logo

Introduction to Cloud Computing Security Services

   

Added on  2023-06-07

1 Pages890 Words332 Views
PLAGIARISM SCAN REPORT
Words 807 Date September 02,2018
Characters 5201 Exclude Url
0%
Plagiarism
100
%
Unique
0
Plagiarized
Sentences
34
Unique Sentences
Content Checked For Plagiarism
The central idea of this article is to provide a detailed introduction of Cloud computing security service. It describes
cloud computing as the process for communication between the client and the server which uses internet
infrastructure. The author suggests that cloud computing offers mainly three types of services to the users which
can be categorized as IaaS, PaaS and SaaS. The author seeks to explain the attributes of the cloud computing
security service. On the basis of a recent studies, the author suggests the use of cloud services has led to a
reduction of 18% in the Budget of the IT companies. This article provides a proper analysis of introduction to the
cloud computing in order to understand the basic structure of cloud computing. It provides the signs of secondary
statistical data being used and this can be considered as the weakness of this article. It does not provide any
unnecessary discussion and it is capable of providing a precisely structured introduction. It can be considered as the
strength of the article. The author in this article introduces homomorphism encryption algorithm for cloud
computing data security solution. It describes the principle of the algorithm proposed by Craig Gentry. The paper is
efficient in providing the various homomorphism properties such as decipherment algorithm and encryption
algorithm. The author gives the verification of the relevant properties with the help of mathematical expressions. It
provides the data from a reliable research institution IDC. It provides issues of cloud data security in context to the
companies like Microsoft and Google. The author uses a reliable source for the collection of data for this article. This
article provides the facts and findings related to the cloud computing based security solution but fails to provide
accurate data. The strength of the paper is that it explains and verifies the algorithms with the help of mathematical
expressions making them more reliable. The author investigates the cloud service security with the help of example
of the companies which increases the dependability on the article. This article aims at discussing the virtualization
technique which is capable of providing security and isolation to the customers. The author describes virtualization
as the technique for sharing the security risks through achieving the multi-tenant environment. The author
effectively describes the Virtualization technique in order to obtain multi tenancy. It investigates the architecture of
virtual appliance and virtual machine. The paper is efficient in providing the recent studies in context to the
virtualization security. It demonstrates the findings of Gartner in year 2012 about the virtualization which indicates
that about 60% virtual servers are expected to be comparatively less secured than the physical servers in the near
future. This article provides an in depth analysis of the virtualization and multi tenancy in order to achieve the
security in the cloud computing services. The author is efficient in investigating the topic with the help of facts and
findings. The author uses a secondary source of data for providing the statistical evidence which decreases the
reliability of the data provided. The author is capable of considering all the aspects of the virtualization while
discussing the cloud computing security. This can be considered as the strength of this article. The author in this
article discusses the concerns of security in the cloud computing service with the increase in the popularity of this
services. The author provides the details of the confidentiality, integrity and privacy required for the cloud
computing services. The author efficiently describes the four types of cloud deployment model which are private,
public, community and hybrid model. It is capable of describing the field of application of the different cloud service
providing models. The author also describes the categorization of the threats available to the cloud security
services. It suggests the users and the organizations to outsource from the trusted third party services. The article s
successful in providing the factors that the third party can use for being relied upon. The article gives the signs of
reliability in explaining all technologies and terminologies explained. It provides an in depth analysis of the data
security and their requirements in cloud computing. This report does not provide any accurate data or survey
results which hints that author may not have used primary and authentic data. This can be considered as the
weakness of the article. The strength of this article is that it is precise and easy to understand. In this article the
author describes the implementation of cloud computing services based solution in the healthcare and biomedicine.
Cloud computing is efficient in fulfilling the requirements of healthcare industry by providing them scalable
computing. The author suggests that cloud services are capable of providing the sufficient network access,
community tools and infrastructure of maintaining the healthcare industry. The author provides the implications of
the increase in use of big data in healthcare.
Sources Similarity

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Based Security Solution
|13
|3409
|110

Security in Cloud Computing: Opportunities and Challenges
|9
|1752
|26

Disadvantages of Cloud Services and Outsourcing Sensitive Data
|2
|636
|80

Encryption Technique in Cloud Computing - MITS50004 IT Security
|9
|2427
|94

Research on Cloud Computing and Data Encryption
|13
|653
|95

Case Study Cloud Storage System
|5
|1140
|108