| Literature DB >> 35578669 |
Shahnawaz Ahmad1, Shabana Mehfuz1, Fateh Mebarek-Oudina2, Javed Beg3.
Abstract
A Cloud Access Security Broker (CASB) is a security enforcement point or cloud-based software that is placed between cloud service users and cloud applications of cloud computing (CC) which is used to run the dimensionality, heterogeneity, and ambiguity correlated with cloud services. They permit the organization to amplify the reach of their security approaches past their claim framework to third-party computer programs and storage. In contrast to other systematic literature reviews (SLR), this one is directed at the client setting. To identify and evaluate methods to understand CASB, the SLR discusses the literature, citing a comprehension of the state-of-the-art and innovative characterization to describe. An SLR was performed to compile CASB related experiments and analyze how CASBs are designed and formed. These studies are then analyzed from different contexts, like motivation, usefulness, building approach, and decision method. The SLR has discussed the contrasts present between the studies and implementations, with planning accomplishments conducted with combinations of market-based courses of action, simulation tools, middleware's, etc. Search words with the keywords, which were extracted from the Research Questions (RQs), were utilized to recognize the essential consideration from the journal papers, conference papers, workshops, and symposiums. This SLR has distinguished 20 particular studies distributed from 2011 to 2021. Chosen studies were evaluated concurring to the defined RQs for their eminence and scope to particular CASB in this way recognizing a few gaps within the literature. Unlike other studies, this one concentrates on the customer's viewpoint. The survey uses a systematic analysis of the literature to discover and classify techniques for realizing CASB, resulting in a comprehensive grasp of the state-of-the-art and a novel taxonomy to describe CASBs. To assemble studies relating to CASB and investigate how CASB are engineered, a systematic literature review was done. These investigations are then evaluated from a variety of angles, including motivation, functionality, engineering approach, and methodology. Engineering efforts were directed at a combination of "market-based solutions", "middlewares", "toolkits", "algorithms", "semantic frameworks", and "conceptual frameworks", according to the study, which noted disparities in the studies' implementations. For further understanding, the different independent parameters influencing the CASB are studied using PCA (Principal Component Analysis). The outcome of their analysis was the identification of five parameters influencing the PCA analysis. The experimental results were used as input for Research Surface Methodology (RSM) to obtain an empirical model. For this, five-level coding was employed for developing the model and considered three dependent parameters and four center values. For more understanding of these independent variables' influence, on the CASB study, RSM analysis was employed. It was observed from the CCD (Central Composite Design) model that the actual values show significant influence with R2 = 0.90. This wide investigation reveals that CASB is still in a formative state. Even though vital advancement has been carried out in this zone, obvious challenges stay to be tended to, which have been highlighted in this paper.Entities:
Keywords: CASBs; CCD model; Cloud computing; RSM; SLR
Year: 2022 PMID: 35578669 PMCID: PMC9094129 DOI: 10.1007/s10586-022-03598-z
Source DB: PubMed Journal: Cluster Comput ISSN: 1386-7857 Impact factor: 2.303
Definitions of Cloud Computing
| References | Definition of Cloud Computing |
|---|---|
| NIST [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| Merrill Lynch, 2008 | |
| [ | |
| [Authors] | The processing of heterogeneous data and delivery of computing services (like storage, databases, networking, software, analytics, computing power, and intelligence) via the remote servers hosted on the internet is called cloud computing |
Cloud service models
| S. No | Domain | Services |
|---|---|---|
| 1. | Computational resources | IaaS (Infrastructure as a service |
| 2. | Cloud software environment | PaaS (Platform as a service) |
| 3. | Communication | CaaS (Communication as a service) |
| 4. | Storage | DaaS (Database/Development/Desktop as a service) |
| 5. | Firmware/hardware | HasS (Hardware as a service) |
| 6. | Software applications | SaaS (Software as a service) |
| 7. | Business applications | BaaS (Business as a service) |
| 8. | Network applications | NaaS (Network as a service) |
| 9. | Organizational structure | OaaS (Organization as a service) |
| 10. | Framework | FaaS (Framework as a service) |
