MITS5002 Assignment: Analyzing Security in Cloud Computing Systems

Verified

Added on  2023/03/17

|7
|431
|44
Report
AI Summary
This report provides a review of a journal article titled "Security in cloud computing: Opportunities and challenges." The paper investigates the security issues faced by cloud computing, focusing on risks and threats in cloud-based services. The authors highlight that cloud computing is widely used for data protection, but it is also linked to cyber-crimes. The study examines the intention of the paper, research methods, and key issues, including the impact of misconfiguration and internet connectivity on security. The research methods employed include a mixed research design, secondary data collection, and content analysis. The conclusion emphasizes the importance of security and control to prevent data breaches, suggesting the use of encryption and firewalls. The report summarizes the article's architecture and security issues and suggests methods for protecting personal data. This assignment is for MITS5002 Software Engineering Methodology.
Document Page
Cloud computing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
This study review a journal article based on the cloud
computing.
The title of paper is “Security in cloud computing:
Opportunities and challenges” [1].
The aim of this study is evaluate security issues
faced by cloud computing.
The identification of the paper focused on the
security risks and threats occurred in cloud based
services.
This study will cover several sections such as
intention of the paper, research methods, issues
highlighted by the authors, and conclusion.
Document Page
Intention and content of the paper
The authors identified that the cloud computing
is now used in many companies for protecting
data or information of consumers from hackers.
Internet is one of the common processes which
are used by consumers while accessing cloud-
based services but it is also linked with the
cyber-crimes and security breaches.
The security is one of the common problems
which hamper the widespread adoption of
cloud computing technique [2].
Document Page
Research methods
After analysing the research article it is
identified that the authors used various kinds
of research methods which includes:
Mixed research design
Secondary type of data collection technique
Content analysis process for analysing the obtained
data and information.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Issues highlighted by the authors
The authors highlighted that security and
privacy is one of the common problems linked
with cloud computing.
Use of misconfiguration and lack of control
enhance the level of security risks and
threats.
The cloud based services used internet
connectivity which also produce malicious
and other security risks in cloud computing.
Document Page
Conclusion
This journal paper is based on the cloud computing
and the authors identified the risks factors linked
with cloud based services.
It is concluded that lack of security and control can
lead the problem of data breach in cloud computing.
The authors critically reviewed the architecture and
security issues occurred in the case of cloud
computing.
It is suggested that users should protect their
personal data by using encryption and firewall
related security tools in cloud computing.
Document Page
References
1. M., Ali, S.U. Khan and, A.V., Vasilakos,
“Security in cloud computing: Opportunities
and challenges,” Information sciences, vol.
305, no. 7, pp.357-383, 2015.
2. D. Zissis and, D., Lekkas, “Addressing cloud
computing security issues,” Future
Generation computer systems, vol. 28, no. 3,
pp.583-592, 2012.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon