Introduction This study review a journal article based on the cloud computing. The title of paper is “Security in cloud computing: Opportunities and challenges” [1]. The aim of this study is evaluate security issues faced by cloud computing. The identification of the paper focused on the security risks and threats occurred in cloud based services. This study will cover several sections such as intention of the paper, research methods, issues highlighted by the authors, and conclusion.
Intention and content of the paper The authors identified that the cloud computing is now used in many companies for protecting data or information of consumers from hackers. Internet is one of the common processes which are used by consumers while accessing cloud- based services but it is also linked with the cyber-crimes and security breaches. The security is one of the common problems which hamper the widespread adoption of cloud computing technique [2].
Research methods After analysing the research article it is identified that the authors used various kinds of research methods which includes: Mixed research design Secondary type of data collection technique Content analysis process for analysing the obtained data and information.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Issues highlightedby the authors The authors highlighted that security and privacy is one of the common problems linked with cloud computing. Use of misconfiguration and lack of control enhance the level of security risks and threats. The cloud based services used internet connectivity which also produce malicious and other security risks in cloud computing.
Conclusion This journal paper is based on the cloud computing and the authors identified the risks factors linked with cloud based services. It is concluded that lack of security and control can lead the problem of data breach in cloud computing. The authors critically reviewed the architecture and security issues occurred in the case of cloud computing. It is suggested that users should protect their personal data by using encryption and firewall related security tools in cloud computing.