| 11. | Any other domain | XaaS (Anything as a service) |
Related previous work
| References | Focus | Description |
|---|---|---|
| Eisa et al. [ | cloud services selection (CSS) | The authors have examined three commercial CSP search tools that assist CSCs in finding cloud services. Several academic works on cloud selection have also been presented in the survey. The authors conclude that cloud brokers who can extend and apply cloud services selection tools to aid CSCs are needed |
| Sun et al. [ | CSS | In this work, state-of-the-art CSS approaches have been examined from five perspectives: “decision-making techniques”, “data representation models”, “cloud service attributes and characteristics”, “contexts”, and “goals” |
| Sheikh and Navimipour [ | CSS | To our knowledge, it is the only other survey that clearly distinguishes between CSC and CSP-centric selection |
| Aldawsari et al. [ | Selection of CASB | The authors have discussed that the current state-of-the-art fails to meet the demand for energy-efficient intermediaries, and have proposed concepts for an energy-aware CASB |
| Barker et al. [ | Prominent commercial solutions | Authors have examined popular commercial CASB solutions from an academic standpoint, putting them into one of four categories (“performance”, “migration”, “theoretical models”, and “data”), and laying forth a research agenda in light of their findings |
| Grozev and Buyya [ | Brokering mechanisms | Grozev and Buyya (2014) investigated some early cross-cloud application brokering methods |
| Bittencourt [ | Cloud federations | The authors have laid down the required functional and non-functional features for cloud federations by identifying the key architectures in the literature and evaluating these architectures based on the given functional and non-functional properties |
| Al-Dhuraibi et al. [ | Cloud scaling | This paper has worked towards the identification of the element which contributes to a variety of particular cloud security challenges |
| Loutas et al. 2011) [ | Interoperability challenge | The focus of Loutas et al. (2011) is on semantic divergence in the cloud ecosystem as a root cause of the interoperability problem |
| Zhang et al. [ | Interoperability at the IaaS level | The authorspropose a high-level taxonomy of IaaS interoperability concerns, which includes everything from APIs and GUIs to “virtualization technologies”, “encryption techniques”, and “SLA verification” |
| Kaur et al. [ | Survey and analyze | Kaur et al. (2017) investigate and compare methods for providing interoperability and portability in various inter-cloud models |
| Jyoti et al. [ | Load balancing and service brokering | This survey article compares and contrasts the various load balancing algorithms used in load balancers, as well as the brokering policies utilized for each service and its scheduling types |
| Wiem Abderrahim et al. [ | Cloud Services | The goal of this work is to offer a broker architecture that assures that the provided cloud service meets behavioral criteria in terms of dependability features at the infrastructure, platform, and service levels |
| Ahmad et al. [ | Security of CC with CASB | In this research, a strategy for enhancing cloud security with CASB called Goal Oriented Security Issues Mind Map Generation (GOSIMMG) has been proposed |
| Ahmad et al. [ | CASB Policies under COVID-19 Pandemic | The authors found various new CASB policies for safeguarding data at work from home in this research |
| Ahmad et al. [ | CASB for Requirements Negotiation and Prioritization | In this study paper, the authors present a fuzzy CASB-based technique for needs negotiation and prioritizing. Finally, a case study is used to demonstrate the use of CASB |
Fig. 1Pillars of sCASBs [48]
Applications of CASB
| S.No | Author’s/years/title/ID | Domain | Applications |
|---|---|---|---|
| 1 | Jon Friedman Mark Bouchard et al. (2015), “Definitive Guide to Visibility, Security, and Compliance for Applications and Data in the Cloud | Bussiness Applications | Salesforce, Ariba |
| 2 | Jon Friedman Mark Bouchard et al. (2015), “Definitive Guide to Visibility, Security, and Compliance for Applications and Data in the Cloud | Productivity Applications | Office 365, Google Apps |
| 3 | Jon Friedman Mark Bouchard et al. (2015), “Definitive Guide to Visibility, Security, and Compliance for Applications and Data in the Cloud | Cloud Drives and collaborative applications | Box, Dropbox, OneDrive, Google Drive |
CASB challenges [66]
| S.No | Challenges |
|---|---|
| 1 | Many IT organizations miss the mark to frequently include executive staff and business units when developing a cloud approach, identifying business-critical cloud apps in use, mitigating cloud risk, and educating cloud users |
