Cloud Computing Security Service
The central idea of this article is to provide a detailed introduction of Cloud computing security service. It describes cloud computing as the process for communication between the client and the server which uses internet infrastructure. The author suggests that cloud computing offers mainly three types of services to the users which can be categorized as IaaS, PaaS and SaaS. The author seeks to explain the attributes of the cloud computing security service. On the basis of a recent studies, the author suggests the use of cloud services has led to a reduction of 18% in the Budget of the IT companies.
This article provides a proper analysis of introduction to the cloud computing in order to understand the basic structure of cloud computing. It provides the signs of secondary statistical data being used and this can be considered as the weakness of this article. It does not provide any unnecessary discussion and it is capable of providing a precisely structured introduction. It can be considered as the strength of the article.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 485-488). IEEE.
The author in this article introduces homomorphism encryption algorithm for cloud computing data security solution. It describes the principle of the algorithm proposed by Craig Gentry. The paper is efficient in providing the various homomorphism properties such as decipherment algorithm and encryption algorithm. The author gives the verification of the relevant properties with the help of mathematical expressions. It provides the data from a reliable research institution IDC. It provides issues of cloud data security in context to the companies like Microsoft and Google.
The author uses a reliable source for the collection of data for this article. This article provides the facts and findings related to the cloud computing based security solution but fails to provide accurate data. The strength of the paper is that it explains and verifies the algorithms with the help of mathematical expressions making them more reliable. The author investigates the cloud service security with the help of example of the companies which increases the dependability on the article.
Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36-39.
This article aims at discussing the virtualization technique which is capable of providing security and isolation to the customers. The author describes virtualization as the technique for sharing the security risks through achieving the multi-tenant environment. The author effectively describes the Virtualization technique in order to obtain multi tenancy. It investigates the architecture of virtual appliance and virtual machine. The paper is efficient in providing the recent studies in context to the virtualization security. It demonstrates the findings of Gartner in year 2012 about the virtualization which indicates that about 60% virtual servers are expected to be comparatively less secured than the physical servers in the near future.
Homomorphism Encryption Algorithm for Cloud Computing Data Security Solution
This article provides an in depth analysis of the virtualization and multi tenancy in order to achieve the security in the cloud computing services. The author is efficient in investigating the topic with the help of facts and findings. The author uses a secondary source of data for providing the statistical evidence which decreases the reliability of the data provided. The author is capable of considering all the aspects of the virtualization while discussing the cloud computing security. This can be considered as the strength of this article.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
The author in this article discusses the concerns of security in the cloud computing service with the increase in the popularity of this services. The author provides the details of the confidentiality, integrity and privacy required for the cloud computing services. The author efficiently describes the four types of cloud deployment model which are private, public, community and hybrid model. It is capable of describing the field of application of the different cloud service providing models. The author also describes the categorization of the threats available to the cloud security services. It suggests the users and the organizations to outsource from the trusted third party services. The article s successful in providing the factors that the third party can use for being relied upon.
The article gives the signs of reliability in explaining all technologies and terminologies explained. It provides an in depth analysis of the data security and their requirements in cloud computing. This report does not provide any accurate data or survey results which hints that author may not have used primary and authentic data. This can be considered as the weakness of the article. The strength of this article is that it is precise and easy to understand.
Calabrese, B., & Cannataro, M. (2015). Cloud computing in healthcare and biomedicine. Scalable Computing: Practice and Experience, 16(1), 1-18.
In this article the author describes the implementation of cloud computing services based solution in the healthcare and biomedicine. Cloud computing is efficient in fulfilling the requirements of healthcare industry by providing them scalable computing. The author suggests that cloud services are capable of providing the sufficient network access, community tools and infrastructure of maintaining the healthcare industry. The author provides the implications of the increase in use of big data in healthcare. The author investigates that cloud solution allows a cost effective approach to bioinformatics in healthcare department.
Virtualization for Achieving Multi-tenancy
This report efficiently provides the data in the favor of cloud security in healthcare department. The data and statistics used in this report are secondary in nature as the data are taken from some different source. Thus it can be considered as a weakness of this report as the data can be from an unreliable source. The strength of report is that it discusses about the tools and platform used for cloud service in the healthcare. The report is appropriate while providing examples of company adopting the same process and gaining productivity rate.
Bo, K. S. (2018). Cloud Computing for Business. IJASRE, 4.
The author in this article provides the details of the implementation of the cloud security solution in the business. This service is capable of providing mobile working environment for the employees. The article provides the trusted cloud providers who have been coordinating with the business for the security solution. The author narrates the example of service providers such as Microsoft azure, amazon web service, soft layer and Alert Logic. It investigates the requirements of the cloud service in business and steps for ensuring the better functioning of the company. It examines the field of use of IaaS, Paas and SaaS in the development of business.
The strength of this article is that it provides the in depth analysis of the cloud service implementation in business. It uses tabular and graphical representation for explaining the architecture which makes the article effective. The article is appropriate in providing the examples of cloud service security provider. The report is precise and does not deviate by giving any unnecessary facts and theories.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
In this article the author provides a detailed study on the barriers in adoption of cloud services in an enterprise as a security solution. The paper is efficient in describing the attributes or the factors in this context by focusing on reliability, connectivity, interoperability, and changes in IT, economic values and the political challenges. The author evaluates the economic process of organizations while opting for the cloud security. The paper provides the findings of the Gartner which suggests that the cloud security solution business would be worth more than 150 billion dollar in next five years but the challenges of security would still be a prevailing issue.
