Annotated Bibliography: AI and Network Security Technologies Research
VerifiedAdded on 2020/02/24
|7
|1373
|77
Annotated Bibliography
AI Summary
This annotated bibliography provides an overview of key research papers related to network and information security technologies. The annotations cover a range of topics, including security issues in wireless sensor networks, cloud computing, and big data environments. The bibliography examines various security technologies, encryption methods, and key management schemes used to mitigate risks in these areas. Several articles discuss the challenges of securing cloud environments, including issues related to data encryption, resource scheduling, and vulnerabilities at different layers of cloud computing. The research highlights the need for dynamic security models and crypto algorithms to address evolving threats and ensure data privacy. The bibliography also explores the evolution of cloud computing and the impact of emerging technologies on network security, emphasizing the need for continuous research and development to address new security challenges.

Running head: ANNOTATED BIBLIOGRAPHY
Annotated Bibliography
Network and information security technologies
Name of the Student:
Name of the University:
Annotated Bibliography
Network and information security technologies
Name of the Student:
Name of the University:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1ANNOTATED BIBLIOGRAPHY
Annotation 1:
Yang, Q., Zhu, X., Fu, H., & Che, X. (2015). Survey of security technologies on wireless sensor
networks. Journal of sensors, 2015.
In this article, Yang et al., (2015) discussed on the survey that is conducted on the
security technologies on wireless sensor networks. Due to rapid development of wireless
communication, sensor technology is promoted to develop wireless sensor networks (WSN).
WSN is consisted of an emergence network technology that is raised recently. It obtains lot of
consistent information within distributed network wherever and anytime. While providing of
security solutions to WSN, encryption technology is used to prevent the security issues. The
researcher conducted the research to identify various security technologies used to mitigate
security and privacy risks from the cloud environment. The author proposed of key management
schemes. The limitation of this study is shortcomings into security as well as network
applicability.
Annotation 2:
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3), 45.
In this article, Inukollu, Arsi and Ravuri (2014) discussed about the security issues within
cloud computing. This selected article is relevant as applications of big data are benefited to the
organizations, businesses and large and small scale industries. Various solutions for the problems
within cloud computing security are discussed. In order to protect the data and big data
applications, cloud computing plays a key significant role. Hadoop framework is discussed with
using of security framework to process larger amounts of data into the hardware. The author
Annotation 1:
Yang, Q., Zhu, X., Fu, H., & Che, X. (2015). Survey of security technologies on wireless sensor
networks. Journal of sensors, 2015.
In this article, Yang et al., (2015) discussed on the survey that is conducted on the
security technologies on wireless sensor networks. Due to rapid development of wireless
communication, sensor technology is promoted to develop wireless sensor networks (WSN).
WSN is consisted of an emergence network technology that is raised recently. It obtains lot of
consistent information within distributed network wherever and anytime. While providing of
security solutions to WSN, encryption technology is used to prevent the security issues. The
researcher conducted the research to identify various security technologies used to mitigate
security and privacy risks from the cloud environment. The author proposed of key management
schemes. The limitation of this study is shortcomings into security as well as network
applicability.
Annotation 2:
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3), 45.
In this article, Inukollu, Arsi and Ravuri (2014) discussed about the security issues within
cloud computing. This selected article is relevant as applications of big data are benefited to the
organizations, businesses and large and small scale industries. Various solutions for the problems
within cloud computing security are discussed. In order to protect the data and big data
applications, cloud computing plays a key significant role. Hadoop framework is discussed with
using of security framework to process larger amounts of data into the hardware. The author