| 2 | Many enterprises are not conscious of all the cloud services and data in use all over the organization. Most have 20 timesmore apps in use than they would estimate |
| 3 | Most enterprises cannot identify, classify, granularly control access to, and manage toencrypt/decrypt handling of sensitive data, compliance-related data in these apps, even when cloud services are known |
| 4 | CASBs provide a combination of user-centric and threat-centric capabilities as well as a range of deployment options, increasing the complexity of evaluation |
| 5 | Many enterprises have no way to detect cloud threats such as malware, account compromises, data destruction, data theft, and account compromises |
| 6 | Most organizations apply the same controls to all cloud-sensitive data, compliance requirements (FRs and NFRs), regardless of data type, or data sensitivity |
| 7 | Focusing disproportionately on the prevention of cloud data loss, risky user behavior, and account compromise, many organizations manage the sensitive need for threat detection, post-incident response, and continuous monitoring |
Fig. 2Best practices for CASB [110]
Fig. 3Important components of data security in cloud computing
Fig. 4Actors in cloud computing and their duties
Fig. 5Cloud security workflow [66]
Fig. 6Cloud security lifecycle [66]
Fig. 7CASB management portal
CASB use cases [66]
| S. No | Use cases | Description |
|---|---|---|
| 1 | Uncover and rate cloud apps | Numerous undertakings think they have 30–40 cloud apps when in certainty the normal organization has over 900. They have to be able to recognize these apps, rate them concurring to their security hazard accessibility, select those that affirm to the organization |
| 2 | Classify data | Compliance officers often want to know what type of compliance-related data are being put away and shared within the cloud, and whether theyare overexposed and at risk. İn addition, other data types like permissible documents, engineering documents, IP, and source code/object code need to be identified as well |
| 3 | Identify overexposed data | Security administrators need to identify which cloud data is at the highest risk of leakage outside of the organization-either unintentionally due to user fault, hacker activity, or malicious use [ |
| 4 | Spread on-prem DLP to the cloud | IT departments with on-prem DLP (Data Loss Prevention) often need to extendattention to the cloud in a non-disruptive way that will enable them to use consistent dictionaries, policies, and workflowson-prem and in the cloud |
| 5 | Identify risky users | Enterprises often want to identify risky user behavior such as file oversharing, data exfiltration/destruction, and account takeovers |
| 6 | Develop a cloud governance program | Effective cloud governance programs are not built in isolation. Including management leadership, business units, and compliance officers are critical to understanding the organization’s cloud security, compliance, and data usage requirements, as well as understanding what type of data is most critical to the organization |
| 7 | Protect data | All enterprises need to protect the organization’s data, but different methods and degrees of protection should be used to protect different types of data. Sensitive regulated data may need to be controlled and in many cases encrypted or tokenized, depending on compliance requirements and potential impacts on app performance |
| 8 | Guarantee compliance and information security | The compliance officer may need to continuously screen how information is being obtained and shared by the organization and person divisions to form beyond any doubt they meet compliance prerequisites |
| 9 | Detect threats and monitor cloud usage | Security directors ought to tediously watch information utilization for plausible approach destructions, information spillage, malware assaults, and client get to unauthorized websites that may posture a hazard to cloud accounts and information |
| 10 | Remediate incidents | IT organizations need the capability to organize post-event examinations to remediate the topic and to provide an audit trail for all the employees.Files are infected with malware, or data is lost or stolen from cloud accounts if cloud accounts are negotiated |
Identifying and protecting sensitive cloud data [66]
| S. No | Domain | Category | Description |
|---|---|---|---|
| 1 | Adopt Adaptive Access Control | Manage cloud access | Protecting cloud app usage is to integrate CASB with an authentication service, preferably one that leverages device and behavior profiling to block risky login attempts |
| 2 | Uncover and rate cloud applications | Identify and rate cloud apps | Use CASB to: • Uncover apps on your network • Provide a security risk assessment on each app • Assist in the process of determining which apps should be allowed, or replaced with safer alternatives |
