logo

Analysis of Research Paper on Cloud Computing Security

   

Added on  2022-11-17

7 Pages1912 Words406 Views
Running head: ANALYSIS OF RESEARCH PAPER
ANALYSIS OF RESEARCH PAPER
Name of student
Name of university
Author’s note:

ANALYSIS OF RESEARCH PAPER
1
Table of Contents
Introduction:...............................................................................................................................2
Discussion:.................................................................................................................................2
The intention and content of the article:................................................................................2
The research method:.............................................................................................................3
Findings of the research:........................................................................................................3
Problems or issues highlighted by the authors:......................................................................4
Discussion on result:..............................................................................................................4
Conclusion of the research:....................................................................................................4
Conclusion:................................................................................................................................5
References:.................................................................................................................................6

ANALYSIS OF RESEARCH PAPER
2
Introduction:
This report analyses a research paper titled “An Approach to Enhance Security of Cloud
Computing Services using Software Engineering Model”.
The purpose of the report is to investigate security requirements of the cloud computing and
identify methods of securing cloud computing services. In this context, the research paper
that is selected will be analysed in details to provide a comprehensive idea regarding cloud
computing security strategies that ensures that ensures that the cloud computing security is
effective and efficient as well.
The report first evaluates the intention and content of the article to obtain a comprehensive
idea regarding the content of research article. Then the report discusses about the research
method that the authors have considered for this article. Along with this findings of the
research is described as well. The report then studies problems or issues highlighted by the
authors and discussion on result is also analysed in details in this context. Then it describes
conclusion of the research to identify scope of future research as provided by the authors in
the article in this context.
Discussion:
The intention and content of the article:
The intention of the article is to describe the importance of security and privacy in the context
of cloud computing and also justify why it is important to ensure that the application of cloud
computing is effective and efficient as well. The main purpose of the article is not to provide
some literary discussion on cloud security methods, but to provide effective models to
implement security models.
The article has first described about different cloud services and these services are classified
into SaaS, DSaaS, IaaS and PaaS. In terms of features, these services are different from each
other and provide different benefits to the consumers [1]. SaaS for example, provide software
as service, IaaS provides infrastructure as services, PaaS provides as services. As these
services are different, their security requirements and security techniques are different as
well. Along with these cloud computing as described in the article deploys different service
delivery models which include private cloud, public cloud, community cloud and hybrid
cloud [2]. The article describes these cloud computing deployment models in details. Private
cloud is a dedicated cloud service and only a particular organizations is allowed to access

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Security Challenges
|15
|4893
|403

Software Engineering Methodology
|9
|1874
|236

A Comprehensive Study on Cloud Computing Paradigm
|17
|716
|77

Server Development and Maintenance
|23
|4781
|28

Introduction to Cloud Computing Security Services
|1
|890
|332

ITC568 - Computing Approaches for Webbs
|8
|1035
|137