Critical Review of Cloud Computing Literature
VerifiedAdded on 2021/04/21
|11
|2632
|75
AI Summary
This assignment requires a comprehensive analysis of the existing literature on cloud computing, focusing on its benefits, drawbacks, and potential solutions. The report should critically evaluate the current state of cloud computing, discussing issues such as data security, theft, and hacking, as well as the importance of authentication in certain situations. Furthermore, it should provide an overview of the theoretical and practical aspects of cloud computing, including its applications, advantages, and limitations. The review should also assess the credibility of various papers on the topic, highlighting their strengths and weaknesses. Ultimately, this assignment aims to provide a comprehensive understanding of cloud computing, its challenges, and potential solutions.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY ISSUES OF CLOUD COMPUTING
SECURITY ISSUES OF CLOUD COMPUTING
Name of the student
Name of the university
Author note
SECURITY ISSUES OF CLOUD COMPUTING
Name of the student
Name of the university
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY ISSUES OF CLOUD COMPUTING
Table of Contents
Introduction and Background..........................................................................................................2
Papers under review.....................................................................................................................2
Justification for Paper Selection..................................................................................................3
Summary of findings...................................................................................................................4
Strengths......................................................................................................................................5
Shortcomings...............................................................................................................................5
Conclusions......................................................................................................................................5
Reference.........................................................................................................................................6
Table of Contents
Introduction and Background..........................................................................................................2
Papers under review.....................................................................................................................2
Justification for Paper Selection..................................................................................................3
Summary of findings...................................................................................................................4
Strengths......................................................................................................................................5
Shortcomings...............................................................................................................................5
Conclusions......................................................................................................................................5
Reference.........................................................................................................................................6
2SECURITY ISSUES OF CLOUD COMPUTING
Introduction and Background
Cloud computing refers to the use of cloud storage to store and retrieve the data
whenever necessary. Cloud computing has revolutionize the concept of computing and what
technology can actually do for the business and technical revolutions. In order to store the data
cloud needs remote servers and virtual machines. The significance of Cloud Computing is
increasing every passing day since it enables convenient, ubiquitous and on-demand access to
share a large amount of data resources like, storage applications, servers et cetera. The following
is a review of several literature regarding the topic of cloud computing and its security issues.
The review would comprise of the list of papers selected for the review, the proper justification
stating the reasons for selecting the papers to review, the summary of the findings after
reviewing the papers, the strengths of the reviewed papers in view of the topic as well as their
shortcomings in focusing the light on different aspects of the topic. Thus, with the proper
execution of the framework, a proper literature review will be obtained.
Papers under review
1. Ochani, A. and Dongre, N., 2017, February. Security issues in cloud computing. In I-
SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International
Conference on (pp. 783-787). IEEE
2. Gandhi, K. and Gandhi, P., 2016, March. Cloud computing security issues: An analysis.
In Computing for Sustainable Global Development (INDIACom), 2016 3rd International
Conference on (pp. 3858-3861). IEEE.
Introduction and Background
Cloud computing refers to the use of cloud storage to store and retrieve the data
whenever necessary. Cloud computing has revolutionize the concept of computing and what
technology can actually do for the business and technical revolutions. In order to store the data
cloud needs remote servers and virtual machines. The significance of Cloud Computing is
increasing every passing day since it enables convenient, ubiquitous and on-demand access to
share a large amount of data resources like, storage applications, servers et cetera. The following
is a review of several literature regarding the topic of cloud computing and its security issues.
The review would comprise of the list of papers selected for the review, the proper justification
stating the reasons for selecting the papers to review, the summary of the findings after
reviewing the papers, the strengths of the reviewed papers in view of the topic as well as their
shortcomings in focusing the light on different aspects of the topic. Thus, with the proper
execution of the framework, a proper literature review will be obtained.
Papers under review
1. Ochani, A. and Dongre, N., 2017, February. Security issues in cloud computing. In I-
SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International
Conference on (pp. 783-787). IEEE
2. Gandhi, K. and Gandhi, P., 2016, March. Cloud computing security issues: An analysis.
In Computing for Sustainable Global Development (INDIACom), 2016 3rd International
Conference on (pp. 3858-3861). IEEE.
