ITC571 - Cloud Computing Security Solution: An Annotated Bibliography

Verified

Added on  2023/06/07

|13
|3409
|110
Annotated Bibliography
AI Summary
This annotated bibliography provides a critical examination of recent and scholarly research on cloud computing security solutions. It includes a collection of 12 articles, each summarized and critically evaluated. The bibliography covers various aspects of cloud security, including virtualization techniques, encryption algorithms, data integrity, and challenges in adopting cloud services from an enterprise perspective. The articles discuss different cloud deployment models, security threats, and the implementation of cloud security solutions in healthcare and business. It also explores the use of attribute-based encryption and forensic analysis for network security management within cloud environments. The aim is to provide a comprehensive overview of the current state of cloud security research and its practical applications.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CLOUD COMPUTING BASED SECURITY SOLUTION
Cloud Computing Based Security Solution
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CLOUD COMPUTING BASED SECURITY SOLUTION
Task 1
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
The central idea of this article is to provide a detailed introduction of Cloud computing
security service. It describes cloud computing as the process for communication between the
client and the server which uses internet infrastructure. The author suggests that cloud computing
offers mainly three types of services to the users which can be categorized as IaaS, PaaS and
SaaS. The author seeks to explain the attributes of the cloud computing security service. On the
basis of a recent studies, the author suggests the use of cloud services has led to a reduction of
18% in the Budget of the IT companies.
This article provides a proper analysis of introduction to the cloud computing in order to
understand the basic structure of cloud computing. It provides the signs of secondary statistical
data being used and this can be considered as the weakness of this article. It does not provide any
unnecessary discussion and it is capable of providing a precisely structured introduction. It can
be considered as the strength of the article.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based
on fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014
16th International Conference on (pp. 485-488). IEEE.
The author in this article introduces homomorphism encryption algorithm for cloud
computing data security solution. It describes the principle of the algorithm proposed by Craig
Document Page
2CLOUD COMPUTING BASED SECURITY SOLUTION
Gentry. The paper is efficient in providing the various homomorphism properties such as
decipherment algorithm and encryption algorithm. The author gives the verification of the
relevant properties with the help of mathematical expressions. It provides the data from a reliable
research institution IDC. It provides issues of cloud data security in context to the companies like
Microsoft and Google.
The author uses a reliable source for the collection of data for this article. This article
provides the facts and findings related to the cloud computing based security solution but fails to
provide accurate data. The strength of the paper is that it explains and verifies the algorithms
with the help of mathematical expressions making them more reliable. The author investigates
the cloud service security with the help of example of the companies which increases the
dependability on the article.
Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing
security. International Journal on Recent and Innovation Trends in Computing and
Communication, 1(1), 36-39.
This article aims at discussing the virtualization technique which is capable of providing
security and isolation to the customers. The author describes virtualization as the technique for
sharing the security risks through achieving the multi-tenant environment. The author effectively
describes the Virtualization technique in order to obtain multi tenancy. It investigates the
architecture of virtual appliance and virtual machine. The paper is efficient in providing the
recent studies in context to the virtualization security. It demonstrates the findings of Gartner in
Document Page
3CLOUD COMPUTING BASED SECURITY SOLUTION
year 2012 about the virtualization which indicates that about 60% virtual servers are expected to
be comparatively less secured than the physical servers in the near future.
This article provides an in depth analysis of the virtualization and multi tenancy in order
to achieve the security in the cloud computing services. The author is efficient in investigating
the topic with the help of facts and findings. The author uses a secondary source of data for
providing the statistical evidence which decreases the reliability of the data provided. The author
is capable of considering all the aspects of the virtualization while discussing the cloud
computing security. This can be considered as the strength of this article.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
The author in this article discusses the concerns of security in the cloud computing
service with the increase in the popularity of this services. The author provides the details of the
confidentiality, integrity and privacy required for the cloud computing services. The author
efficiently describes the four types of cloud deployment model which are private, public,
community and hybrid model. It is capable of describing the field of application of the different
cloud service providing models. The author also describes the categorization of the threats
available to the cloud security services. It suggests the users and the organizations to outsource
from the trusted third party services. The article s successful in providing the factors that the
third party can use for being relied upon.
The article gives the signs of reliability in explaining all technologies and terminologies
explained. It provides an in depth analysis of the data security and their requirements in cloud
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CLOUD COMPUTING BASED SECURITY SOLUTION
computing. This report does not provide any accurate data or survey results which hints that
author may not have used primary and authentic data. This can be considered as the weakness of
the article. The strength of this article is that it is precise and easy to understand.
Calabrese, B., & Cannataro, M. (2015). Cloud computing in healthcare and
biomedicine. Scalable Computing: Practice and Experience, 16(1), 1-18.
In this article the author describes the implementation of cloud computing services based
solution in the healthcare and biomedicine. Cloud computing is efficient in fulfilling the
requirements of healthcare industry by providing them scalable computing. The author suggests
that cloud services are capable of providing the sufficient network access, community tools and
infrastructure of maintaining the healthcare industry. The author provides the implications of the
increase in use of big data in healthcare. The author investigates that cloud solution allows a cost
effective approach to bioinformatics in healthcare department.
This report efficiently provides the data in the favor of cloud security in
healthcare department. The data and statistics used in this report are secondary in nature as the
data are taken from some different source. Thus it can be considered as a weakness of this report
as the data can be from an unreliable source. The strength of report is that it discusses about the
tools and platform used for cloud service in the healthcare. The report is appropriate while
providing examples of company adopting the same process and gaining productivity rate.
Bo, K. S. (2018). Cloud Computing for Business. IJASRE, 4.
The author in this article provides the details of the implementation of the cloud security
solution in the business. This service is capable of providing mobile working environment for the
Document Page
5CLOUD COMPUTING BASED SECURITY SOLUTION
employees. The article provides the trusted cloud providers who have been coordinating with the
business for the security solution. The author narrates the example of service providers such as
Microsoft azure, amazon web service, soft layer and Alert Logic. It investigates the requirements
of the cloud service in business and steps for ensuring the better functioning of the company. It
examines the field of use of IaaS, Paas and SaaS in the development of business.
The strength of this article is that it provides the in depth analysis of the cloud service
implementation in business. It uses tabular and graphical representation for explaining the
architecture which makes the article effective. The article is appropriate in providing the
examples of cloud service security provider. The report is precise and does not deviate by giving
any unnecessary facts and theories.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
In this article the author provides a detailed study on the barriers in adoption of cloud
services in an enterprise as a security solution. The paper is efficient in describing the attributes
or the factors in this context by focusing on reliability, connectivity, interoperability, and
changes in IT, economic values and the political challenges. The author evaluates the economic
process of organizations while opting for the cloud security. The paper provides the findings of
the Gartner which suggests that the cloud security solution business would be worth more than
150 billion dollar in next five years but the challenges of security would still be a prevailing
issue.
The paper provides the signs of using secondary data as the data shows the instances of
using collection of data from various sources. The strength of the paper is its efficiency in
Document Page
6CLOUD COMPUTING BASED SECURITY SOLUTION
explaining all the attributes which seems as challenges. The author does not use any survey data
and therefore it cannot be held much reliable. The author is capable of providing the
recommendations in this article for ensuring the cloud computing service for security solution.
Despite of lacking at providing data from survey, the paper can be considered as effective in
analyzing the challenges faced by the enterprises in cloud services.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of
personal health records in cloud computing using attribute-based encryption. IEEE
transactions on parallel and distributed systems, 24(1), 131-143.
In this article the author describes the about the secured implementation of cloud security
solution in the healthcare. The article demonstrates the security with the help of attribute based
encryption. The author examines the implications of outsourcing the personal health care record
system by the healthcare industry. It discusses the risk of scalability and exposure of privacy in
adopting the cloud security. The adoption of measure in providing cloud services for security is
explained by the author in this article. The author suggest attribute based encryption of
scalability and security.
This paper shows the sign of primary source of data and it is reliable. The strength of the
article is that it provides all the aspects of the implementation of the cloud service based security
model. The article is precise and the author does not use any difficult approach for explaining the
situation. The weakness of this article is that the author fails to provide the mitigating process or
any further recommendation in context to use of attribute based encryption of cloud computing.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CLOUD COMPUTING BASED SECURITY SOLUTION
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), 40-50.
This paper explains the security management system which is based on the cloud
computing. In this article the author is concerned about the network security and network attacks.
The author describes the basic concepts of the collaborative network security system. It explains
the implementation of the system design and addresses the concept of traffic prober which is
responsible for recording the internet traffic. This article also summarizes the Botnet structure
and the cloud storage model. Thus it can be said that this paper is efficient in discussing the
concept of the network security and management in the cloud based security solution.
This article shows the signs of secondary data collection method. It is only responsible
for dealing with the theoretical aspects of the network security in cloud service. The weakness of
this article is that the author fails to provide the practical implications of network security and
also lacks at providing the examples of the organizations dealing with the same. The strength of
this article is that the author is not deviating from the central idea of the article and this article is
capable of providing the relevant content.
Ora, P., & Pal, P. R. (2015, September). Data security and integrity in cloud computing
based on RSA partial homomorphic and MD5 cryptography. In Computer, Communication
and Control (IC4), 2015 International Conference on (pp. 1-6). IEEE.
The author in this article explains the concept of RSA holomorphic algorithm and MD5
hashing algorithm. The central idea of this article is to provide a discussion on the data integrity
and security in the cloud computing based security solution. The author is concerned about
Document Page
8CLOUD COMPUTING BASED SECURITY SOLUTION
describing the approaches utilized by focusing on the encryption, decryption, hashing and
verification. The article is capable of verifying the encryption, decryption, key generation and
padding with the help of mathematical equations.
This article efficiently provides the explanation in the favor of partial homomorphism and
MD5 method of data security. The article is precise and the author does not use any difficult
approach for explaining the topic. The weakness of this article is that the author fails to provide
the mitigating process or any further recommendation in context to use of partial holomorphic
algorithm for data security.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud
computing using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
The author in this article aims at providing the mitigation strategies for the
implementation of the cloud computing services. The article explains the five security concerns
and explain each of the concerns in detail. The author explains the mitigation process with the
help of various algorithms such as RSA, AES, DES and Blowfish algorithm. The author uses the
concept of authentication, security and data encryption.
The strength of this article is that it is capable of addressing the security concerns and
providing all the mitigation strategies relevant to this concerns. The author does not deviate from
the central theme of the article and provides a precise introduction to each of the mitigation
strategies. This can be considered as positive point for this article. The weakness of the article is
that it lacks at providing the examples and instances of implementation of these mitigation
strategies.
Document Page
9CLOUD COMPUTING BASED SECURITY SOLUTION
Aljawarneh, S. (2013). Cloud security engineering: Avoiding security threats the right way.
In Cloud Computing Advancements in Design, Implementation, and Technologies(pp. 147-
153). IGI Global.
In this article the author explains the methods for tackling the security threats prevailing
in the implementation of cloud computing service. There is a need for the outsourcing solution to
be secured. The author investigates the reason of security threat as the shortage of the cloud
environment. The author describes the models of SaaS, PaaS and IaaS in context to solving the
security threats in each of the service model. The author suggests in this article that the security
threat is more appropriately available for the users of public service model.
The strength of this article is that the source of the article is reliable and the article is
precise. The author is capable of explaining the risks prevalent in different service model. This
increases the reliability of the article and its demonstrating efforts. The weakness of this article is
that it fails to provide the outcomes of relevant survey either primary or secondary in nature.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CLOUD COMPUTING BASED SECURITY SOLUTION
Task 2
As per the plagiarism report there are 0% plagiarism in this annotated bibliography. The
plagiarism report shows that the content is 100% unique. There are 34 unique sentences in this
paper. The plagiarism is checked for first 800 words of this annotated bibliography on the topic
of cloud computing services based on security solutions. This shows the uniqueness and
reliability of the project provided. The plagiarism scan report is attached as the evidence of the
performance of task 2 and it is true for the attached report. The number of plagiarized sentence is
found to be zero. Thus it can be concluded that this paper is efficient plagiarism free.
Document Page
11CLOUD COMPUTING BASED SECURITY SOLUTION
Bibliography
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Aljawarneh, S. (2013). Cloud security engineering: Avoiding security threats the right way.
In Cloud Computing Advancements in Design, Implementation, and Technologies(pp.
147-153). IGI Global.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Bo, K. S. (2018). Cloud Computing for Business. IJASRE, 4.
Calabrese, B., & Cannataro, M. (2015). Cloud computing in healthcare and
biomedicine. Scalable Computing: Practice and Experience, 16(1), 1-18.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), 40-50.
Document Page
12CLOUD COMPUTING BASED SECURITY SOLUTION
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal
health records in cloud computing using attribute-based encryption. IEEE transactions
on parallel and distributed systems, 24(1), 131-143.
Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing
security. International Journal on Recent and Innovation Trends in Computing and
Communication, 1(1), 36-39.
Ora, P., & Pal, P. R. (2015, September). Data security and integrity in cloud computing based on
RSA partial homomorphic and MD5 cryptography. In Computer, Communication and
Control (IC4), 2015 International Conference on (pp. 1-6). IEEE.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on
fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014
16th International Conference on (pp. 485-488). IEEE.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]