logo

Security in Cloud Computing: Opportunities and Challenges

   

Added on  2023-03-17

8 Pages2389 Words69 Views
Software engineering
methodology
Security in Cloud Computing: Opportunities and Challenges_1
REPORT 1
Table of Contents
Assignment 2- Research Report............................................................................................................2
Introduction.......................................................................................................................................2
Intention and content of the article....................................................................................................2
Research methods..............................................................................................................................3
Research design.............................................................................................................................3
Data collection method..................................................................................................................3
Data analysis..................................................................................................................................4
Findings of the paper.........................................................................................................................4
Issues highlighted by the authors.......................................................................................................4
Results and discussion.......................................................................................................................5
Conclusion of the paper.....................................................................................................................5
Conclusion.........................................................................................................................................5
References.........................................................................................................................................6
Security in Cloud Computing: Opportunities and Challenges_2
REPORT 2
Assignment 2- Research Report
Introduction
A cloud computing is defined as the information technology which is used in the mobile and
computer devices for managing the personal data of consumers. The objective of this report is
to critically discuss a journal paper based on cloud computing and identify the findings and
results of the paper. The title of the research article is “Security in cloud computing:
Opportunities and challenges” that was written by Mazhar Ali and other researchers in the
year 2015 [1]. The identification of this paper focus on the security issues and challenges
occurred in the cloud computing and the authors reviewed the fundamental architecture of the
cloud computing technology. the outline of this report includes several sections, for example,
the intention of the article, research methods, findings, problems highlighted by the authors,
and results and discussion.
Intention and content of the article
According to the article, cloud computing is an advanced technology that has the ability to
deliver cost-effective and powerful resources over internet connectivity. In the last few years,
cloud computing attracts the attention of investigation community to its capability to deliver
effective advantages to the business industries. The authors identified that the cloud
computing is now used in many companies for protecting data or information of consumers
from hackers and it also deliver visualized sources to their consumers while using numerous
kinds of information technologies such as virtualization, and web-based services [2]. Internet
is one of the common processes which are used by consumers while accessing cloud-based
services but it is also linked with the cyber-crimes and security breaches. This journal paper
identified the risk factors associated with cloud computing. According to the authors, the
security is one of the common problems which hamper the widespread adoption of cloud
computing technique.
There are various research studies produced and many authors provided their views on this
topic but this paper critically reviewed the risks and challenges faced by the cloud computing
technologies. The authors determined that the fundamental architecture of cloud computing
involve several aspects such as essential characteristics, service model, and so on. From this
paper, it has found that the security threats occurred in the cloud may differ from the risks of
information technology infrastructure either in nature or intensity [3]. It is observed that the
Security in Cloud Computing: Opportunities and Challenges_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud computing.
|7
|431
|44

Software Engineering Methodology
|9
|2365
|24

THE CLOUD COMPUTING
|15
|3490
|21

Cloud Computing for Emerging Mobile Cloud Apps
|8
|2126
|55

Cyber Security Assignment PDF
|9
|2867
|2114

Crypto Currency and Cyber-Crime: Types of Malware, Mitigation Tools and Processes
|14
|919
|105