3SECURITY ISSUES OF CLOUD COMPUTING
3. Bokhari, M.U., Shallal, Q.M. and Tamandani, Y.K., 2016, March. Cloud computing
service models: A comparative study. In Computing for Sustainable Global Development
(INDIACom), 2016 3rd International Conference on (pp. 890-895). IEEE
4. Kong, W., Lei, Y. and Ma, J., 2016, September. Data security and privacy information
challenges in cloud computing. In Intelligent Networking and Collaborative Systems
(INCoS), 2016 International Conference on (pp. 512-514). IEEE.
5. Soni, R., Ambalkar, S. and Bansal, P., 2016, March. Security and privacy in cloud
computing. In Colossal Data Analysis and Networking (CDAN), Symposium on (pp. 1-6).
IEEE.
6. Shariati, S.M. and Ahmadzadegan, M.H., 2015, November. Challenges and security
issues in cloud computing from two perspectives: Data security and privacy protection.
In Knowledge-Based Engineering and Innovation (KBEI), 2015 2nd International
Conference on (pp. 1078-1082). IEEE
7. Tari, Z., 2014. Security and privacy in cloud computing. IEEE Cloud Computing, 1(1),
pp.54-57.
Justification for Paper Selection
The papers were selected according relevance to the topic. The first paper offers clear and
detailed overview of the topic and defines the various cloud service model in details and it is
easy to follow as adequate details have been given about the cloud service model as well. Data
protection and data modelling methods has been described in tabular form to make it easy for the
reader to understand. Proper reference has been given for the sources that the authors have cited
which is features the superior quality of the paper (Ochani and Dongre 2017). The second paper
focuses on various issues related to the cloud computing. The paper first introduce the topic like
3. Bokhari, M.U., Shallal, Q.M. and Tamandani, Y.K., 2016, March. Cloud computing
service models: A comparative study. In Computing for Sustainable Global Development
(INDIACom), 2016 3rd International Conference on (pp. 890-895). IEEE
4. Kong, W., Lei, Y. and Ma, J., 2016, September. Data security and privacy information
challenges in cloud computing. In Intelligent Networking and Collaborative Systems
(INCoS), 2016 International Conference on (pp. 512-514). IEEE.
5. Soni, R., Ambalkar, S. and Bansal, P., 2016, March. Security and privacy in cloud
computing. In Colossal Data Analysis and Networking (CDAN), Symposium on (pp. 1-6).
IEEE.
6. Shariati, S.M. and Ahmadzadegan, M.H., 2015, November. Challenges and security
issues in cloud computing from two perspectives: Data security and privacy protection.
In Knowledge-Based Engineering and Innovation (KBEI), 2015 2nd International
Conference on (pp. 1078-1082). IEEE
7. Tari, Z., 2014. Security and privacy in cloud computing. IEEE Cloud Computing, 1(1),
pp.54-57.
Justification for Paper Selection
The papers were selected according relevance to the topic. The first paper offers clear and
detailed overview of the topic and defines the various cloud service model in details and it is
easy to follow as adequate details have been given about the cloud service model as well. Data
protection and data modelling methods has been described in tabular form to make it easy for the
reader to understand. Proper reference has been given for the sources that the authors have cited
which is features the superior quality of the paper (Ochani and Dongre 2017). The second paper
focuses on various issues related to the cloud computing. The paper first introduce the topic like
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4SECURITY ISSUES OF CLOUD COMPUTING
what cloud computing is, why the technology is important and how it has transformed various
field. The purpose of the paper has been outlined in the abstract section to make it clear for the
readers to understand the aim of the report at the very first place (Gandhi and Gandhi 2016). The
third literature defines the purpose and the structure of the paper is clearly defined in the abstract
section. This kind of approach makes the paper very user friendly, as the users need not to go
through the entire paper to understand what the paper talks about. Reading the abstract the reader
can grasp the motive of the paper that what is exactly the paper is dealing with.
