Annotated Bibliography: Cloud Computing Trends and Challenges

Verified

Added on  2021/04/17

|9
|2019
|18
Annotated Bibliography
AI Summary
This annotated bibliography provides an overview of cloud computing, its architecture, services, and various deployment models, including public, private, and hybrid clouds. It highlights the advantages of cloud computing, such as cost reduction and improved system performance, while also addressing the security challenges associated with data storage and access. The bibliography includes analyses of cloud computing security, the integration of cloud computing and IoT, and the rise of big data in cloud environments. The research explores topics like distributed denial of service attacks, value creation models, and the adoption of cloud computing in small and medium enterprises (SMEs). The conclusion emphasizes the positive impact of cloud computing on the IT and business industries, while also stressing the importance of addressing security concerns and exploring emerging technologies like CloudIoT for future advancements. The annotated bibliography serves as a valuable resource for understanding the current trends and challenges in cloud computing.
Document Page
Running head: ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ANNOTATED BIBLIOGRAPHY
Introduction
Cloud computing is the current trend in the technology. The popularity of the cloud
computing depends its cost effectiveness. Using the cloud computing, there is no need for the
users to use the infrastructures and the physical systems for accessing the data. There are
different types of cloud services- IaaS (infrastructure as Service),PaaS (Platform as
Services),SaaS(Software as Service).Each of the type of services are used for the different types
of purpose. There are various types of cloud deployments such as – public cloud, private cloud.
The combination of public and private cloud is called hybrid cloud. There are various advantages
of using cloud- like reduces the infrastructure cost, it reduces the fault in the system and increase
the performance of the system. The resource is made available for all time and can be accessed
from any place. The working principal of the cloud computing is different. The working
principals of the cloud depend on the service provider and the users of the cloud. The main
advantage of cloud computing is that it provides huge storage space of data and the cloud service
provider is responsible for the security of the data. Users have to pay an amount to the service
provider for the maintenance and the security of the data.
Annotated Bibliography:
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities
and challenges. Information sciences, 305, pp.357-383.
Cloud computing is the current trend in the IT industry .It allows the data to be accessed
from anywhere and any place. However, there are certain challenges to implement the cloud
architecture.
Document Page
2ANNOTATED BIBLIOGRAPHY
The way to identify the challenges in the cloud computing is to identify the working
principals of different layers of cloud. The challenges can be defined in the context of both
implementation of the cloud architecture and the use of cloud in the various purposes.
The paper has tried to focus on describing the architecture of the cloud along with the
impact of this technology. It also discusses the existing and future challenges of using the cloud.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Cloud computing has become a popular and effective to serve the business purpose.
However, there are questions about the security issues of this architecture. The security model
has become more complicated for the cloud computing as the complexity of the cloud structure.
The security issues in the cloud computing has been seen from the perspective of cloud
architecture which covers cloud stakeholder’s perspective, service delivery model’s perspective.
The specifications of security issues are highlighted from these factors and required solutions are
proposed.
The solutions provided in the article are realistic and can be implemented to the cloud
architecture successfully. It covers all the security issues that can happen in cloud computing.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, pp.98-115.
Document Page
3ANNOTATED BIBLIOGRAPHY
Using cloud architecture complex computing can be done. Generation of big data through
the cloud architecture has been observed. Analysis of big data is challenging with respect to
computation and time demanding task.
In order to indentify the relationship between the cloud and the big data, the basic terms
regarding the big data has been discussed. The cloud based technologies used for big data along
with sustainability and privacy issues regarding those technologies are also discussed.
Big data is becoming popular for analysis the opportunities. In this case, if the complexity
of big data can be managed by the cloud architecture, it can become more efficient and cost
effective.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-
386.
Due to the absence of physical infrastructure in the cloud computing, and large database
stored in the cloud, sometimes the security of the data cannot be maintained properly. The need
of proving a better security for the cloud is needed for this reason.
In this article the possibilities of implementing different security measures has been
discussed along with proposing a new security system for the cloud named SeeCloud has
proposed. The main aim of the paper is to invent a secured way to handle the data in cloud in a
more secured way.
Managing the security issue in the cloud architecture is an important issue. This paper
helps to identify the security issues and has tried to implement a security measure.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ANNOTATED BIBLIOGRAPHY
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2014, August. On the integration of
cloud computing and internet of things. In Future internet of things and cloud (FiCloud),
2014 international conference on (pp. 23-30). IEEE.