| Upload logfiles | Upload logfiles to CloudSOC Audit for Shadow IT discovery | ||
| Anonymize logfiles | Anonymize logfiles before uploading to Audit | ||
| Determine corporate app business requirements | Consult with Executive Stakeholders to: • Negotiate substitutes for non-secure apps • Identify business-critical apps • Look at policy exceptions for non-secure apps without alternatives | ||
| Block non-secure cloud apps | Block access to cloud apps that don't meet your organization's risk tolerance | ||
| 3 | Plan data governance strategy | Determine corporate data security requirements | Before defining your cloud security strategy, consult with executive stakeholders to identify: • Sensitive data types • Data loss risk tolerance by data type • Compliance requirements |
| Define DLP dictionaries | Based on discussions with stakeholders, define dictionaries for cloud DLP, i.e.: • Gambling • Violence • Obscenities | ||
| Define content risk security profile | Apply a risk severity rating to all data types that would be most damaging if leaked: • High (H) • Medium (M) • Low (L) • Critical | ||
| Classify cloud data | Classify data as: • Computing • Business • Secure code • Engineering • Health • Legal • Design • Digital certificates | ||
| Identify risk types | Identification of sensitive compliance data like as: • External DLP • Virus/Malware | ||
| Identify over-exposed sensitive data | The category of sensitive/risky data as: • Internally exposed data •Externally exposed data • Publicly exposed data | ||
| Determine user risk | Based on cloud use behavior and file sharing, categorize the user as: • High risk • Medium risk • Low risk | ||
| 4 | Establish data use policy | Validate data governance strategy | Collaborate with executive management Bus, to identify a data governance strategy |
| Set cloud data policy with stand-alone CASB | Set policies based on: • Monitoring and removing exposures of sensitive files • Protecting your data from risky user behavior • Monitoring and controlling file-sharing behavior • Monitoring and controlling file uploads and downloads • Monitoring and controlling user access and activities in cloud services (IaaS, PaaS, SaaS, IDaaS) | ||
| Set Cloud Data Policy with integrated On-Prem DLP + CASB | The integration of DLP and CASB solutions enables you to combine context, including UBA, from your CASB with advanced content detection in DLP | ||
| Encrypt/ Tokenize Sensitive Data | Required to satisfy the highly stringent security requirement | ||
| 5 | Set Threat Detection Thresholds | Set Threshold Based Incident Detection Strings | We can set duration and importance of threshold-based on activities: • Critical • Less important • Important • Very Important |
| Set Sequence-Based Incident Detection Strings | Develop sequence-based detectors: • Importance • Steps • Duration | ||
| 6 | Monitor Cloud Accounts for Violations and Threats | Respond to Policy Violations | Policy violations responses may include: • Set link expiration • Remove shared link • Email, text, or ticket alert • Update file permissions |
| Export Data | Export data for offline analysis | ||
| Rate Threat Incidents | Set rate incidents as: • Low risk • Medium risk • High risk | ||
| Detect/ Block Malware | Identify and block the traditional malware | ||
| Detect/Classify Risky Behavior | Group/Classify threat incidents as: • Account takeover • Data exfiltration • Data destruction | ||
| 7 | Investigate Post Incident | Post Incident Response | Respond to incidents by: • Revising policy in consultation with executive management • Educating users • Developing an audit report |
| Post Incident Investigation | Perform a deep dive analysis on historical cloud activity | ||
| 8 | Generate reports | Schedule Reports | Need to schedule daily, weekly, monthly, yearly report |
| Create Dashboards Reports and Infographics | Need to create dashboard, reports, and infographics for executive staff |
Research questions and their motivation
| RQs | Motivation | |
|---|---|---|
| RQ-1 | What is the motivation for designing CASB? | The goal is to determine which aspects of cloud security have been investigated and which aspects have not |
| RQ-2 | What are the functionalities of a CASB have? | The idea is to identify the way over which any explicit security issue has been determined in its ongoing research |
| RQ-3 | What are the approaches for engineering CASB? | The goal of the ongoing research is to determine the current methodologies in cloud security frameworks, as well as the true reason for organizations not implementing CASB and how it has been allocated |
| RQ-4 | What are the simulation tools available for CC research? | The idea is to exchanging authentication and authorization data between parties (service and identity providers), "unauthorized redistribution of digital media", "continuous data monitoring", "investigate and response to exceptions", "business process modeling", and "threat protection" |
