ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cloud Computing and Security Analysis

Verified

Added on  2020/03/16

|3
|537
|181
AI Summary
This reflective writing portfolio analyzes the student's experience researching cloud computing and its implications for security, privacy, and trust. The paper outlines the challenges of distributed computing, explores various security measures like encryption and cryptography, and acknowledges the limitations of the research. It also proposes future directions for research by highlighting the need to address open interoperability across different cloud solutions and managing multitenancy in heterogeneous environments.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Portfolio – 2 1
Reflective Writing
(Portfolio – 2)
Submitted By
Course
Professor
Date

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Portfolio – 2 2
Experience Related to Presentation
My first academic research in portfolio 1 is cloud computing and information communication
and technology (ICT). The research on cloud computing to a developmental movement in
understanding the ramifications of distributed computing for security, privacy as well as trust.
Beginning from an outline of the challenges distinguished in the writing, the research expands
upon the contextual analysis usage of cloud computing for its analysis as well as resulting
approach contemplations. Initially, informal deliverable of this undertaking, a draft writing paper
was written which defined the comprehension of cloud computing and the related queries
encompassing the critical security, protection and trust issues. This depended on the principle
scholastic, research and industry productions accessible. I have opted the approach that embrace
an investigation of the innovative, operational and legitimate complexities of cloud computing,
contemplating the various interests and goals of the specialist organizations who have embraced
the concept of cloud computing for storing Big data. (Robinson, N. & Valeri., L., 2010).
Learning from the Experience
With a specific end goal to secure the information and big data applications, cloud computing
assumes a key critical part. It mainly comprises of different security issues as it contains of
systems, operating systems, planning of assets, simultaneousness control and databases. In the
cloud condition, security issues are main concern as new measurements are gone into the
problem identified with the model structures.
Pros & Cons of Research
The main advantage of my research is that I have tried to cover the major aspects related to cloud
computing like threats which can be possible and security measurements which can be
implemented such as encryption, crypto algorithm etc.
The main disadvantage of the research is that many topics in security are not explained. Tending
to the security as well as privacy challenges of distributed computing is a complex undertaking
since it requires combination of technically and lawful methodologies that is equipped for
tending to operational substances and concerns. The degree of the specialized, legitimate and
operational difficulties has been introduced, and plainly a suitable strategy structure is required
to address these difficulties.
Document Page
Portfolio – 2 3
Handling the Experience Differently
To achieve the full research of CLOUD computing, real perspectives have not yet been created
and acknowledged and sometimes not by any means researched. Conspicuous among these are
open interoperation crosswise over (restrictive) CLOUD solutions at IaaS, PaaS also, SaaS
levels. I will take care of this. Also, another issue is overseeing multitenancy on large scale and
in heterogeneous situations. I will try to research on its heterogeneous environment. (Schubert,
2012).
References
Robinson, N. & Valeri., L. (2010). The Cloud: Understanding the Security, Privacy and Trust
Challenges. Retrieved from - http://cordis.europa.eu/fp7/ict/security/docs/the-cloud-
understanding-security-privacy-trust-challenges-2010_en.pdf
Schubert, L. (2012) Advances in clouds. Retrieved from -
http://cordis.europa.eu/fp7/ict/ssai/docs/future-cc-2may-finalreport-experts.pdf
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]