logo

Cloud computing.

This assignment requires students to do a presentation on a recent academic paper related to Software Engineering or Software Engineering Methodologies, and write a research report on the same topic.

7 Pages431 Words44 Views
   

Added on  2023-03-17

Cloud computing.

This assignment requires students to do a presentation on a recent academic paper related to Software Engineering or Software Engineering Methodologies, and write a research report on the same topic.

   Added on 2023-03-17

ShareRelated Documents
Cloud computing
Cloud computing._1
Introduction
This study review a journal article based on the cloud
computing.
The title of paper is “Security in cloud computing:
Opportunities and challenges” [1].
The aim of this study is evaluate security issues
faced by cloud computing.
The identification of the paper focused on the
security risks and threats occurred in cloud based
services.
This study will cover several sections such as
intention of the paper, research methods, issues
highlighted by the authors, and conclusion.
Cloud computing._2
Intention and content of the paper
The authors identified that the cloud computing
is now used in many companies for protecting
data or information of consumers from hackers.
Internet is one of the common processes which
are used by consumers while accessing cloud-
based services but it is also linked with the
cyber-crimes and security breaches.
The security is one of the common problems
which hamper the widespread adoption of
cloud computing technique [2].
Cloud computing._3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security in Cloud Computing: Opportunities and Challenges
|8
|2389
|69

Software Engineering methodology Software Engineering for the
|7
|384
|85

Research on Mobile Cloud Computing: Review, Trend and Perspectives
|8
|582
|71

Threats and Vulnerabilities of Cloud Computing: A Review
|4
|723
|381

Security Threats in Cloud Computing and Preventive Methods
|13
|3873
|83

It Security Article 2022
|8
|2194
|17