RQs and SSs
| RQs | Search strings (SS) |
|---|---|
| RQ-1 | (Motivation OR Requirement OR Advantages) AND (Cloud Computing OR Cloud Access Security Broker OR Limitation OR Implementation) |
| RQ-2 | (Challenges OR Issues OR Security Issues) AND (Cloud Computing OR Cloud Access Security Broker OR CASB Development OR Requirements) AND (Security or Issues OR Loopholes OR Threats) |
| RQ-3 | (Cloud Computing OR CASB OR Weakness OR Strength OR Advantages OR Disadvantages) AND (Tools OR Implementation OR CASB Framework OR Methods OR Benchmark) |
| RQ-4 | (Cloud Computing OR Cloud Access Security Broker OR Limitation) AND (Ongoing state OR SLR OR Systematic Literature Review) AND (Encryption/Decryption process OR Cloud OR CASB) |
RQs and keywords
| RQs | Motivation | |
|---|---|---|
| RQ-1 | Why is there an urge to go to CASB? | Functional and Non-functional requirements, need, benefits, motivation, limitation, and cloud |
| RQ-2 | What are the challenges in CASB? | Challenges, issues, process, cloud, security, broker |
| RQ-3 | What are the live methods or tools for CASB? | Existing process, tools, criteria, CASB framework |
| RQ-4 | What is the ongoing state and ongoing research issues for CASB? | Current state, existing research issues, cloud, security, broker |
Fig. 8Search and selected process
Included studies
| Paper ID | Complete reference |
|---|---|
| S1 | Hibatullah Alzahrani, “A Brief Survey of Cloud Computing”, Global Journal of Computer Science and Technology: Cloud and Distributed, Global Journals Inc. (USA), ISSN: 0975–4172 & Print ISSN: 0975–4350 |
| S2 | Gartner Report: How to Evaluate and Operate a Cloud Access Security Broker, December 8′ 2015 |
| S3 | Chuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang, “ A Cloud Access Security Broker Approach for Encrypted Data Search and Sharing”, International Conference on Computing, and Networking and Communications (ICNC): Cloud Computing and Big Data, 2017 |
| S4 | Sameer Singh Chauhan, Emmanuel S. Pilli, R.C Joshi, Girdhari Singh, and M.C Govil, “ Brokering in interconnected cloud computing environments: A survey”, Journal of Parallel and Distributed Computing, 2018 |
| S5 | Abdessalam Elhabbash, Faiza Samreen, James Hadley, and Yehia Elkhatib, “Cloud Brokerage: A Systematic Survey”, ACM Computing Surveys, Vol. 51, No. 6, Article 119, 2019 |
| S6 | Ioannis Patiniotakis, Yiannis Verginadis, and Ggregoris Mentzas, “PuLSaR: preference-based cloud service selection for cloud service broker”, Journal of Internet Services and Applications (2015), 6:26 |
| S7 | Prashant Khanna, Sonal Jain, “ Distributed Cloud Federation Brokerage: A Live Analysis”, 7th International Conference on Utility and Cloud Computing, 978–1-4799–7881-6/14, 2014 IEEE/ACM |
| S8 | |
| S9 | P. Khanna, and B.V. Babu, “ Cloud Computing Brokering Service: A Trust Framework”, in the Third International Conference on Cloud Computing, GRID’s and Virtualization, Nice, 2012 |
| S10 | C. N. Hofer, and G. Karagiannis, “ Cloud computing services: taxonomy and comparison”, J Internet Sev Appl 2011, 2:81–94 |
| S11 | Ahmad S., Mehfuz S., Beg J. (2021) Enhancing Security of Cloud Platform with Cloud Access Security Broker. In: Kaiser M.S., Xie J., Rathore V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2020). Lecture Notes in Networks and Systems, vol 190. Springer, Singapore. |
| S12 | S. Ahmad, S. Mehfuz and J. Beg, "Securely Work from Home with CASB Policies under COVID-19 Pandemic: A Short Review," 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), 2020, pp. 109–114, |
| S13 | S. Ahmad, S. Mehfuz and J. Beg, "Fuzzy Cloud Access Security Broker for Requirements Negotiation and Prioritization," 2019 International Conference on Power Electronics, Control and Automation (ICPECA), 2019, pp. 1–6, |
| S14 | Yahya Al-Dhuraibi, Fawaz Paraiso, Nabil Djarallah, and Philippe Merle. 2018. Elasticity in cloud computing: State of the art and research challenges. IEEE Transactions on Services Computing 11, 2 (March 2018), 430–447. |
| S15 | Jyoti, A., Shrimali, M., Tiwari, S. et al. Cloud computing using load balancing and service broker policy for IT service: a taxonomy and survey. J Ambient Intell Human Comput 11, 4785–4814 (2020). |
| S16 | Kiranbir Kaur, Sandeep Sharma, and Karanjeet Singh Kahlon. 2017. Interoperability and portability approach in interconnected clouds: A review. Computing Surveys 50, 4, Article 49 (Oct. 2017), 1–49. |
| S17 | Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, and Joaquim Celestino Júnior. 2013. An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications 36, 1 (2013), 25–41. |