2ANNOTATED BIBLIOGRAPHY
concluded that cloud computing consists of various security issues as it contains of networks,
operating systems, scheduling of resources, concurrency control and databases. Security over the
data contains of data encryption, but it makes sure that proper policies are to be followed for data
sharing.
Annotation 3:
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
In this article, Modi et al. (2013) discussed that the cloud computing provides scalable on
demand services to the customers with better suppleness as well as infrastructure asset. The
cloud services are provided the users using classical networking protocols and it is formatted
over the internet. The researcher surveyed of various factors which affect the adoption of cloud
computing are attacks, threats and vulnerabilities to strength security cloud environments. The
researcher concluded that in the future, this research will focus on existing techniques and
examine of new security techniques to cloud environment. It requires a dynamic model and
crypto algorithm which will target various levels of security in addition to privacy for the cloud
computing. Encryption algorithm consists of unfamiliar position of the data within cloud to
administer the data encryption.
concluded that cloud computing consists of various security issues as it contains of networks,
operating systems, scheduling of resources, concurrency control and databases. Security over the
data contains of data encryption, but it makes sure that proper policies are to be followed for data
sharing.
Annotation 3:
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
In this article, Modi et al. (2013) discussed that the cloud computing provides scalable on
demand services to the customers with better suppleness as well as infrastructure asset. The
cloud services are provided the users using classical networking protocols and it is formatted
over the internet. The researcher surveyed of various factors which affect the adoption of cloud
computing are attacks, threats and vulnerabilities to strength security cloud environments. The
researcher concluded that in the future, this research will focus on existing techniques and
examine of new security techniques to cloud environment. It requires a dynamic model and
crypto algorithm which will target various levels of security in addition to privacy for the cloud
computing. Encryption algorithm consists of unfamiliar position of the data within cloud to
administer the data encryption.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3ANNOTATED BIBLIOGRAPHY
Annotation 4:
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
In this article, Almorsy, Grundy and Muller (2016) demonstrated that cloud computing is
a computational paradigm which is offering of various business models for the business in order
to adopt of IT with no upfront investments. In the cloud environment, security issues are critical
as new dimensions are entered into problem scope related to the model architectures. The
researcher introduced a detailed analysis of the problems related to problem of cloud security.
The problem is investigated based on perspective of cloud architecture. A cloud computing
model is used by the service and cloud providers. This model is used to utilize to block existing
security holes. It is concluded that cloud security management problems are investigated so that
the system users can analyze it. The objective is to block the holes arise within the processes of
security management.
Annotation 5:
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
In this article, Fernandes et al. (2014) discussed that the paper is based on security issues
within the cloud environments. The features of cloud computing is that it motivates the
researcher about various technologies to be used to mitigate the cloud computing issues. The
issues are derived from the web technologies, internet, and then the cloud introduced of security
issues. This particular paper surveyed on cloud security issues. It is concluded that the cloud
Annotation 4:
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
In this article, Almorsy, Grundy and Muller (2016) demonstrated that cloud computing is
a computational paradigm which is offering of various business models for the business in order
to adopt of IT with no upfront investments. In the cloud environment, security issues are critical
as new dimensions are entered into problem scope related to the model architectures. The
researcher introduced a detailed analysis of the problems related to problem of cloud security.
The problem is investigated based on perspective of cloud architecture. A cloud computing
model is used by the service and cloud providers. This model is used to utilize to block existing
security holes. It is concluded that cloud security management problems are investigated so that
the system users can analyze it. The objective is to block the holes arise within the processes of
security management.
Annotation 5:
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
In this article, Fernandes et al. (2014) discussed that the paper is based on security issues
within the cloud environments. The features of cloud computing is that it motivates the
researcher about various technologies to be used to mitigate the cloud computing issues. The
issues are derived from the web technologies, internet, and then the cloud introduced of security
issues. This particular paper surveyed on cloud security issues. It is concluded that the cloud
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4ANNOTATED BIBLIOGRAPHY
computing is being dominated by various challenges. Due to growth of advanced technology as
well as virtualization, the industry is facing security issues. In order to provide a secured cloud
environment, highest priority is the security issues. Therefore, it will enable a better considerate
of the security states.
computing is being dominated by various challenges. Due to growth of advanced technology as
well as virtualization, the industry is facing security issues. In order to provide a secured cloud
environment, highest priority is the security issues. Therefore, it will enable a better considerate
of the security states.

5ANNOTATED BIBLIOGRAPHY
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3), 45.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Yang, Q., Zhu, X., Fu, H., & Che, X. (2015). Survey of security technologies on wireless sensor
networks. Journal of sensors, 2015.
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3), 45.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Yang, Q., Zhu, X., Fu, H., & Che, X. (2015). Survey of security technologies on wireless sensor
networks. Journal of sensors, 2015.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6ANNOTATED BIBLIOGRAPHY
Bibliography
Anderson, T. (2016). Theories for learning with emerging technologies. Emerging technologies
in distance education.
Harasim, L. (2017). Learning theory and online technologies. Taylor & Francis.
Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2016). Wireless charging technologies:
Fundamentals, standards, and network applications. IEEE Communications Surveys &
Tutorials, 18(2), 1413-1452.
Mijumbi, R., Serrat, J., Gorricho, J. L., Bouten, N., De Turck, F., & Boutaba, R. (2016). Network
function virtualization: State-of-the-art and research challenges. IEEE Communications
Surveys & Tutorials, 18(1), 236-262.
Pan, M., Sikorski, J., Akroyd, J., Mosbach, S., Lau, R., & Kraft, M. (2016). Design technologies
for eco-industrial parks: From unit operations to processes, plants and industrial
networks. Applied Energy, 175, 305-323.
Bibliography
Anderson, T. (2016). Theories for learning with emerging technologies. Emerging technologies
in distance education.
Harasim, L. (2017). Learning theory and online technologies. Taylor & Francis.
Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2016). Wireless charging technologies:
Fundamentals, standards, and network applications. IEEE Communications Surveys &
Tutorials, 18(2), 1413-1452.
Mijumbi, R., Serrat, J., Gorricho, J. L., Bouten, N., De Turck, F., & Boutaba, R. (2016). Network
function virtualization: State-of-the-art and research challenges. IEEE Communications
Surveys & Tutorials, 18(1), 236-262.
Pan, M., Sikorski, J., Akroyd, J., Mosbach, S., Lau, R., & Kraft, M. (2016). Design technologies
for eco-industrial parks: From unit operations to processes, plants and industrial
networks. Applied Energy, 175, 305-323.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.