In the next papers that have been reviewed explains in details about the security and
privacy challenges in the cloud computing, various aspect of cloud computing, relevant issues
regarding the security, privacy of the cloud technology, and the various issues and security
challenges related to the cloud services.
Therefore, it could be said that the papers that have been selected to review the literatures
for the proposed task can be regarded as appropriate given the framework of the task.
Summary of findings
After thoroughly reviewing the papers related to the security issues about cloud
computing, it has been found that all the papers suggests that implementation of cloud
environment eases the entire perception of working with virtual and physical media, however, it
has its own complications as well. These complications arise in the form of security issues
regarding the storage, usage and server handlings (Kong, Lei and Ma 2016). The papers hold the
importance of cloud computing with various aspects and different types of cloud computing
structures. In addition, some papers also have the descriptions of the models of the cloud
platform to make the reader familiar about the topic. The papers present the classification of the
what cloud computing is, why the technology is important and how it has transformed various
field. The purpose of the paper has been outlined in the abstract section to make it clear for the
readers to understand the aim of the report at the very first place (Gandhi and Gandhi 2016). The
third literature defines the purpose and the structure of the paper is clearly defined in the abstract
section. This kind of approach makes the paper very user friendly, as the users need not to go
through the entire paper to understand what the paper talks about. Reading the abstract the reader
can grasp the motive of the paper that what is exactly the paper is dealing with.
In the next papers that have been reviewed explains in details about the security and
privacy challenges in the cloud computing, various aspect of cloud computing, relevant issues
regarding the security, privacy of the cloud technology, and the various issues and security
challenges related to the cloud services.
Therefore, it could be said that the papers that have been selected to review the literatures
for the proposed task can be regarded as appropriate given the framework of the task.
Summary of findings
After thoroughly reviewing the papers related to the security issues about cloud
computing, it has been found that all the papers suggests that implementation of cloud
environment eases the entire perception of working with virtual and physical media, however, it
has its own complications as well. These complications arise in the form of security issues
regarding the storage, usage and server handlings (Kong, Lei and Ma 2016). The papers hold the
importance of cloud computing with various aspects and different types of cloud computing
structures. In addition, some papers also have the descriptions of the models of the cloud
platform to make the reader familiar about the topic. The papers present the classification of the
5SECURITY ISSUES OF CLOUD COMPUTING
cloud to present even deeper understanding about the topic with the security issues with these
models. The papers do not just present the security issues, but also the techniques to address
those issues. In the first paper, the data protection and data modelling methods has been
described in tabular form to make it easy for the reader to understand. Proper reference has been
given for the sources that the authors have cited which is feature of a quality paper. The second
paper describes the various issues related to the cloud computing. The paper first introduce the
topic like what cloud computing is, why the technology is important and how it has transformed
various field. The third journal clearly defines the purpose and the structure of the paper is
clearly defined in the abstract section. This kind of approach makes the paper very user friendly,
as the users need not to go through the entire paper to understand what the paper talks about.
The next papers ventures about the security and privacy challenges in the cloud
computing and the various aspect of cloud computing and relevant issues regarding the security
and privacy of the cloud technology.
Strengths
The strengths about the papers would be the areas that the papers have successfully
covered and the relevance of the papers with the issues they have discussed. The strength about
the first paper is that the paper describes the various model related to the cloud service with
adequate details with proper citations. The paper also talks about various cloud deployment
methodology that is used for cloud service. The report not only talks about the security issues
that is relevant to the cloud services, but rather includes the solution as well. In describing the
security issues the authors includes popular threats that have been recognized by the cloud
security alliance (CSA).In addition to that the privacy issues have been explained. The next
paper possesses strengths in some section diagram that have been used in illustrating theoretical
cloud to present even deeper understanding about the topic with the security issues with these
models. The papers do not just present the security issues, but also the techniques to address
those issues. In the first paper, the data protection and data modelling methods has been
described in tabular form to make it easy for the reader to understand. Proper reference has been
given for the sources that the authors have cited which is feature of a quality paper. The second
paper describes the various issues related to the cloud computing. The paper first introduce the
topic like what cloud computing is, why the technology is important and how it has transformed
various field. The third journal clearly defines the purpose and the structure of the paper is
clearly defined in the abstract section. This kind of approach makes the paper very user friendly,
as the users need not to go through the entire paper to understand what the paper talks about.
The next papers ventures about the security and privacy challenges in the cloud
computing and the various aspect of cloud computing and relevant issues regarding the security
and privacy of the cloud technology.
Strengths
The strengths about the papers would be the areas that the papers have successfully
covered and the relevance of the papers with the issues they have discussed. The strength about
the first paper is that the paper describes the various model related to the cloud service with
adequate details with proper citations. The paper also talks about various cloud deployment
methodology that is used for cloud service. The report not only talks about the security issues
that is relevant to the cloud services, but rather includes the solution as well. In describing the
security issues the authors includes popular threats that have been recognized by the cloud
security alliance (CSA).In addition to that the privacy issues have been explained. The next
paper possesses strengths in some section diagram that have been used in illustrating theoretical
6SECURITY ISSUES OF CLOUD COMPUTING
concept and that is much appreciated. Referencing with proper citation has been provided, which
is an important aspect of any published paper. In the third journal, the report first describes the
models of the cloud platform to make the reader familiar about the topic, if they are not. Then the
paper presents the classification of the cloud to present even deeper understanding about the
topic. Then security issues with the models have been described. The authors here not only
presented the security issues, but also the techniques to address those issues. The fourth paper
gives a good overview of the cloud computing models with right amount of details to make it
easier for readers to understand. In the next papers, there are discussions about various
cryptographic algorithms that are used for data security in the cloud models. The algorithm has
been described with proper diagram and explanations, which are added advantages for the reader
to grasp the concept more easily.
Shortcomings
The shortcomings in the paper describe the issues that are present in each paper that
justify the failure of the papers in some aspects. It focuses on the parts that have not been clearly
stated or have been failed to describe in a proper manner. In the very first journal, the paper
misses proper literature review, which is an essential part of any quality published paper. The
paper , along with describing the threats and issues of cloud service models , does not refer to
any practical project where the model is applied and what problems has been faced and how
those problems has been addressed. The paper is good for getting a basic detailed overview of
the cloud computing, but missies the quality for preferring for any practical project
implementation. The next report misses the section of literature review where authors review
related works previously done in the field, tries to analyze the strength and weakness of those
works, and based on the analysis provides the scope of modifications for improvement. The
concept and that is much appreciated. Referencing with proper citation has been provided, which
is an important aspect of any published paper. In the third journal, the report first describes the
models of the cloud platform to make the reader familiar about the topic, if they are not. Then the
paper presents the classification of the cloud to present even deeper understanding about the
topic. Then security issues with the models have been described. The authors here not only
presented the security issues, but also the techniques to address those issues. The fourth paper
gives a good overview of the cloud computing models with right amount of details to make it
easier for readers to understand. In the next papers, there are discussions about various
cryptographic algorithms that are used for data security in the cloud models. The algorithm has
been described with proper diagram and explanations, which are added advantages for the reader
to grasp the concept more easily.
