MITS5002: Cloud Computing Security Research Report Analysis

Verified

Added on  2023/03/17

|8
|2389
|69
Report
AI Summary
This report provides a critical review of a research paper focusing on security in cloud computing. The paper, titled "Security in cloud computing: Opportunities and challenges," explores the architecture, challenges, and risks associated with cloud-based services. The report examines the research methods employed, including a mixed research design utilizing both qualitative and quantitative approaches, alongside secondary data collection from various sources. The findings highlight security vulnerabilities stemming from misconfigurations, lack of control over data, and the use of internet connectivity, which opens the door to cyber-crimes. The report concludes that security is a significant challenge in cloud computing, with a lack of security leading to data breaches, emphasizing the need for advanced security measures and secure network configurations to mitigate these risks. The report connects the research paper's findings to the software engineering methodologies, specifically the security concerns, discussed in the unit of study.
Document Page
Software engineering
methodology
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REPORT 1
Table of Contents
Assignment 2- Research Report............................................................................................................2
Introduction.......................................................................................................................................2
Intention and content of the article....................................................................................................2
Research methods..............................................................................................................................3
Research design.............................................................................................................................3
Data collection method..................................................................................................................3
Data analysis..................................................................................................................................4
Findings of the paper.........................................................................................................................4
Issues highlighted by the authors.......................................................................................................4
Results and discussion.......................................................................................................................5
Conclusion of the paper.....................................................................................................................5
Conclusion.........................................................................................................................................5
References.........................................................................................................................................6
Document Page
REPORT 2
Assignment 2- Research Report
Introduction
A cloud computing is defined as the information technology which is used in the mobile and
computer devices for managing the personal data of consumers. The objective of this report is
to critically discuss a journal paper based on cloud computing and identify the findings and
results of the paper. The title of the research article is “Security in cloud computing:
Opportunities and challenges” that was written by Mazhar Ali and other researchers in the
year 2015 [1]. The identification of this paper focus on the security issues and challenges
occurred in the cloud computing and the authors reviewed the fundamental architecture of the
cloud computing technology. the outline of this report includes several sections, for example,
the intention of the article, research methods, findings, problems highlighted by the authors,
and results and discussion.
Intention and content of the article
According to the article, cloud computing is an advanced technology that has the ability to
deliver cost-effective and powerful resources over internet connectivity. In the last few years,
cloud computing attracts the attention of investigation community to its capability to deliver
effective advantages to the business industries. The authors identified that the cloud
computing is now used in many companies for protecting data or information of consumers
from hackers and it also deliver visualized sources to their consumers while using numerous
kinds of information technologies such as virtualization, and web-based services [2]. Internet
is one of the common processes which are used by consumers while accessing cloud-based
services but it is also linked with the cyber-crimes and security breaches. This journal paper
identified the risk factors associated with cloud computing. According to the authors, the
security is one of the common problems which hamper the widespread adoption of cloud
computing technique.
There are various research studies produced and many authors provided their views on this
topic but this paper critically reviewed the risks and challenges faced by the cloud computing
technologies. The authors determined that the fundamental architecture of cloud computing
involve several aspects such as essential characteristics, service model, and so on. From this
paper, it has found that the security threats occurred in the cloud may differ from the risks of
information technology infrastructure either in nature or intensity [3]. It is observed that the
Document Page
REPORT 3
cloud-based services are used by the consumers and companies with the help of internet
connectivity and they store their personal information on cloud due to which hacker’s attacks
on their networks which produce the issue of cyber-attacks. Moreover, the security
configuration of the cloud servers is a very complex task due to which various kinds of
security issues occurred in the field of clouds such as malware, phishing and other data
breach risks [4].
The authors argued that misconfiguration is one of the major risk factors which increase the
rate of security risks and threats in the cloud. Such kind of problem can breach the overall
security of the networks and users can lose their private details and information. However,
virtualization allows the use of same physical sources by numbers of consumers and lack of
proper virtualization can lead the issue of a data breach in the field of cloud computing [5].
After analysing this paper it is identified that the authors provided in-depth analysis of cloud
computing along with their security challenges. Such kind of information technology does
not provide consumers with full control over data and the lack of control over the data can
enhance the issue of cyber-crimes and security threats [6]. Therefore, it is analysed that
security is one of the biggest challenges occurred in the area of cloud computing which can
impact on the private details and information of companies and users.
Research methods
Research design
After analysing the research paper it is identified that the authors used a mixed research
design to accomplish the aims and objectives of the investigation. The mixed research design
included both qualitative and quantitative design while improving the effectiveness of the
investigation [7]. The qualitative research design allowed theoretical information about cloud
computing and quantitative design focus on the numerical data obtained from other authors.
By using such kind of research design the authors maintained the overall quality of the
research and reduced the research gaps occurred at the time of the investigation.
Data collection method
The researchers used only a secondary kind of data collection technique while conducting
this investigation. The data collection technique enables the authors to reduce and address the
problems occurred between potential information and required information. In the case of the
secondary data collection process, the relevant information is obtained from various sources,
for example, journal papers, annual reports, conference papers, academic publications and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REPORT 4
observation techniques [8]. While using such kind of data collection techniques the authors
controlled and managed the quality of research and obtained the facts and data about cloud
computing and security risks linked with the cloud-based services.
Data analysis
It is one of the major parts of the research method that provide a platform to the authors for
obtaining effective data and information about the research topic. After analysing the journal
paper it is determined that the authors used a content analysis method that helped them for
analysing and evaluating the secondary data or information obtained from previous studies
and papers [9]. The authors also used Microsoft word and MS-excel tools for developing and
implementing flow charts, diagram, and graphs.
Findings of the paper
This paper is based on cloud computing and the authors identified the security risks and
challenges occurred in the area of cloud computing. From this article, it has found that
security risks occurred in cloud computing due to lack of security and use of misconfigured
networks [10]. Moreover, cloud computing provides servers to their consumers by using
internet connectivity which is directly linked with the data breach and cyber-crimes because
hackers use the internet for transferring traffics signals over the cloud-based servers [11]. It is
also analysed that cloud computing uses multi-tenancy process while providing servers to
their consumers which can lead the risks of data visibility to the victims and other consumers
and trace the personal information of consumers.
Issues highlighted by the authors
It is observed that the authors highlighted the security is one of the common problems which
is associated with cloud computing. Moreover, the authors also highlighted that
misconfiguration is another problem which increases the rate of data breach and cyber-crimes
in the field of cloud computing. In this journal paper, the researchers also discussed the risks
factors that affect the security of cloud-based services. The cloud services use internet
connectivity while transferring cloud services to their consumers but hackers use the internet
as a platform for the hacking personal information of consumers. There are major two kinds
of problems occurred in cloud computing such as internal problems and external problems
[12]. The authors also highlighted that virtual networks are connected with the cloud-based
servers which can be easily hacked by the attackers and increase the problem of the data
breach.
Document Page
REPORT 5
Results and discussion
From this paper, it has found that the lack of security and control over the data or information
results in a larger rate of a data breach in the field of cloud computing. Cloud computing has
the ability for storing a large number of data sets on cloud servers and is used by many
companies for protecting their personal data files [13]. This paper shows that the security of
cloud computing can be enhanced by using advanced security networks and encryption
technology. The researchers determined that the data in cloud computing is more vulnerable
to the threats and risks in terms of integrity, availability and confidentiality. Malicious is a
very common cyber-attack that occurred in cloud computing and it affects the personal data
or information of consumers or companies [14].
