Report: Analysis of Cloud Computing Security Research Paper
VerifiedAdded on 2022/11/17
|7
|1912
|406
Report
AI Summary
This report provides a comprehensive analysis of a research paper titled "An Approach to Enhance Security of Cloud Computing Services using Software Engineering Model." The report begins by outlining the intention and content of the article, focusing on the importance of security and privacy in cloud computing and the need for effective security models. It then examines the research methods employed, which involve a systematic qualitative analysis of existing research papers. The findings highlight the security issues associated with different cloud service models and the challenges of designing effective security models, including incorporating the human aspect. The authors propose a cloud life cycle model based on a software engineering approach, although the report notes the lack of empirical validation. The report concludes by emphasizing the significance of data security and privacy in cloud computing and the challenges in designing flexible and scalable security models. It also underscores the importance of incorporating human aspects to enhance the application of the security model, ultimately aiming to provide effective and efficient cloud services.

Running head: ANALYSIS OF RESEARCH PAPER
ANALYSIS OF RESEARCH PAPER
Name of student
Name of university
Author’s note:
ANALYSIS OF RESEARCH PAPER
Name of student
Name of university
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
ANALYSIS OF RESEARCH PAPER
Table of Contents
Introduction:...............................................................................................................................2
Discussion:.................................................................................................................................2
The intention and content of the article:................................................................................2
The research method:.............................................................................................................3
Findings of the research:........................................................................................................3
Problems or issues highlighted by the authors:......................................................................4
Discussion on result:..............................................................................................................4
Conclusion of the research:....................................................................................................4
Conclusion:................................................................................................................................5
References:.................................................................................................................................6
ANALYSIS OF RESEARCH PAPER
Table of Contents
Introduction:...............................................................................................................................2
Discussion:.................................................................................................................................2
The intention and content of the article:................................................................................2
The research method:.............................................................................................................3
Findings of the research:........................................................................................................3
Problems or issues highlighted by the authors:......................................................................4
Discussion on result:..............................................................................................................4
Conclusion of the research:....................................................................................................4
Conclusion:................................................................................................................................5
References:.................................................................................................................................6

2
ANALYSIS OF RESEARCH PAPER
Introduction:
This report analyses a research paper titled “An Approach to Enhance Security of Cloud
Computing Services using Software Engineering Model”.
The purpose of the report is to investigate security requirements of the cloud computing and
identify methods of securing cloud computing services. In this context, the research paper
that is selected will be analysed in details to provide a comprehensive idea regarding cloud
computing security strategies that ensures that ensures that the cloud computing security is
effective and efficient as well.
The report first evaluates the intention and content of the article to obtain a comprehensive
idea regarding the content of research article. Then the report discusses about the research
method that the authors have considered for this article. Along with this findings of the
research is described as well. The report then studies problems or issues highlighted by the
authors and discussion on result is also analysed in details in this context. Then it describes
conclusion of the research to identify scope of future research as provided by the authors in
the article in this context.
Discussion:
The intention and content of the article:
The intention of the article is to describe the importance of security and privacy in the context
of cloud computing and also justify why it is important to ensure that the application of cloud
computing is effective and efficient as well. The main purpose of the article is not to provide
some literary discussion on cloud security methods, but to provide effective models to
implement security models.
The article has first described about different cloud services and these services are classified
into SaaS, DSaaS, IaaS and PaaS. In terms of features, these services are different from each
other and provide different benefits to the consumers [1]. SaaS for example, provide software
as service, IaaS provides infrastructure as services, PaaS provides as services. As these
services are different, their security requirements and security techniques are different as
well. Along with these cloud computing as described in the article deploys different service
delivery models which include private cloud, public cloud, community cloud and hybrid
cloud [2]. The article describes these cloud computing deployment models in details. Private
cloud is a dedicated cloud service and only a particular organizations is allowed to access
ANALYSIS OF RESEARCH PAPER
Introduction:
This report analyses a research paper titled “An Approach to Enhance Security of Cloud
Computing Services using Software Engineering Model”.
The purpose of the report is to investigate security requirements of the cloud computing and
identify methods of securing cloud computing services. In this context, the research paper
that is selected will be analysed in details to provide a comprehensive idea regarding cloud
computing security strategies that ensures that ensures that the cloud computing security is
effective and efficient as well.
The report first evaluates the intention and content of the article to obtain a comprehensive
idea regarding the content of research article. Then the report discusses about the research
method that the authors have considered for this article. Along with this findings of the
research is described as well. The report then studies problems or issues highlighted by the
authors and discussion on result is also analysed in details in this context. Then it describes
conclusion of the research to identify scope of future research as provided by the authors in
the article in this context.