The paper provides the signs of using secondary data as the data shows the instances of using collection of data from various sources. The strength of the paper is its efficiency in explaining all the attributes which seems as challenges. The author does not use any survey data and therefore it cannot be held much reliable. The author is capable of providing the recommendations in this article for ensuring the cloud computing service for security solution. Despite of lacking at providing data from survey, the paper can be considered as effective in analyzing the challenges faced by the enterprises in cloud services.
Concerns of Security in Cloud Computing Services
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.
In this article the author describes the about the secured implementation of cloud security solution in the healthcare. The article demonstrates the security with the help of attribute based encryption. The author examines the implications of outsourcing the personal health care record system by the healthcare industry. It discusses the risk of scalability and exposure of privacy in adopting the cloud security. The adoption of measure in providing cloud services for security is explained by the author in this article. The author suggest attribute based encryption of scalability and security.
This paper shows the sign of primary source of data and it is reliable. The strength of the article is that it provides all the aspects of the implementation of the cloud service based security model. The article is precise and the author does not use any difficult approach for explaining the situation. The weakness of this article is that the author fails to provide the mitigating process or any further recommendation in context to use of attribute based encryption of cloud computing.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50.
This paper explains the security management system which is based on the cloud computing. In this article the author is concerned about the network security and network attacks. The author describes the basic concepts of the collaborative network security system. It explains the implementation of the system design and addresses the concept of traffic prober which is responsible for recording the internet traffic. This article also summarizes the Botnet structure and the cloud storage model. Thus it can be said that this paper is efficient in discussing the concept of the network security and management in the cloud based security solution.
This article shows the signs of secondary data collection method. It is only responsible for dealing with the theoretical aspects of the network security in cloud service. The weakness of this article is that the author fails to provide the practical implications of network security and also lacks at providing the examples of the organizations dealing with the same. The strength of this article is that the author is not deviating from the central idea of the article and this article is capable of providing the relevant content.
Implementation of Cloud Security Solution in the Healthcare and Biomedicine Industry
Ora, P., & Pal, P. R. (2015, September). Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography. In Computer, Communication and Control (IC4), 2015 International Conference on (pp. 1-6). IEEE.
The author in this article explains the concept of RSA holomorphic algorithm and MD5 hashing algorithm. The central idea of this article is to provide a discussion on the data integrity and security in the cloud computing based security solution. The author is concerned about describing the approaches utilized by focusing on the encryption, decryption, hashing and verification. The article is capable of verifying the encryption, decryption, key generation and padding with the help of mathematical equations.
This article efficiently provides the explanation in the favor of partial homomorphism and MD5 method of data security. The article is precise and the author does not use any difficult approach for explaining the topic. The weakness of this article is that the author fails to provide the mitigating process or any further recommendation in context to use of partial holomorphic algorithm for data security.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.
The author in this article aims at providing the mitigation strategies for the implementation of the cloud computing services. The article explains the five security concerns and explain each of the concerns in detail. The author explains the mitigation process with the help of various algorithms such as RSA, AES, DES and Blowfish algorithm. The author uses the concept of authentication, security and data encryption.
The strength of this article is that it is capable of addressing the security concerns and providing all the mitigation strategies relevant to this concerns. The author does not deviate from the central theme of the article and provides a precise introduction to each of the mitigation strategies. This can be considered as positive point for this article. The weakness of the article is that it lacks at providing the examples and instances of implementation of these mitigation strategies.
Aljawarneh, S. (2013). Cloud security engineering: Avoiding security threats the right way. In Cloud Computing Advancements in Design, Implementation, and Technologies(pp. 147-153). IGI Global.
In this article the author explains the methods for tackling the security threats prevailing in the implementation of cloud computing service. There is a need for the outsourcing solution to be secured. The author investigates the reason of security threat as the shortage of the cloud environment. The author describes the models of SaaS, PaaS and IaaS in context to solving the security threats in each of the service model. The author suggests in this article that the security threat is more appropriately available for the users of public service model.
Cloud Computing Services Solution for Business
The strength of this article is that the source of the article is reliable and the article is precise. The author is capable of explaining the risks prevalent in different service model. This increases the reliability of the article and its demonstrating efforts. The weakness of this article is that it fails to provide the outcomes of relevant survey either primary or secondary in nature.
As per the plagiarism report there are 0% plagiarism in this annotated bibliography. The plagiarism report shows that the content is 100% unique. There are 34 unique sentences in this paper. The plagiarism is checked for first 800 words of this annotated bibliography on the topic of cloud computing services based on security solutions. This shows the uniqueness and reliability of the project provided. The plagiarism scan report is attached as the evidence of the performance of task 2 and it is true for the attached report. The number of plagiarized sentence is found to be zero. Thus it can be concluded that this paper is efficient plagiarism free.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Aljawarneh, S. (2013). Cloud security engineering: Avoiding security threats the right way. In Cloud Computing Advancements in Design, Implementation, and Technologies(pp. 147-153). IGI Global.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Bo, K. S. (2018). Cloud Computing for Business. IJASRE, 4.
Calabrese, B., & Cannataro, M. (2015). Cloud computing in healthcare and biomedicine. Scalable Computing: Practice and Experience, 16(1), 1-18.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.
Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36-39.
Ora, P., & Pal, P. R. (2015, September). Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography. In Computer, Communication and Control (IC4), 2015 International Conference on (pp. 1-6). IEEE.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 485-488). IEEE.