Cloud Computing Assignment: A Journal Article Review
Select a peer reviewed journal article to prepare this cloud computing assignment concerning the concept of cloud computing and conduct a detailed journal article review.
Task 1: Article
M. A. Nadeem, “Cloud Computing: Security Issues and Challenges”, Journal of wireless communication, Vol. 1, No. 1, pp. 10-15, 2016.
Task 2: Summary and content of the article selected in this cloud computing assignment
Cloud computing refers to computing technology which is now used in the businesses in order to improve business effectiveness. Cloud computing provides a platform for evaluating and managing larger datasets and reducing complexity from business systems. Virtualization is a key part used in cloud computing for managing collected data over internet connections. Security is a leading challenge that enables the criminals to perform data breach-related problems and reduce the confidentiality of the sensitive data. For this research, a journal article is selected which is based on cloud computing security. The title of the chosen paper is “Cloud Computing: Security Issues and Challenges” where the writer Muhammad Aamir provided depth information about cloud computing and security issues .
The aim of the paper is to examine the security challenges and weaknesses that occur in the cloud-based servers. According to the writer, cloud-based networks deliver effective computing systems in order to access the datasets which are shared by the consumers. Virtualization is a significant technique used in cloud computing that enables consumers to transform their problems into services and reduce the problems in a significant manner. The presence of cloud computing reduces the security of data because it includes the internet connections where the criminals transfer larger unusual activities and malware signals that directly impact on the privacy of data.
The researcher reported that cloud computing is a kind of model used for allowing ubiquitous and on-demand computer technologies so that the users can access the stored data effectively . This research determined that security issues linked to the cloud networks may be partitioned into major 4 elements for example physical layer, virtualization layer, consumer layer, and service provider layer. The term vulnerability is a major problem associated with cloud computing that enables the criminals to perform hacking operations and reduce the security of the private details easily. The researcher examined that cloud computing included major 3 kinds of virtualization levels for example operating system level, application level, and hypervisor level.
The operating system level is mainly included for controlling and managing the communication systems and the application level is developed for running guest OS and managing performance-related issues. On the other side, the hypervisor level is a leading part of the cloud computing that enable the consumers to perform business operations using a VM monitor. In order to aware of readers, the writer provided information about cloud architecture and also proposed a table in order to describe the key elements of the cloud computing architecture . This paper examined that cloud-based services are obtained and accessed through internet connections where the hackers try to send unusual activities and malware signals in order to reduce security level and produce hacking problems. Most of the criminals initially gain IP addresses of the computing networks so that the malicious programs can be proposed as per the security measures used by the companies. So, it is common for hackers to transfer spam, fraud, and viruses to the servers and cloud computing is not much effective to automatically detect such risks and threats from the systems due to which data can be exploited by the hackers easily .
Task 3: methods used and findings
It is found herein b cloud computing assignment that the researcher provided theoretical information about cloud computing and its security concerns and included various research methods for completing the investigation. These research methods are described below:
It is a key part of the methodology that delivers a platform where the writers can propose effective structures and designs so that the investigation can be completed effectively. In this paper, the writer adopted qualitative design due to its capability to provide effective information in the research and manage research gaps effectively . Using a qualitative design, this investigation proposed effective plans or structures in order to achieve the proposed research objectives and goals. Therefore, using such design the writer managed research problems and improved the research quality in a significant manner.
The term research approach refers to the research method that has the potential to deliver effective research plans in order to complete the investigation effectively. Various kinds of approaches are included for example inductive and deductive approaches. For the chosen paper, the writer included the inductive approach because of their ability to provide in-depth analysis and maintain the level of quality. It is found that the deductive approach is not much effective that delivers brief information in the investigation and requires developing hypotheses. In this research, the inductive approach is used that did not require proposing hypotheses and helped to improve research quality.
Data collection is capable to allow the writers to obtain effective and larger datasets in the research and complete investigation in a significant manner. Numerous types of data are included in the research, for example, primary and secondary data. For the selected paper, secondary data is used because of their capability to maintain the research gaps and helped to provide theoretical information related to cloud computing and its security. A literature review is conducted that provided a way to review previous studies and papers published by the writers. Therefore, using a literature review the writer collected reliable and effective information in the research and achieved the proposed research goals.
Data analysis Data analysis helps the writers to get effective findings from the investigation. Various data analysis techniques are included for example statistical analysis, content analysis, SPSS tools, and many more. For the chosen paper, the content analysis technique is used because of their ability to review the collected data from the literature review and enabled them to obtain effective findings. Moreover, the Excel tool is used for proposing tables and diagrams related to cloud computing and its security concerns.
What are the findings obtained in this research on cloud computing assignment?
From this research, it is found that security is a key problem associated with the cloud networks where the presence of malware and spam can help criminals to access databases and perform hacking operations. This investigation shows that the lack of proper resources is a major risk factor producing security issues in cloud computing. In terms of effectiveness, the selected research methods are more reliable and effective that helped to manage research gaps and provided a way to complete the research with larger quality and in less time. According to the writer, cloud-based networks deliver effective computing systems in order to access the datasets which are shared by the consumers. Virtualization is a significant technique used in cloud computing that enables consumers to transform their problems into services and reduce the problems in a significant manner. It is found that the uses of encryption and cryptography programs are helpful for improving the security of cloud computing and reducing cyber-crimes.
Task 4: conclusions and opinions
It may be concluded herein cloud computing assignment that cloud computing is suitable for businesses but it is important to focus on the security concerns and manage cyber-crimes effectively. This research provided a review of security challenges and threats linked to the cloud servers. The conducted literature helped to obtain effective information and addressed the research gaps. According to the writer, cloud-based networks deliver effective computing systems in order to access the datasets which are shared by the consumers. Virtualization is a significant technique used in cloud computing that enables consumers to transform their problems into services and reduce the problems in a significant manner.
In order to aware of readers, the writer provided information about cloud architecture and also proposed a table in order to describe the key elements of the cloud computing architecture. This paper examined that cloud-based services are obtained and accessed through internet connections where the hackers try to send unusual activities and malware signals in order to reduce security level and produce hacking problems. According to my opinion, the writer provided depth information about cloud computing architecture and security challenges but it is significant to highlight various cyber-crimes and attacks that occur in the cloud networks so that readers can improve their knowledge about security attacks. Moreover, the writer included effective research methods that helped to attain research objectives but added only theoretical and secondary data that affected the findings of the research. Overall, the paper selected in this context of cloud computing assignment provided complete information and future research will manage these issues and will describe effective mitigation techniques again cyber-crimes and security issues.
. M. A. Nadeem, “Cloud Computing: Security Issues and Challenges”, Journal of wireless communication, Vol. 1, No. 1, pp. 10-15, 2016.
. S., Singh, Y.S. Jeong and, J.H., Park. “A survey on cloud computing security: Issues, threats, and solutions”, Journal of Network and Computer Applications, vol. 75, no. 6, pp.200-222, 2016.
. S., Basu, A., Bardhan, K., Gupta, P., Saha, M., Pal, M., Bose, K., Basu, S. Chaudhury and P., Sarkar, “Cloud computing security challenges & solutions-A survey,” In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), vol. 6, no. 4, pp. 347-356, 2018.
. D. Alsmadi and V., Prybutok, “Sharing and storage behavior via cloud computing: Security and privacy in research and practice,” cloud computing assignment Computers in Human Behavior, vol. 85, no. 6, pp.218-226, 2018.
. N., Amara, H. Zhiqui and A., Ali, “Cloud computing security threats and attacks with their mitigation techniques”, In 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), vol. 6, no. 4, pp. 244-251, 2017.