Conclusion of the paper
This paper identified the risk factors linked with cloud computing and provided a platform for
better understanding of security challenges and opportunities of cloud computing. In this
research article, the authors reviewed the architecture of cloud computing along with the
fundamental principle of cloud computing. It is concluded that the security risks associated
with cloud computing are very larger in terms of data breach and cyber-crimes which directly
impact on the private details of consumers. This paper is completely relevant to the unit study
because the authors evaluated and analysed the security concern of cloud computing which is
a part of software engineering methodologies discussed in the Unit.
Conclusion
This report critically reviewed a journal paper based on cloud computing and identified the
intention and results of the article. from this study, it is concluded that lack of security and
use of misconfiguration both are very common risk factors that increase the rate of security
risks in cloud computing. This report explained the research methods used by the authors and
analysed the findings of the paper along with the results. Therefore, it is suggested that
consumers should use authentic networks and follow complete steps while configuring
computer networks in order to reduce security risks occurred in cloud computing.
Document Page
REPORT 6
References
[1]. M., Ali, S.U. Khan and, A.V., Vasilakos, “Security in cloud computing:
Opportunities and challenges,” Information sciences, vol. 305, no. 7, pp.357-383,
2015.
[2]. D. Zissis and, D., Lekkas, “Addressing cloud computing security issues,” Future
Generation computer systems, vol. 28, no. 3, pp.583-592, 2012.
[3]. J.W. Rittinghouse and, J.F., Ransome, Cloud computing: implementation,
management, and security,” CRC press, 2016.
[4]. D. Chen and, H., Zhao, “Data security and privacy protection issues in cloud
computing,” In 2012 International Conference on Computer Science and Electronics
Engineering, vol. 1, no. 2, pp. 647-651, 2012.
[5]. K., Ren, C. Wang and, Q., Wang, “Security challenges for the public cloud,” IEEE
Internet Computing, vol. 16, no. 1, pp.69-73, 2012.
[6]. S.K., Sood, “A combined approach to ensure data security in cloud
computing,” Journal of Network and Computer Applications, vol. 35, no. 6, pp.1831-
1838, 2012.
[7]. L., Wei, H., Zhu, Z., Cao, X., Dong, W., Jia, Y. Chen and, A.V., Vasilakos, “Security
and privacy for storage and computation in cloud computing,” Information
Sciences, vol. 258, no. 7, pp.371-386, 2014.
[8]. S. Carlin and, K., Curran, “Cloud computing security,” In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments, vol. 2, no. 5, pp. 12-
17, 2013.
[9]. Y. Jadeja and, K., Modi, “Cloud computing concepts, architecture and challenges,”
In 2012 International Conference on Computing, Electronics and Electrical
Technologies (ICCEET), vol. 8, no. 7, pp. 877-880, 2012.
[10]. C., Rong, S.T. Nguyen and, M.G., Jaatun, “Beyond lightning: A survey on
security challenges in cloud computing,” Computers & Electrical Engineering, vol.
39, no. 1, pp.47-54, 2013.
[11]. M.A., AlZain, E., Pardede, B. Soh and, J.A., Thom, “Cloud computing
security: from single to multi-clouds,” In 2012 45th Hawaii International Conference
on System Sciences, vol. 8, no. 5, pp. 5490-5499, 2012.
[12]. N., Gonzalez, C., Miers, F., Redigolo, M., Simplicio, T., Carvalho, M.
Näslund and, M., Pourzandi, “A quantitative analysis of current security concerns and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REPORT 7
solutions for cloud computing,” Journal of Cloud Computing: Advances, Systems and
Applications, vol. 1, no. 1, p.11, 2012.
[13]. M. Jouini and, L.B.A., Rabai, “A security framework for secure cloud
computing environments,” In Cloud Security: Concepts, Methodologies, Tools, and
Applications, vol. 7, no. 2, pp. 249-263, 2019.
[14]. C., Stergiou, K.E., Psannis, B.G. Kim and, B., Gupta, “Secure integration of
IoT and cloud computing,” Future Generation Computer Systems, vol. 78, no. 8,
pp.964-975, 2018.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]