Discussion:
The intention and content of the article:
The intention of the article is to describe the importance of security and privacy in the context
of cloud computing and also justify why it is important to ensure that the application of cloud
computing is effective and efficient as well. The main purpose of the article is not to provide
some literary discussion on cloud security methods, but to provide effective models to
implement security models.
The article has first described about different cloud services and these services are classified
into SaaS, DSaaS, IaaS and PaaS. In terms of features, these services are different from each
other and provide different benefits to the consumers [1]. SaaS for example, provide software
as service, IaaS provides infrastructure as services, PaaS provides as services. As these
services are different, their security requirements and security techniques are different as
well. Along with these cloud computing as described in the article deploys different service
delivery models which include private cloud, public cloud, community cloud and hybrid
cloud [2]. The article describes these cloud computing deployment models in details. Private
cloud is a dedicated cloud service and only a particular organizations is allowed to access

3
ANALYSIS OF RESEARCH PAPER
services that are hosted on the cloud platform and access to these services by other third party
organizations are not allowed [3]. In public cloud, the cloud services are accessed by average
consumers and it might be considered as a shared cloud service. In community cloud, a group
of different organizations, offering similar type of services access these cloud services.
Hybrid cloud is different from these three models as it combines features of public as well as
private cloud technology [8].
It is important to note that, as in private cloud, the service is only accessed by a specific
organization, it is more secure than the public cloud where cloud services are shared between
the consumers [4]. However, this does not mean that there is no requirement of applying
security techniques, compared to public cloud it is more secure, but still exploitable if proper
security strategies are not ensured [5]. However, in public and community cloud as several
parties access the same cloud service, it affects the data security and therefore, often not
considered where data security is considered as an important aspects of organizational
strategies [6].
According to the authors, although cloud computer is becoming increasingly popular,
security and privacy are still two important issues that affects the application of cloud
computing technology [7]. It is important to ensure that cloud services ensure data security as
it is related to organizational as well as consume privacy. In order to ensure that, proper
security model is required.
The research method:
The authors have considered systematic qualitative analysis of existing research papers and
findings that are provided in those research articles. The authors in reference to those
research papers have conducted extensive analysis to identify what are the security issues and
how different security models are proposed for enhancing the security of cloud services.
In reference to those analysis, the author has proposed a cloud security model that considers
different constraints of applying security techniques in cloud computing context.
Findings of the research:
The increasing popularity of cloud computing requires identification of security issues in
providing cloud services because it affects data security as well as data privacy. Different
cloud service models have different security issues and therefore, security models need to
consider this security issues for ensuring that the security model is effective and efficient as
well.
ANALYSIS OF RESEARCH PAPER
services that are hosted on the cloud platform and access to these services by other third party
organizations are not allowed [3]. In public cloud, the cloud services are accessed by average
consumers and it might be considered as a shared cloud service. In community cloud, a group
of different organizations, offering similar type of services access these cloud services.
Hybrid cloud is different from these three models as it combines features of public as well as
private cloud technology [8].
It is important to note that, as in private cloud, the service is only accessed by a specific
organization, it is more secure than the public cloud where cloud services are shared between
the consumers [4]. However, this does not mean that there is no requirement of applying
security techniques, compared to public cloud it is more secure, but still exploitable if proper
security strategies are not ensured [5]. However, in public and community cloud as several
parties access the same cloud service, it affects the data security and therefore, often not
considered where data security is considered as an important aspects of organizational
strategies [6].
According to the authors, although cloud computer is becoming increasingly popular,
security and privacy are still two important issues that affects the application of cloud
computing technology [7]. It is important to ensure that cloud services ensure data security as
it is related to organizational as well as consume privacy. In order to ensure that, proper
security model is required.
The research method:
The authors have considered systematic qualitative analysis of existing research papers and
findings that are provided in those research articles. The authors in reference to those
research papers have conducted extensive analysis to identify what are the security issues and
how different security models are proposed for enhancing the security of cloud services.
In reference to those analysis, the author has proposed a cloud security model that considers
different constraints of applying security techniques in cloud computing context.
Findings of the research:
The increasing popularity of cloud computing requires identification of security issues in
providing cloud services because it affects data security as well as data privacy. Different
cloud service models have different security issues and therefore, security models need to
consider this security issues for ensuring that the security model is effective and efficient as
well.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
ANALYSIS OF RESEARCH PAPER
According to the authors, although different security strategies are proposed by different
researchers, implementing those strategies is not that easy and for this proper security model
is required.
The research also finds that in designing security models, analysis of human aspect is an
important aspect which is often not considered in designing security models and therefore
need to analyse in details.
Problems or issues highlighted by the authors:
The authors have prospered for incorporating human aspect in designing cloud security
model and enhance the security features of the cloud applications. However, according to the
authors, the main challenges of incorporating human aspect into designing of security model
is to ensure trust among citizens who will access these services and incorporate a shared
culture while providing these services. According to the authors, the main challenge of
implementing shared culture is to define “shared leadership, shared goals and policy or
norms, administration of cloud services from on demand to retirement”. Another challenge
of designing effective cloud security model is to ensure that proper strategies are available for
cloud platforms that are consistent with security requirements. Along with this ensuring
flexibility and scalability of cloud platforms is another significant issue in this context. The
authors also specify that to implement the proposed cloud security model, it is required to
deploy an integrated cloud platform that provides the context for administrating the overall
cloud lifecycle diagonally, not only for in-house, but also for cloud assets that are fabricated
externally and this is what makes this process complex, although it is effective in ensuring
security of cloud services that are provided to the consumers.
Discussion on result:
The authors have proposed for the cloud life cycle model that will be implemented through
the software engineering approach. Three of the important aspects of modelling cloud
lifecycle as the cloud security model are actor, assets and their associated responsibility.
However, the authors have not implemented this model yet and therefore, they did not
provide any details regarding implementation of this model through proper experiment.
Therefore, this research paper lacks empirical validation and credibility of this model is not
ensured in this context.
ANALYSIS OF RESEARCH PAPER
According to the authors, although different security strategies are proposed by different
researchers, implementing those strategies is not that easy and for this proper security model
is required.
The research also finds that in designing security models, analysis of human aspect is an
important aspect which is often not considered in designing security models and therefore
need to analyse in details.
Problems or issues highlighted by the authors:
The authors have prospered for incorporating human aspect in designing cloud security
model and enhance the security features of the cloud applications. However, according to the
authors, the main challenges of incorporating human aspect into designing of security model
is to ensure trust among citizens who will access these services and incorporate a shared
culture while providing these services. According to the authors, the main challenge of
implementing shared culture is to define “shared leadership, shared goals and policy or
norms, administration of cloud services from on demand to retirement”. Another challenge
of designing effective cloud security model is to ensure that proper strategies are available for
cloud platforms that are consistent with security requirements. Along with this ensuring
flexibility and scalability of cloud platforms is another significant issue in this context. The
authors also specify that to implement the proposed cloud security model, it is required to
deploy an integrated cloud platform that provides the context for administrating the overall
cloud lifecycle diagonally, not only for in-house, but also for cloud assets that are fabricated
externally and this is what makes this process complex, although it is effective in ensuring
security of cloud services that are provided to the consumers.
Discussion on result:
The authors have proposed for the cloud life cycle model that will be implemented through
the software engineering approach. Three of the important aspects of modelling cloud
lifecycle as the cloud security model are actor, assets and their associated responsibility.
However, the authors have not implemented this model yet and therefore, they did not
provide any details regarding implementation of this model through proper experiment.
Therefore, this research paper lacks empirical validation and credibility of this model is not
ensured in this context.

5
ANALYSIS OF RESEARCH PAPER
Conclusion of the research:
The author has analyzed issues of cloud computing in terms of data privacy and data security.
Therefore, it helps in identifying what are the possible issues that might affect the application
cloud computing and providing services to the consumers, which helps in identifying security
aspects that should be considered for deigning effective security model. Not only this, this
research also helps in identifying what are the challenges of designing an effective cloud
security models and therefore it will help in designing an efficient cloud security model as
well.
Conclusion:
Cloud services are becoming popular as it offers advanced computing services in affordable
price. However, data security and data privacy are two important issues that need to be
considered in this context. As cloud services are provided through different service models,
there are different security issues associated with these models. Although private cloud is
secure than public cloud, it is still possible to exploit this service of proper security strategies
are not ensured. However, designing a cloud security is not easy as it need to consider various
aspects for example integrity of cloud platforms along with flexibility and scalability of cloud
platform are some of the important requirements for ensuing that the designed security model
is effective and efficient as well. Not only is that, incorporating human aspect into cloud
security model, an important strategy as it enhances the application of the security model.
However, for this it is required to enhance trust among the citizens and along with this
ensuing a shared environment is also an important requirement that needs to be considered as
well.
ANALYSIS OF RESEARCH PAPER
Conclusion of the research:
The author has analyzed issues of cloud computing in terms of data privacy and data security.
Therefore, it helps in identifying what are the possible issues that might affect the application
cloud computing and providing services to the consumers, which helps in identifying security
aspects that should be considered for deigning effective security model. Not only this, this
research also helps in identifying what are the challenges of designing an effective cloud
security models and therefore it will help in designing an efficient cloud security model as
well.
Conclusion:
Cloud services are becoming popular as it offers advanced computing services in affordable
price. However, data security and data privacy are two important issues that need to be
considered in this context. As cloud services are provided through different service models,
there are different security issues associated with these models. Although private cloud is
secure than public cloud, it is still possible to exploit this service of proper security strategies
are not ensured. However, designing a cloud security is not easy as it need to consider various
aspects for example integrity of cloud platforms along with flexibility and scalability of cloud
platform are some of the important requirements for ensuing that the designed security model
is effective and efficient as well. Not only is that, incorporating human aspect into cloud
security model, an important strategy as it enhances the application of the security model.
However, for this it is required to enhance trust among the citizens and along with this
ensuing a shared environment is also an important requirement that needs to be considered as
well.

6
ANALYSIS OF RESEARCH PAPER
References:
[1]"Concepts of Cloud Computing and Protection of Data in Cloud Computing", Computer
Engineering and Intelligent Systems, 2019. Available: 10.7176/ceis/10-4-01.
[2]"2018 Index IEEE Transactions on Cloud Computing Vol. 6", IEEE Transactions on
Cloud Computing, vol. 7, no. 1, pp. 1-14, 2019. Available: 10.1109/tcc.2019.2894083.
[3]W. Zeng and M. Koutny, "Quantitative Analysis of Opacity in Cloud Computing
Systems", IEEE Transactions on Cloud Computing, pp. 1-1, 2019. Available:
10.1109/tcc.2019.2894768.
[4]R. Kanimozhi, "Adaptive and intelligent framework of data protection techniques for
cloud storage", International Journal of Cloud Computing, vol. 8, no. 1, p. 50, 2019.
Available: 10.1504/ijcc.2019.097906.
[5]K. Paranjape and T. Guimaraes, "User support as moderator for cloud computing user
satisfaction", International Journal of Cloud Computing, vol. 8, no. 2, p. 150, 2019.
Available: 10.1504/ijcc.2019.10021221.
[6]R. kumar, "Cloud computing and security issue", International Journal Of Engineering
And Computer Science, 2016. Available: 10.18535/ijecs/v5i11.18.
[7]"Survey on Cloud Computing Security Algorithms", International Journal of Science and
Research (IJSR), vol. 5, no. 4, pp. 1865-1867, 2016. Available: 10.21275/v5i4.nov161684.
[8]M. Shahid and M. Sharif, "Cloud Computing Security Models, Architectures, Issues and
Challenges: A Survey", The Smart Computing Review, pp. 602-616, 2015. Available:
10.6029/smartcr.2015.06.010.
ANALYSIS OF RESEARCH PAPER
References:
[1]"Concepts of Cloud Computing and Protection of Data in Cloud Computing", Computer
Engineering and Intelligent Systems, 2019. Available: 10.7176/ceis/10-4-01.
[2]"2018 Index IEEE Transactions on Cloud Computing Vol. 6", IEEE Transactions on
Cloud Computing, vol. 7, no. 1, pp. 1-14, 2019. Available: 10.1109/tcc.2019.2894083.
[3]W. Zeng and M. Koutny, "Quantitative Analysis of Opacity in Cloud Computing
Systems", IEEE Transactions on Cloud Computing, pp. 1-1, 2019. Available:
10.1109/tcc.2019.2894768.
[4]R. Kanimozhi, "Adaptive and intelligent framework of data protection techniques for
cloud storage", International Journal of Cloud Computing, vol. 8, no. 1, p. 50, 2019.
Available: 10.1504/ijcc.2019.097906.
[5]K. Paranjape and T. Guimaraes, "User support as moderator for cloud computing user
satisfaction", International Journal of Cloud Computing, vol. 8, no. 2, p. 150, 2019.
Available: 10.1504/ijcc.2019.10021221.
[6]R. kumar, "Cloud computing and security issue", International Journal Of Engineering
And Computer Science, 2016. Available: 10.18535/ijecs/v5i11.18.
[7]"Survey on Cloud Computing Security Algorithms", International Journal of Science and
Research (IJSR), vol. 5, no. 4, pp. 1865-1867, 2016. Available: 10.21275/v5i4.nov161684.
[8]M. Shahid and M. Sharif, "Cloud Computing Security Models, Architectures, Issues and
Challenges: A Survey", The Smart Computing Review, pp. 602-616, 2015. Available:
10.6029/smartcr.2015.06.010.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.