Shortcomings
The shortcomings in the paper describe the issues that are present in each paper that
justify the failure of the papers in some aspects. It focuses on the parts that have not been clearly
stated or have been failed to describe in a proper manner. In the very first journal, the paper
misses proper literature review, which is an essential part of any quality published paper. The
paper , along with describing the threats and issues of cloud service models , does not refer to
any practical project where the model is applied and what problems has been faced and how
those problems has been addressed. The paper is good for getting a basic detailed overview of
the cloud computing, but missies the quality for preferring for any practical project
implementation. The next report misses the section of literature review where authors review
related works previously done in the field, tries to analyze the strength and weakness of those
works, and based on the analysis provides the scope of modifications for improvement. The
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7SECURITY ISSUES OF CLOUD COMPUTING
literature reviews is very important to conduct necessary research as it helps to identify the scope
of future research work. Without the literature review, the credibility of the paper cannot be
justified. The paper clearly mentions in the abstract section that the current security practises
applied in the field will be summarized. However, no such details have been provided in the
report. Even if there is, any mention of that it is not easily identifiable, as the authors have not
used any kind of figure or table to make it clearly identifiable for the readers, which is also a
drawback of the paper. The paper misses the characteristics of what it takes to be good source
for practical reference guide about a particular topic and the paper is not even suitable to gain
theoretical overview about the cloud computing. The third paper is very much suitable for
theoretical reference guide , however the only drawback is that, the paper is not suitable for
practical project purpose as there is not proper literature review and also the practical approaches
to implement those encryption algorithms is not described in details.
In the next paper, in addition to the security issues, the data security principle has been
described as well with appropriate diagram. However, the paper only describes the theoretical
aspects of the principles, not the actual implementation techniques that make the paper limited
for practical reference guide. The drawback in the next paper, as far as the actual content of the
paper is concerned; the paper describes some theoretical factors relevant to the topic. There is no
literature review present in the paper and no practical applications of the theories have been
described either. No diagrams and table has been used for the paper, another drawback of the
paper. The paper has though tried to introduce some new concepts regarding the security and
vulnerabilities of cloud service. However, the approach is theoretical nature. No supported and
relevant facts have been provided. The paper is not suitable either for theoretical or practical
resource material.
literature reviews is very important to conduct necessary research as it helps to identify the scope
of future research work. Without the literature review, the credibility of the paper cannot be
justified. The paper clearly mentions in the abstract section that the current security practises
applied in the field will be summarized. However, no such details have been provided in the
report. Even if there is, any mention of that it is not easily identifiable, as the authors have not
used any kind of figure or table to make it clearly identifiable for the readers, which is also a
drawback of the paper. The paper misses the characteristics of what it takes to be good source
for practical reference guide about a particular topic and the paper is not even suitable to gain
theoretical overview about the cloud computing. The third paper is very much suitable for
theoretical reference guide , however the only drawback is that, the paper is not suitable for
practical project purpose as there is not proper literature review and also the practical approaches
to implement those encryption algorithms is not described in details.
In the next paper, in addition to the security issues, the data security principle has been
described as well with appropriate diagram. However, the paper only describes the theoretical
aspects of the principles, not the actual implementation techniques that make the paper limited
for practical reference guide. The drawback in the next paper, as far as the actual content of the
paper is concerned; the paper describes some theoretical factors relevant to the topic. There is no
literature review present in the paper and no practical applications of the theories have been
described either. No diagrams and table has been used for the paper, another drawback of the
paper. The paper has though tried to introduce some new concepts regarding the security and
vulnerabilities of cloud service. However, the approach is theoretical nature. No supported and
relevant facts have been provided. The paper is not suitable either for theoretical or practical
resource material.
8SECURITY ISSUES OF CLOUD COMPUTING
9SECURITY ISSUES OF CLOUD COMPUTING
Conclusions:
The report after doing critical review of the relevant literature concludes that cloud
computing has revolutionized the way computer and technology interacts with each other. It has
redefined the definition of computing and expanded the horizon of computer applications and the
change is visible across various sectors irrespective of the field of operation and scope. However
the technology being so effective and advanced brings certain drawbacks along with it. The
primary Issues related to the technology include data security, theft of data and data hack due to
lack of authentication in certain situation. This makes the adoption of the cloud computing
limited in medium and small enterprises where proper infrastructure is missing to deal with the
security issues. However, if certain guidelines are followed to imitate the security issues then the
tehnology can be a real game changer for enterprise applications as well as for personal use. The
literatures that are reviewed in this context provides the theoretical aspect of the problem and
solution related to the cloud computing. Although few papers has tried to apply some practical
view to the problem but they are not properly constructed and some papers even misses the
literature review section which makes the credibility of the paper questionable.
Conclusions:
The report after doing critical review of the relevant literature concludes that cloud
computing has revolutionized the way computer and technology interacts with each other. It has
redefined the definition of computing and expanded the horizon of computer applications and the
change is visible across various sectors irrespective of the field of operation and scope. However
the technology being so effective and advanced brings certain drawbacks along with it. The
primary Issues related to the technology include data security, theft of data and data hack due to
lack of authentication in certain situation. This makes the adoption of the cloud computing
limited in medium and small enterprises where proper infrastructure is missing to deal with the
security issues. However, if certain guidelines are followed to imitate the security issues then the
tehnology can be a real game changer for enterprise applications as well as for personal use. The
literatures that are reviewed in this context provides the theoretical aspect of the problem and
solution related to the cloud computing. Although few papers has tried to apply some practical
view to the problem but they are not properly constructed and some papers even misses the
literature review section which makes the credibility of the paper questionable.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10SECURITY ISSUES OF CLOUD COMPUTING
Reference:
Bokhari, M.U., Shallal, Q.M. and Tamandani, Y.K., 2016, March. Cloud computing service
models: A comparative study. In Computing for Sustainable Global Development (INDIACom),
2016 3rd International Conference on (pp. 890-895). IEEE
Gandhi, K. and Gandhi, P., 2016, March. Cloud computing security issues: An analysis.
In Computing for Sustainable Global Development (INDIACom), 2016 3rd International
Conference on (pp. 3858-3861). IEEE.
Kong, W., Lei, Y. and Ma, J., 2016, September. Data security and privacy information
challenges in cloud computing. In Intelligent Networking and Collaborative Systems (INCoS),
2016 International Conference on (pp. 512-514). IEEE.
Ochani, A. and Dongre, N., 2017, February. Security issues in cloud computing. In I-SMAC (IoT
in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on (pp. 783-
787). IEEE
Shariati, S.M. and Ahmadzadegan, M.H., 2015, November. Challenges and security issues in
cloud computing from two perspectives: Data security and privacy protection. In Knowledge-
Based Engineering and Innovation (KBEI), 2015 2nd International Conference on (pp. 1078-
1082). IEEE
Soni, R., Ambalkar, S. and Bansal, P., 2016, March. Security and privacy in cloud computing.
In Colossal Data Analysis and Networking (CDAN), Symposium on (pp. 1-6). IEEE.
Tari, Z., 2014. Security and privacy in cloud computing. IEEE Cloud Computing, 1(1), pp.54-57.
Reference:
Bokhari, M.U., Shallal, Q.M. and Tamandani, Y.K., 2016, March. Cloud computing service
models: A comparative study. In Computing for Sustainable Global Development (INDIACom),
2016 3rd International Conference on (pp. 890-895). IEEE
Gandhi, K. and Gandhi, P., 2016, March. Cloud computing security issues: An analysis.
In Computing for Sustainable Global Development (INDIACom), 2016 3rd International
Conference on (pp. 3858-3861). IEEE.
Kong, W., Lei, Y. and Ma, J., 2016, September. Data security and privacy information
challenges in cloud computing. In Intelligent Networking and Collaborative Systems (INCoS),
2016 International Conference on (pp. 512-514). IEEE.
Ochani, A. and Dongre, N., 2017, February. Security issues in cloud computing. In I-SMAC (IoT
in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on (pp. 783-
787). IEEE
Shariati, S.M. and Ahmadzadegan, M.H., 2015, November. Challenges and security issues in
cloud computing from two perspectives: Data security and privacy protection. In Knowledge-
Based Engineering and Innovation (KBEI), 2015 2nd International Conference on (pp. 1078-
1082). IEEE
Soni, R., Ambalkar, S. and Bansal, P., 2016, March. Security and privacy in cloud computing.
In Colossal Data Analysis and Networking (CDAN), Symposium on (pp. 1-6). IEEE.
Tari, Z., 2014. Security and privacy in cloud computing. IEEE Cloud Computing, 1(1), pp.54-57.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.