Cloud and IoT are different technologies, which are used frequently in the various fields.
However, the merging of these two technologies, which is known as CloudIoT paradigm, is
comparatively new in the technological field.
The general discussion of the CloudIoT has been done previously but there was no
research done on the applications, security issues of using this new technology. The paper has
bridged this gap by providing the proper information and the implementation scopes in
CloudIoT.
Very few number of researches has been conducted on this field. This paper has
discussed the future of CloudIoT in a descriptive way.
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and
cloud computing. Future Generation Computer Systems, 78, pp.964-975.
Both cloud computing and Internet of Things (IoT) is the growing technologies. The
merging of these two technologies can be beneficial in managing handling data in cost effective
and efficient way.
The method, which has been proposed, regarding the merging of these two technologies
is to deploy Cloud and IoT. In order to conduct this search more properly this paper has
compeered two technologies in order to identify the common thing between them.
Document Page
5ANNOTATED BIBLIOGRAPHY
The comparison and the features after the merging of two technologies have a positive
impact on the further research on this emerging technology. The paper show that the cloud
computing has improved the functioning of IoT.
Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, pp.529-534.
The implementation of the cloud architecture in the business organizations has done a
rapid growth of business. However, many of the organizations and the users have found that
using cloud computing is a complex process in terms of handling the technology.
This paper has evaluated the necessary things needed to be considered in case of
implementing cloud computing in business organization. The factors are considered for both in a
positive and negative way.
The paper aims to identify the importance of cloud computing for the business
organization. In this context it has identified the positive and negative impacts of cloud
computing in business organization.
Ghaffari, K., Delgosha, M.S. and Abdolvand, N., 2014. Towards cloud computing: a SWOT
analysis on its adoption in SMEs. arXiv preprint arXiv:1405.1932.
The cloud computing has a vast impact on the IT industry. However there are many
barriers in the implementations of cloud computing. Those technical barriers should be
removed.
The paper identifies the technical constrains and complexities of implementing the cloud
computing in different organization. In this case the main focus is on SME( Small and Medium
Document Page
6ANNOTATED BIBLIOGRAPHY
Enterprise). It also includes the identification of stakeholders of cloud computing and possible
security issues.
The paper has contributed the importance of implementation of cloud computing in
SME .It has also contributed in the research of the possible risks that can happen during the
implementation.
Yan, Q. and Yu, F.R., 2015. Distributed denial of service attacks in software-defined
networking with cloud computing. IEEE Communications Magazine, 53(4), pp.52-59.
Software- defined services using cloud has numerous advantages by decoupling the data
plan and control plan. It has been seen that software-defined services has prone to Denial of
Service attack.
The identification of the attacks has been done by discussing the way of various attacks
on the software defined services using cloud computing. The features of software defined
services which can be used to prevent these types of attacks are also identified.
The paper has discussed the cloud based software defined services and its advantages. It
has also discussed certain threats on this type of system. Recommendations are made to prevent
these kinds of problems.
Chou, D.C., 2015. Cloud computing: A value creation model. Computer Standards &
Interfaces, 38, pp.72-77.
Cloud computing has gained the popularity for its technical advancement. There are
various components of cloud computing. The use of these components can be modified in order
to get a customized service through cloud computing.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ANNOTATED BIBLIOGRAPHY
The paper discusses the various components of the cloud architecture. It also discusses
the risks and the issues related to the cloud computing. The analysis of the types of risks that can
happen in the cloud architecture can be determined through a value creation model.
The paper contributes its findings towards the understanding of the cloud architecture . It
also analyze the risks and through value creation model. The paper also defines the standards of
IT auditing.
Conclusion
It can be concluded after analysis of these above articles that cloud computing is an
important technology and it has certain impacts on Information Technology industry as well as
the business industry. There are certain advantages that can become beneficial for the cloud users
like large storage and accessibility. However, there are certain kinds of security risks like denial
of service attack can violate the security of the cloud computing architecture. Certain steps and
models can be used to prevent these kinds of security attacks. Moreover the other technologies
like IoT can be merged with the cloud computing technology in order to create more innovative
way of handling the IT and business situations. One of these kinds of technology is CloudIoT
can be researched for the future development of the technological field. The cloud computing
can be used for the advancement of certain software based services. However, the security of the
data belonging to the cloud storage depends on the certain factors. It depends on the maintenance
of cloud provider as well as the technology deployed for the cloud. The security issues are
needed to be resolved using different tools and techniques. Overall impact of the cloud
computing on the business and IT industry is very positive and futuristic.
Document Page
8ANNOTATED BIBLIOGRAPHY
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]