Emerging Technologies And Innovation: Cloud Security

Added on - 31 Oct 2019

  • 8

    pages

  • 2771

    words

  • 101

    views

  • 0

    downloads

Showing pages 1 to 3 of 8 pages
Running Head: EMERGING TECHNOLOGIES AND INNOVATION: CLOUD SECURITY, ANANNOTATED BIBLIOGRAPHY1Emerging Technologies And Innovation: Cloud Security, An AnnotatedBibliographyNameDate
Running Head: EMERGING TECHNOLOGIES AND INNOVATION: CLOUD SECURITY, ANANNOTATED BIBLIOGRAPHY2Shahzad, F. (January 01, 2014). State-of-the-art Survey on Cloud Computing Security Challenges,Approaches and Solutions.Procedia Computer Science, 37, 357-362.The author, in conducting the survey, recognizes and acknowledges the numerous benefits ofcloud computing and how it has revolutionized computing while allowing any organizationor person to enjoy the services cost-effectively. Using a critical review of research literatureand case studies, the author investigates some of the problems with cloud computing, andspecifically focuses on security issues as a challenge in cloud computing. The author does anexcellent job of identifying the various types and classes of security risks with cloudcomputing and goes a step further to discuss some of the approaches to these problems, aswell as solutions. By undertaking case studies on major cloud services providers, such asAWS (Amazon Web Services), the author evaluates how they ensure security and theeffectiveness of the methods/ approaches they use. The article is well researched, concise,and provides insights on why cloud computing is popular, the challenges faced, specificallysecurity, approaches to tackle the challenges, and methods that can be employed.Hashizume, Keiko, Rosado, David G, Fernández-Medina, Eduardo, & Fernandez, Eduardo B.(2013).An analysis of security issues for cloud computing. (BioMed Central Ltd.) BioMedCentral Ltd.The authors acknowledge that because of the many benefits to cloud computing, its adoptionand use is growing tremendously across many sectors and industries. The authors alsoacknowledge that its architecture and model presents an added risk level, given that thirdparties are contracted to handle sensitive information on behalf of the clients. This makes itdifficult to maintain privacy and security and be assured (in a demonstrable way) of securitycompliance. Using a systematic review of literature, the authors identify and analyze thepresent state of cloud computing and the most important security issues in cloud computing.The authors research extensively and identify, analyze, and summarize the most importantcurrent security issues in the cloud. This article is important for the purposes ofunderstanding the important security issues in cloud computing as it is a systematic reviewof several research articles. The article provides, in a nutshell and summarized manner, anon technical overview of the current important cloud security risks.Kritikos, K., & Massonet, P. (January 01, 2016). An Integrated Meta-model for Cloud ApplicationSecurity Modelling.Procedia Computer Science, 97, 84-93.
Running Head: EMERGING TECHNOLOGIES AND INNOVATION: CLOUD SECURITY, ANANNOTATED BIBLIOGRAPHY3In this article, the authors discuss, using a literature review and their own knowledge, theissue of cloud security modeling with respect to MDE (model driven engineering). MDE is anew approach to cloud services that offers numerous promises to automate the managementphases of cloud applications, including deployment as well as adaptive provisioning. Theauthors recognize that every new technology or approach to better cloud provisioning has itssecurity challenges. The authors let us know that most MDE approaches have neglected thesecurity aspect, yet security is an important factor for cloud migration. Being well versed inthe area as professionals, the authors provide a functional model for modeling for cloudapplication security. This article is very useful for the proposed research as it offers apractical perspective on modeling cloud security risks in MDE cloud applicationmanagement approach. The authors also research works by peers extensivelyJouini, M., & Ben, A. R. L. (January 01, 2016). Comparative Study of Information Security RiskAssessment Models for Cloud Computing systems.Procedia Computer Science, 83, 1084-1089.The authors use an extensive and systematic review of literature as well as a comparativestudy to review the state of the art in methods and approaches in in risk assessment of cloudcomputing systems. The authors select and scrutinize in detail, the available/ developedquantitative models for cloud security risk assessment. After reviewing the quantitativecloud security risk assessment models, the authors undertake a comparative analysis of thesystems to establish their merits and limitations. The research is important since, whilstidentifying and managing cloud security risks is important, it provides a basis forquantitatively assessing risks and describes the limitations of the models. This is importantin better understanding security risks in the cloud because the model used can determinewhether the important risks are identified and dealt with. This paper also acknowledges andevaluates the limitations of some risk assessment models. The findings are important forcloud security as they offer a means for effective security risk profiling in cloud computingenvironments.Khan, N., Al-Yasiri, A., & 11th International Conference on Future Networks and Communications,FNC 2016 / 13th International Conference on Mobile Systems and Pervasive Computing,MobiSPC 2016. (January 01, 2016). Identifying Cloud Security Threats to Strengthen CloudComputing Adoption Framework.Procedia Computer Science,94, 485-490.
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document