logo

Cloud Computing Based Security Solution

   

Added on  2023-06-07

13 Pages3409 Words110 Views
 | 
 | 
 | 
Running head: CLOUD COMPUTING BASED SECURITY SOLUTION
Cloud Computing Based Security Solution
Name of the Student
Name of the University
Author Note
Cloud Computing Based Security Solution_1

1CLOUD COMPUTING BASED SECURITY SOLUTION
Task 1
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
The central idea of this article is to provide a detailed introduction of Cloud computing
security service. It describes cloud computing as the process for communication between the
client and the server which uses internet infrastructure. The author suggests that cloud computing
offers mainly three types of services to the users which can be categorized as IaaS, PaaS and
SaaS. The author seeks to explain the attributes of the cloud computing security service. On the
basis of a recent studies, the author suggests the use of cloud services has led to a reduction of
18% in the Budget of the IT companies.
This article provides a proper analysis of introduction to the cloud computing in order to
understand the basic structure of cloud computing. It provides the signs of secondary statistical
data being used and this can be considered as the weakness of this article. It does not provide any
unnecessary discussion and it is capable of providing a precisely structured introduction. It can
be considered as the strength of the article.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based
on fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014
16th International Conference on (pp. 485-488). IEEE.
The author in this article introduces homomorphism encryption algorithm for cloud
computing data security solution. It describes the principle of the algorithm proposed by Craig
Cloud Computing Based Security Solution_2

2CLOUD COMPUTING BASED SECURITY SOLUTION
Gentry. The paper is efficient in providing the various homomorphism properties such as
decipherment algorithm and encryption algorithm. The author gives the verification of the
relevant properties with the help of mathematical expressions. It provides the data from a reliable
research institution IDC. It provides issues of cloud data security in context to the companies like
Microsoft and Google.
The author uses a reliable source for the collection of data for this article. This article
provides the facts and findings related to the cloud computing based security solution but fails to
provide accurate data. The strength of the paper is that it explains and verifies the algorithms
with the help of mathematical expressions making them more reliable. The author investigates
the cloud service security with the help of example of the companies which increases the
dependability on the article.
Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing
security. International Journal on Recent and Innovation Trends in Computing and
Communication, 1(1), 36-39.
This article aims at discussing the virtualization technique which is capable of providing
security and isolation to the customers. The author describes virtualization as the technique for
sharing the security risks through achieving the multi-tenant environment. The author effectively
describes the Virtualization technique in order to obtain multi tenancy. It investigates the
architecture of virtual appliance and virtual machine. The paper is efficient in providing the
recent studies in context to the virtualization security. It demonstrates the findings of Gartner in
Cloud Computing Based Security Solution_3

3CLOUD COMPUTING BASED SECURITY SOLUTION
year 2012 about the virtualization which indicates that about 60% virtual servers are expected to
be comparatively less secured than the physical servers in the near future.
This article provides an in depth analysis of the virtualization and multi tenancy in order
to achieve the security in the cloud computing services. The author is efficient in investigating
the topic with the help of facts and findings. The author uses a secondary source of data for
providing the statistical evidence which decreases the reliability of the data provided. The author
is capable of considering all the aspects of the virtualization while discussing the cloud
computing security. This can be considered as the strength of this article.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
The author in this article discusses the concerns of security in the cloud computing
service with the increase in the popularity of this services. The author provides the details of the
confidentiality, integrity and privacy required for the cloud computing services. The author
efficiently describes the four types of cloud deployment model which are private, public,
community and hybrid model. It is capable of describing the field of application of the different
cloud service providing models. The author also describes the categorization of the threats
available to the cloud security services. It suggests the users and the organizations to outsource
from the trusted third party services. The article s successful in providing the factors that the
third party can use for being relied upon.
The article gives the signs of reliability in explaining all technologies and terminologies
explained. It provides an in depth analysis of the data security and their requirements in cloud
Cloud Computing Based Security Solution_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents