 561–576. [Google Scholar] [CrossRef]
S/N | Exclusion Criteria | Work Excluded |
---|---|---|
1 | Cloud-based SRM centered work | 36, 37, 38, 39, 40, 41, 42,43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57 |
2 | Business intelligence in cloud computing | 58, 59, 60 |
3 | Cloud-based SRM “Something-as-a-Service” | 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72 |
4 | Non-English language documented papers | 73 |
5 | Year of publication | 74, 75, 76, 77 |
6 | Cloud security papers | 80, 81, 82, 83, 84, 85, 86 |
7 | Management process-based papers | 87 |
Category of Papers | Number of Papers |
---|---|
Cloud Security based on Information Security Risk Management | 47 |
PhD thesis | 3 |
Business Intelligence with Cloud Computing | 3 |
Excluded Papers based on year of study and other languages except English | 9 |
Cloud Computing “Something-as-a-Service” paradigm | 14 |
Selected Papers due for evaluation | 17 |
Total | 93 |
Database | Number of Articles |
---|---|
ACM Digital Library | 185 |
IEEE Xplore | 112 |
Science@Direct | 108 |
Google Scholar | 289 |
Springer | 211 |
Wiley | 62 |
IEEE Cloud Computing conference | 80 |
ICSE conference | 47 |
COMPSAC conference | 69 |
Computer Standards and Interfaces journal | 32 |
Taylor and Francis | 48 |
Cloud Security Risk | Threat |
---|---|
Data security Data privacy Data control Data and services availability Integrity of data Encryption of data | Sharing of cloud facilities, unknown data location, no direct control by cloud consumers, internet-dependent for data transfer, network integrity, unauthorized access |
Logical access/secrecy issue Administrator access risk Weak authentication procedure | Unauthorized access, cloud management interface issue, multi-factor authentication issue, weak passwords |
Network security Hacking and intrusion risk Mobile tool risk | Unauthorized access via the remote system, injection of malicious applications, mobile device threat |
Physical access Placement of large volume of data in the cloud environment | Deployment of vital business data on the cloud, unauthorized access via the remote system, data modification by cloud administrator |
Compliance | Incompliance with standard regulatory bodies and policies given attackers avenues for unauthorized access |
Virtualization | Mapping of physical resources to virtual resources |
Approach Type | Number of Studies |
---|---|
Framework | 6 |
Technique (Model) | 6 |
Methodology | 4 |
Process | 1 |
Authors | Identification | Modeling | Implementation | Monitoring |
---|---|---|---|---|
Goettelman et al., 2014 [107] | F | F | A | F |
Vijayakumar and Arun, 2017 [108] | F | F | F | F |
Goettelman et al., 2013 [10] | F | F | F | F |
Kateeb and Almadallah, 2014 [109] | F | F | F | F |
Ali et al., 2017 [110] | F | F | F | F |
Vasiljeva et al., 2017 [108] | F | F | F | F |
Damasceno et al., 2011 [111] | F | F | F | F |
Goettelman et al., 2014 [112] | F | F | A | F |
Kozlov and Noga, 2018 [113] | F | F | F | F |
Goettelman et al., 2015 [114] | F | F | F | F |
Hutchings et al., 2013 [115] | F | F | F | F |
Jakoubi et al., 2010 [116] | F | F | A | A |
Belov et al., 2018 [117] | F | F | F | F |
Ciovica et al., 2014 [118] | F | F | F | F |
Youssef, 2019 [119] | F | F | F | F |
Rupra and Omamo, 2020 [120] | F | F | F | F |
Ali et al., 2020 [121] | F | F | F | F |
Author | Domain Applicable |
---|---|
Goettelman et al., 2014 [107] | Production company |
Vijayakumar and Arun, 2017 [108] | Medical, Finance, Accounting |
Goettelman et al., 2013 [10] | Shipping |
Kateeb and Almadallah, 2014 | SME |
Ali et al., 2017 [110] | - |
Vasiljeva et al., 2017 [108] | SME |
Damasceno et al., 2011 [111] | - |
Goettelman et al., 2014 [112] | - |
Kozlov and Noga, 2018 [113] | - |
Goettelman et al., 2015 [114] | Finance/Banking |
Hutchings et al., 2013 [115] | - |
Jakoubi et al., 2010 [116] | - |
Belov et al., 2018 [117] | - |
Ciovica et al., 2014 [118] | - |
Youssef, 2019 [119] | - |
Rupra and Omamo, 2020 [120] | SME |
Ali et al., 2020 [121] | Local government |
Author | Maximum Support (A) | Partial Support (B) | No Support (F) |
---|---|---|---|
Goettelman et al., 2014 [107] | A | - | - |
Vijayakumar and Arun, 2017 [108] | - | B | - |
Goettelman et al., 2013 [10] | A | - | - |
Kateeb and Almadallah, 2014 [109] | A | - | - |
Ali et al., 2017 [110] | - | - | F |
Vasiljeva et al., 2017 [108] | - | - | F |
Damasceno et al., 2011 [111] | - | - | F |
Goettelman et al., 2014 [112] | A | - | - |
Kozlov and Noga, 2018 [113] | A | - | - |
Goettelman et al., 2015 [114] | - | - | F |
Hutchings et al., 2013 [115] | - | - | F |
Jakoubi et al., 2010 [116] | - | - | F |
Belov et al., 2018 [117] | - | B | - |
Ciovica et al., 2014 [118] | - | - | F |
Youssef, 2019 [119] | A | - | - |
Rupra and Omamo, 2020 [120] | - | B | - |
Ali et al., 2020 [121] | - | - | - |
Author | Maximum Support (A) | Partial Support (B) | No Support (F) |
---|---|---|---|
Goettelman et al., 2014 [107] | A | - | - |
Vijayakumar and Arun, 2017 [108] | - | B | - |
Goettelman et al., 2013 [10] | F | F | F |
Kateeb and Almadallah, 2014 [109] | F | F | F |
Ali et al., 2017 [110] | F | F | F |
Vasiljeva et al., 2017 [108] | F | F | F |
Damasceno et al., 2011 [111] | F | F | F |
Goettelman et al., 2014 [112] | F | F | F |
Kozlov and Noga, 2018 [113] | - | B | - |
Goettelman et al., 2015 [114] | F | F | F |
Hutchings et al., 2013 [115] | F | F | F |
Jakoubi et al., 2010 [116] | F | F | F |
Belov et al., 2018 [117] | F | F | F |
Ciovica et al., 2014 [118] | F | F | F |
Youssef, 2019 [119] | F | F | F |
Rupra and Omamo, 2020 [120] | F | F | F |
Ali et al., 2020 [121] | A | - | - |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Abioye, T.E.; Arogundade, O.T.; Misra, S.; Adesemowo, K.; Damaševičius, R. Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions. Computers 2021, 10, 160. https://doi.org/10.3390/computers10120160
Abioye TE, Arogundade OT, Misra S, Adesemowo K, Damaševičius R. Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions. Computers. 2021; 10(12):160. https://doi.org/10.3390/computers10120160
Chicago/Turabian StyleAbioye, Temitope Elizabeth, Oluwasefunmi Tale Arogundade, Sanjay Misra, Kayode Adesemowo, and Robertas Damaševičius. 2021. "Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions" Computers 10, no. 12: 160. https://doi.org/10.3390/computers10120160
APA StyleAbioye, T. E., Arogundade, O. T., Misra, S., Adesemowo, K., & Damaševičius, R. (2021). Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions. Computers, 10(12), 160. https://doi.org/10.3390/computers10120160