| S18 | Amin Jula, Elankovan Sundararajan, and Zalinda Othman. 2014. Cloud computing service composition: A systematic literature review. Expert Systems with Applications 41, 8 (2014), 3809–3824. |
| S19 | Iliana Iankoulova and Maia Daneva. 2012. Cloud computing security requirements: A systematic review. In Proceedings of the 6th International Conference on Research Challenges in Information Science (RCIS). 1–7. |
| S20 | Bandar Aldawsari, Thar Baker, and David England. 2015. Towards a holistic multi-cloud brokerage system: Taxonomy, survey, and future directions. In Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. 1467–1472. |
Results of the quality scores of the selected studies
| Paper ID | QA1 | QA2 | QA3 | QA4 | QA5 | Score |
|---|---|---|---|---|---|---|
| S1 | 0.5 | 1 | 0.5 | 1 | 0.5 | 3.5 |
| S2 | 0.5 | 0.5 | 0 | 0.5 | 1 | 2.5 |
| S3 | 0.5 | 0.5 | 1 | 1 | 1 | 4 |
| S4 | 0.5 | 1 | 0.5 | 0.5 | 1 | 3.5 |
| S5 | 1 | 1 | 0.5 | 1 | 0.5 | 4 |
| S6 | 1 | 1 | 0 | 1 | 0.5 | 3.5 |
| S7 | 0.5 | 0.5 | 0 | 0.5 | 1 | 2.5 |
| S8 | 1 | 1 | 0.5 | 1 | 1 | 4.5 |
| S9 | 0.5 | 0.5 | 0.5 | 1 | 0.5 | 3 |
| S10 | 1 | 0.5 | 0.5 | 0.5 | 1 | 3.5 |
| S11 | 1 | 1 | 0.5 | 1 | 1 | 4.5 |
| S12 | 0.5 | 0.5 | 1 | 0.5 | 1 | 3.5 |
| S13 | 1 | 1 | 0.5 | 1 | 0.5 | 4 |
| S14 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2 |
| S15 | 0.5 | 1 | 0.5 | 0.5 | 0 | 2.5 |
| S16 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 2.5 |
| S17 | 0.5 | 0 | 0.5 | 0 | 0.5 | 1.5 |
| S18 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 2.5 |
| S19 | 0.5 | 1 | 0.5 | 0.5 | 0.5 | 3 |
| S20 | 1 | 1 | 0.5 | 1 | 1 | 4.5 |
Inclusion criteria
| Stages | Criteria |
|---|---|
| Overall description | English language, paper published in journals/conferences/web articles/workshop, non-duplicate, date of publication |
| Full text | Improved security, broker, advantages, loopholes, tools in CASB, presence of the empirical data in the article |
| Title, keywords, abstract | Based on the contents, which matches to the RQs, based on keywords and SS |
| Introduction and conclusion | Focusses on answering the RQs, contains CASB |
| Revenue and deployment | Sales of CASB products are required |
| Geography | At least two of the four key regional marketplaces must be competed in |
| Product configuration | The product must be marketed as primarily satisfying stand-alone CASB use cases |
| Product features | Gartner's definition of a CASB must be met |
Fig. 9Distribution of publication types of selected studies
Fig. 10Distributed of selected studies by years
Comparison summary of cloud simulators
| S. No | Simulators name | Proposed by | Description | Availability |
|---|---|---|---|---|
| 1 | CloudSim [ | Calheiros and Buyya | “Capacities bolster for modeling, empowering consistent modeling, simulation of huge-scale computing information centers, additionally it customizes approaches for provisioning, has assets to virtual machines” | Open Source |
| 2 | CloudAnalyst [ | Wickremasinghe | “The points to examine the conduct of web applications on a huge scale in a cloud environment and works to dissimilar simulation experimentation work out from programming work out” | Open Source |
| 3 | GreenCloud [ | Dzmitry Kliazovich | “The simulator is utilized to create novel arrangements in checking, asset allotment, workload planning as well communication conventions, enhancement, and organizing foundation” | Open Source |
| 4 | iCanCloud [ | Nunez | “It empowers an adaptable and fully customizable worldwide hypervisor and can conduct expansive tests” | Open Source |
| 5 | EMUSIM | Calheiros | “It is a coordinates engineering plan to predict service conduct on cloud platforms” | Open Source |
| 6 | GroudSim [ | Ostermann | “It pays consideration to IaaS ranges of cloud and is conveniently extensible to back extra models like cloud capacity or platform as a service” | - |
| 7 | Network Groud Sim | Garg | “Support displaying of real cloud information centers conjointly summed up applications such as HPC, e-commerce, and workflows” | Open Source |
| 8 | SPECI | Sriram | “It is to recreate the capability and code of large information centers on the premise of the estimate of input and middleware plan policy” | – |
| 9 | DC(DataCentre) Sim | Tighe | “It is to accomplish the prerequisite for simulation tools for quick development and assessment of information center administration techniques” | Open Source |
| 10 | MDC Sim | – | “It helps the analyzer to show unmistakable hardware characteristics of different components of the information center like servers, communication joins, and switches that are collected from completely distinctive merchants and licenses estimation of power utilization” | Commercial |
| 11 | Open Cirrus | Hewlett-Packard | “Planned to back investigation into planning, provisioning, and administration of administrations at a worldwide, multi-datacenter scale” | Open Source |
