{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:45:12Z","timestamp":1772822712109,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032168474","type":"print"},{"value":"9783032168481","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16848-1_33","type":"book-chapter","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:06:58Z","timestamp":1772802418000},"page":"445-458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Systematic Literature Review on Security in Cloud Computing: Shared Responsibility, Standards, and Emerging Trends"],"prefix":"10.1007","author":[{"given":"Rafael","family":"Letra","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Oliveira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9602-0692","authenticated-orcid":false,"given":"Teresa","family":"Guarda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"33_CR1","unstructured":"Taurion, C.: Cloud Computing: Computa\u00e7\u00e3o em Nuvem. Brasport (2009)"},{"key":"33_CR2","doi-asserted-by":"publisher","unstructured":"Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: Proc. 2010 24th IEEE Int. Conf. Advanced Information Networking and Applications (AINA), Perth, Australia, IEEE, pp. 27\u201333 (2010). https:\/\/doi.org\/10.1109\/AINA.2010.187","DOI":"10.1109\/AINA.2010.187"},{"key":"33_CR3","unstructured":"Ag\u00e1pito, W.: SC-900: descrever o modelo de responsabilidade compartilhada. LinkedIn., Acedido em 15 de junho de 2025. https:\/\/www.linkedin.com\/pulse\/sc-900-descrever-o-modelo-de-responsabilidade-wellington-ag%C3%A1pto\/"},{"key":"33_CR4","doi-asserted-by":"publisher","unstructured":"Cao, K., Liu, Y., Meng, G., Sun, Q.: An overview on edge computing research. IEEE Access 8, 85714\u201385728 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2991734","DOI":"10.1109\/ACCESS.2020.2991734"},{"key":"33_CR5","unstructured":"Akamai: How Does Edge Computing Work \u2013 High Speed Digital Experience. Akamai.com, Acedido em 15 de junho de 2025. https:\/\/www.akamai.com\/glossary\/what-is-edge-computing"},{"key":"33_CR6","doi-asserted-by":"publisher","unstructured":"Singh, A., Chatterjee, K.: Cloud security issues and challenges: a survey. J. Netw. Comput. Appl. 79, 88\u2013115 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2016.11.027","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"33_CR7","doi-asserted-by":"publisher","unstructured":"Ahmadi, S.: Systematic literature review on cloud computing security: threats and mitigation strategies. J. Inf. Secur., 15(2), 148\u2013167 (2024). https:\/\/doi.org\/10.4236\/jis.2024.152010","DOI":"10.4236\/jis.2024.152010"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Winkler, J.R.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Waltham, MA: Syngress (2011)","DOI":"10.1016\/B978-1-59749-592-9.00005-1"},{"key":"33_CR9","doi-asserted-by":"publisher","unstructured":"Sen, J.: Security and Privacy Issues in Cloud Computing (2014). https:\/\/doi.org\/10.4018\/978-1-4666-4514-1.ch001","DOI":"10.4018\/978-1-4666-4514-1.ch001"},{"key":"33_CR10","doi-asserted-by":"publisher","unstructured":"Alouffi, B., et al.: A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access, 9, 57792\u201357807 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3073203","DOI":"10.1109\/ACCESS.2021.3073203"},{"key":"33_CR11","doi-asserted-by":"publisher","unstructured":"Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., In\u00e1cio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur., 13(2), 113\u2013170 (2014). https:\/\/doi.org\/10.1007\/s10207-013-0208-7","DOI":"10.1007\/s10207-013-0208-7"},{"key":"33_CR12","doi-asserted-by":"publisher","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl., 34(1), 1\u201311 (2011). https:\/\/doi.org\/10.1016\/j.jnca.2010.07.006","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"33_CR13","doi-asserted-by":"publisher","unstructured":"Almorsy, M., Grundy, J., M\u00fcller, I.: An Analysis of the Cloud Computing Security Problem (2016). arXiv preprint. arXiv:1609.01107. https:\/\/doi.org\/10.48550\/arXiv.1609.01107","DOI":"10.48550\/arXiv.1609.01107"},{"key":"33_CR14","doi-asserted-by":"publisher","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci., 305, 357\u2013383 (2015). https:\/\/doi.org\/10.1016\/j.ins.2015.01.025","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"33_CR15","doi-asserted-by":"publisher","unstructured":"Gholami, A., Laure, E.: Security and privacy of sensitive data in cloud computing: a survey of recent developments. In: Proc. CS & IT Conf., pp. 131\u2013150 (2015). https:\/\/doi.org\/10.5121\/csit.2015.51611","DOI":"10.5121\/csit.2015.51611"},{"key":"33_CR16","unstructured":"Fern\u00e1ndez, E.B., Yoshioka, N., Washizaki, H.: Cloud access security broker (CASB): a pattern for accessing secure cloud services. apresentado na 4th Asian Conference on Pattern Languages of Programs (AsianPLoP 2015) (2015)"},{"key":"33_CR17","doi-asserted-by":"publisher","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proc. 16th ACM Conf. Computer and Communications Security, Chicago, IL, USA, pp. 199\u2013212 (2009). https:\/\/doi.org\/10.1145\/1653662.1653687","DOI":"10.1145\/1653662.1653687"},{"key":"33_CR18","unstructured":"Harrington, K.: Shared Responsibility Model in Cloud Security"},{"key":"33_CR19","doi-asserted-by":"publisher","unstructured":"Lokare, A., Bankar, S., Mhaske, P.: Integrating Cybersecurity Frameworks into IT Security: A Comprehensive Analysis of Threat Mitigation Strategies and Adaptive Technologies (2025). arXiv preprint, arXiv:2502.00651. https:\/\/doi.org\/10.48550\/arXiv.2502.00651","DOI":"10.48550\/arXiv.2502.00651"},{"key":"33_CR20","doi-asserted-by":"publisher","unstructured":"Ristov, S., Gusev, M., Kostoska, M.: Cloud Computing Security in Business Information Systems (2012). arXiv preprint, arXiv:1204.1140. https:\/\/doi.org\/10.48550\/arXiv.1204.1140","DOI":"10.48550\/arXiv.1204.1140"},{"key":"33_CR21","doi-asserted-by":"publisher","unstructured":"Shaffi, S.M., et al.: AI-Driven Security in Cloud Computing: Enhancing Threat Detection, Automated Response, and Cyber Resilience (2025). arXiv preprint, arXiv:2505.03945. https:\/\/doi.org\/10.48550\/arXiv.2505.03945","DOI":"10.48550\/arXiv.2505.03945"},{"key":"33_CR22","doi-asserted-by":"publisher","unstructured":"Saqib, M., et al.: Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning (2025). arXiv preprint, arXiv:2505.08837. https:\/\/doi.org\/10.48550\/arXiv.2505.08837","DOI":"10.48550\/arXiv.2505.08837"},{"key":"33_CR23","doi-asserted-by":"publisher","unstructured":"Sheikh, A.M., et al.: A survey on edge computing (EC) security challenges: classification, threats, and mitigation strategies. Future Internet, 17(4), 175 (2025). https:\/\/doi.org\/10.3390\/fi17040175","DOI":"10.3390\/fi17040175"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16848-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:07:00Z","timestamp":1772802420000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16848-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032168474","9783032168481"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16848-1_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cartagena de Indias","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/artiis.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}