| 12 | OCT | Grossman | “It planned to compare and evaluate performances of distinctive cloud computing frameworks and to scrutinize the capacity of making frameworks work together” | Limited |
| 13 | CDOSim [ | Fittkau et al | “CDOSim toolkit is used to simulate cost and performance characteristics in the cloud deployment. Thus, CDOSim tool accurately predicts the execution time for each service provider” | Open Source |
| 14 | TeachCloud [ | Y. Jararweh et al | “TeachCloud is the generalization of CloudSim, a research-oriented simulator that is used to extend and validate cloud computing. TeachCloud also allows students to experiment with the real cloud system at different cost conditions” | Open Source |
| 15 | DartCSim [ | Li et al | “DartCSim defines a user-friendly interface and hence users can set the parameters of simulation such as cloudlets, network topology, and management algorithm with a visual interface” | Open Source |
| 16 | DartCSim + [ | Li et al | “DartCSim + defines a resend mechanism to present a more realistic network model to resolve the failure of transmission”, | Open Source |
| 17 | ElasticSim [ | Cai et al | “ElasticSim supports the impacts of the task execution time probability distribution and the tightness of workflow deadlines on the scheduling strategies. Finally, ElasticSim has a graphical user interface to show the execution state in real-time” | Open Source |
| 18 | FederatedCloudSim [ | Kohne et al | “The main goal of FederatedCloudSim is to test various types of cloud federations” | Open Source |
| 19 | FTCloudSim [ | Zhou et al | “FTCloudSim toolkit is used for modeling the different service reliability enhancement methods. For investigating the performance of each approach, FTCloudSim triggers failure events and provides some performance metrics” | Open Source |
| 20 | WorkFlowSim [ | Chen and Deelman | “WorkflowSim is used for modeling Scientific Workflows in a cloud environment. Workflows in heterogeneous distributed systems show different levels of overheads that are explained based on computational operations and miscellaneous works” | Open Source |
| 21 | CloudReports [ | Teixeira Sá et al | “CloudReports presents a complete report that includes the log of operations. It also draws different charts with detailed information for resources usage, virtual machine allocations, execution of cloudlets, and energy consumption of data center” | Open Source |
| 22 | CEPSim [ | Higashino et al | “CEPSim adds a new model by the directed acyclic graphs (DAGs) to CloudSim. It tries to show continuous queries processing fast streams of data and execute these queries in various systems (i.e., including private, public, and multiple)” | Open Source |
| 23 | DynamicCloudSim [ | Bux and Leser | “DynamicCloudSim models the external loads that are created due to sharing common resources with other machines and applications. Finally, DynamicCloudSim provides straggler VMs and failures to model fault-tolerant approaches” | Open Source |
| 24 | CloudExp [ | Jararweh et al | “CloudExp simulator is used to address virtualization and business process management in cloud system. CloudExp has a suitable GUI for setting cloud configurations and showing results with charts. Finally, this simulator develops Mobile Cloud Computing (MCC) simulation framework” | Open Source |
| 25 | CM Cloud [ | Alves et al | “CM Cloud can design any cost model using XML and support current cloud service providers such as Google, Microsoft Azure, and Amazon by retrieving values directly from their web pages dynamically” | Open Source |
| 26 | MR-CloudSim [ | Jung and Kim | “MR-CloudSim is very common for large data processing that focuses on MapReduce computing model on CloudSim” | Open Source |
| 27 | UCloud [ | Sqalli et al | “The architecture of UCloud used here is based on a hybrid cloud model that uses both public and private clouds and is developed using CloudSim” | Open Source |
| 28 | GDCSim [ | Gupta et al | “GDCSim is expanded as part of the BlueTool (BlueTool is a computer infrastructure project funded by NSF). The purpose of this project is to provide suitable research infrastructures in both hardware and software to raise the level of awareness of the environmental importance of data centers operating worldwide” | Open Source |
| 29 | CloudNetSim [ | Cucinotta and Santogidis | “CloudNetSim introduces CPU scheduling for hypervisor and at the guest OS levels. Moreover, it presents VM deployment and scheduling 33 algorithms with application models. It can model thousands of nodes with important QoS metrics” | Open Source |
| 30 | CloudNetSim + [ | Malik et al | “CloudNetSim + + is the first cloud computing simulator to use actual physical properties of the network to model the distributed data centers” | Open Source |
| 31 | SecCloudSim [ | Rehman and Anwar | “SecCloudSim provides a framework that researchers can develop the security characteristics such as encryption, decryption, encapsulation, authentication, and privacy assurance” | Open Source |
| 32 | CloudShed [ | Tian et al | “CloudSched generates the distribution of service time, arrival process, and request distribution by a random function. It is used to present various resource scheduling strategies in the cloud. These strategies take into account CPU, storage and the network bandwidth of physical machines and virtual machines to avoid bottlenecks” | Open Source |
| 33 | SimIC [ | Sotiriadis et al | “The main characteristic of SimIC is the automationof service distribution that is varied among decentralized meta-brokers” | Open Source |
| 34 | SCORE [ | Fernández-Cerero et al | “SCORE tries to simulate the parallel scheduling, energy-efficient monolithic schema, and synthetic workloads. The empirical experiment proved that SCORE is an efficient and reliable framework for evaluating security, energy, and scheduling algorithm in cloud systems” | Open Source |
| 35 | GAME-SCORE [ | Fernández-Cerero et al | “GAME-SCORE simulation tool is used to implements the scheduling model with the Stackelberg game and tries to model the energy-efficient IaaS of the clouds” | Open Source |
| 36 | DISSECT-CF [ | Kecskemeti | “DISSECT-CF presents a more complete IaaS stack simulation. It allows to users to derive energy consumption from several resource usage counters” | Open Source |
Input parameters for modeling in CCD
| Standard | Run | Vendor Profile(A) | Visibility & governance(B) | Compliance (C) | Threat protection (D) | Data security (E) | Vendor outcomes |
|---|---|---|---|---|---|---|---|
| 1 | 2 | − 1 | − 1 | − 1 | − 1 | − 1 | 58.6 |
| 2 | 11 | 1 | − 1 | − 1 | − 1 | − 1 | 60 |
| 3 | 28 | − 1 | 1 | − 1 | − 1 | − 1 | 62.4 |
| 4 | 36 | 1 | 1 | − 1 | − 1 | − 1 | 63.9 |
| 5 | 42 | − 1 | − 1 | 1 | − 1 | − 1 | 63 |
| 6 | 31 | 1 | − 1 | 1 | − 1 | − 1 | 72 |
| 7 | 45 | − 1 | 1 | 1 | − 1 | − 1 | 59.6 |
| 8 | 19 | 1 | 1 | 1 | − 1 | − 1 | 65.7 |
| 9 | 23 | − 1 | − 1 | − 1 | 1 | − 1 | 59.6 |
| 10 | 8 | 1 | − 1 | − 1 | 1 | − 1 | 59 |
| 11 | 17 | − 1 | 1 | − 1 | 1 | − 1 | 70.6 |
| 12 | 18 | 1 | 1 | − 1 | 1 | − 1 | 63 |
| 13 | 5 | − 1 | − 1 | 1 | 1 | − 1 | 63.1 |
| 14 | 43 | 1 | − 1 | 1 | 1 | − 1 | 65.9 |
| 15 | 48 | − 1 | 1 | 1 | 1 | − 1 | 62.7 |
| 16 | 34 | 1 | 1 | 1 | 1 | − 1 | 65 |
| 17 | 27 | − 1 | − 1 | − 1 | − 1 | 1 | 63.1 |
| 18 | 14 | 1 | − 1 | − 1 | − 1 | 1 | 63.9 |
| 19 | 35 | − 1 | 1 | − 1 | − 1 | 1 | 69.2 |
| 20 | 39 | 1 | 1 | − 1 | − 1 | 1 | 67 |
| 21 | 38 | − 1 | − 1 | 1 | − 1 | 1 | 69.3 |
| 22 | 20 | 1 | − 1 | 1 | − 1 | 1 | 72.8 |
| 23 | 47 | − 1 | 1 | 1 | − 1 | 1 | 61.7 |
| 24 | 13 | 1 | 1 | 1 | − 1 | 1 | 69.2 |
| 25 | 3 | − 1 | − 1 | − 1 | 1 | 1 | 69.4 |
| 26 | 10 | 1 | − 1 | − 1 | 1 | 1 | 63.7 |
| 27 | 37 | − 1 | 1 | − 1 | 1 | 1 | 73.1 |
| 28 | 41 | 1 | 1 | − 1 | 1 | 1 | 65.7 |
| 29 | 50 | − 1 | − 1 | 1 | 1 | 1 | 65 |
| 30 | 9 | 1 | − 1 | 1 | 1 | 1 | 69.1 |
| 31 | 21 | − 1 | 1 | 1 | 1 | 1 | 65.9 |
| 32 | 26 | 1 | 1 | 1 | 1 | 1 | 62.7 |
| 33 | 49 | − 2.37841 | 0 | 0 | 0 | 0 | 63.1 |
| 34 | 22 | 2.37841 | 0 | 0 | 0 | 0 | 63.6 |
| 35 | 7 | 0 | − 2.37841 | 0 | 0 | 0 | 64.9 |
| 37 | 40 | 0 | 0 | − 2.37841 | 0 | 0 | 62 |
| 38 | 12 | 0 | 0 | 2.37841 | 0 | 0 | 68.9 |
| 39 | 30 | 0 | 0 | 0 | − 2.37841 | 0 | 61.6 |
| 40 | 46 | 0 | 0 | 0 | 2.37841 | 0 | 66 |
| 41 | 4 | 0 | 0 | 0 | 0 | − 2.37841 | 63.9 |
| 42 | 24 | 0 | 0 | 0 | 0 | 2.37841 | 70.9 |
| 43 | 6 | 0 | 0 | 0 | 0 | 0 | 64 |
| 44 | 32 | 0 | 0 | 0 | 0 | 0 | 63.7 |
| 45 | 15 | 0 | 0 | 0 | 0 | 0 | 64 |
| 46 | 29 | 0 | 0 | 0 | 0 | 0 | 61.8 |
| 47 | 1 | 0 | 0 | 0 | 0 | 0 | 65 |
| 48 | 44 | 0 | 0 | 0 | 0 | 0 | 63.6 |
| 49 | 16 | 0 | 0 | 0 | 0 | 0 | 64 |
| 50 | 25 | 0 | 0 | 0 | 0 | 0 | 61.7 |
Determination of variance explained by components
| Component | Initial eigenvalues | Extraction sums of squared loadings | ||||
|---|---|---|---|---|---|---|
| Total | % of Variance | Cumulative % | Total | % of Variance | Cumulative % | |
| 1 | 2.607 | 52.132 | 52.132 | 2.607 | 52.132 | 52.132 |
| 2 | 1.373 | 27.461 | 79.593 | 1.373 | 27.461 | 79.593 |
| 3 | .604 | 12.084 | 91.677 | |||
| 4 | .276 | 5.524 | 97.201 | |||
| 5 | .234 | 2.11 | 98.21 | |||
| 6 | .140 | 2.799 | 100.000 | |||
Fig. 11The graph between Actual values and Predicted values
Fig. 12Scree plot
Fig. 13Contour graph of the predicted model
Bartlett’s test and KMO
| Bartlett’s test and KMO | ||
|---|---|---|
| Kaiser–Meyer–Olkin measure of sampling adequacy | 0.671 | |
| Bartlett’s test of sphericity | Approx. Chi-Square | 8.686 |
| Df | 10 | |
| Sig | 0.562 | |
Fig. 143D surface plot of Vendors output (i) Visibility % Governance vs Vendors Profile (ii) Compliance vs Vendors Profile (iii) Threat Protection vs Vendor Profile (iv) Data Security vs Vendors Profile