Cloud Computing Assignment: The Journal Article Review
Question
Task: You are asked to read a peer-reviewed article from a scholarly journal in the field of Advance Networking and Communication Systems and prepare a cloud computing assignment. The selected article is “Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework”?
Answer
Summary and discussion on the article utilized to develop this cloud computing assignment
Cloud computing and security has been focused and detailed in numerous articles including an article of Nabeel Khan and Adil Al-Yasin. Concerning the details mentioned in the article it can well be claimed that enhancement of cloud computing has been overtaken by business entities or organizations for outsourcing their entire information and technology process [3]. It also has helped such organizations towards increasing of productivity and creative innovations while forwarding services towards their client’s and other consumers. The journal also mentions that inducing the process and the technologies of cloud computing organization’s and business entities can cuddle down cost IT infrastructure without diminishing the vision of their business targeting major consumers [3]. The study examined in the segments of cloud computing assignment has been precisely conductive leading towards a better understanding of future technologies, privacy and security factors each of them aligned with Cloud computing. The article also focuses on the challenges and constraints Cloud computing encounters while functioning for organizations besides the benefits it is enriched with. Security issues if could be encountered might prove quite successful for companies as because it will upheave the smooth flow of their business processes [3].
Cloud computing brings around a phase of renaissance into the world of computers. The demand of resources and their availability are quite flexible through cloud computing. Yet into the dilemmas if cloud computing security proves to be a major threat. Such threats proves fatal towards users as because they result in loss of personal data and private data’s alongside leakage of high regarded privacy. Yet contrast to the article Cloud computing is focused as one of the most convenient sources of data storage securing information and deliverable services provided throughout the internet [3]. Cloud computing is also inhaled with a lot more of specific attributes and thus is much more spectacular than of traditional technologies. Among the major specific fields of technology Cloud computing results to be one such variable that requires high amount of attention. The article has been encompassed with the varied security threats that Cloud computing possess via varied delivery models such as a software and a service. The article has also been focused upon highlighting other identified risk factors that summon towards enlarged challenges.
Methods and findings
The authors of the regarded article prolonged towards undertaking varied data collecting methods to implement sustainable information towards the research. The authors have also delved towards a wide study of the previous researches gathering information of varied attributes of Cloud computing and its numerous privacy problems [1]. The research has helped in acknowledging the significance and usefulness of cloud computing related to its measures upon the business world. Secondary research method has been utilized by the authors in regard towards accumulating data upon the factors of Cloud computing. The secondary research initiated has been quite enhancing towards accumulating of data regarded into the study of varied journals, articles and magazines [2]. Yet one of the major drawback of a secondary research is figuring out the relevance of the mentioned data’s formulating arguments based on the authenticity of the research. Yet assuming that the researchers have used the secondary data, which are highly relatable and reliable. This emphasizes major focus on the research objectives. The research on cloud computing assignment has also been based upon a contrast and compares policy between various works of different researches invoking better-stimulated data for the research purpose. The research has also been facilitated with certain frameworks of cloud computing strategies.
Besides the use of secondary data collection method, the authors have initiated quantitative analysis for acknowledging the study. There seems other factors, which too has been utilized such as interviews of small business outlets, cloud developers and suppliers for ascertaining relevant information. Even though the research has been focused through a secondary data collection method, a primary study leads to the concernment of relevant and first-hand information. Research objectives should also be comprehended with potential sample size data gathered by the researchers. Precise analysis should also be undertaken for gathering appropriate data and evaluating it with the requirements. Aside all such variables the research has also induced a structured guideline for SMEs to perform a deliberate study based upon the objectives. This has also helped in mitigating the cloud adoption challenges among SMEs. Feedbacks have also been accumulated from the concerned SMEs via reflective frameworks based upon the proposed frameworks. To avoid the chance of redundancy the authors overtook transcription based upon the collected articles. Dilemmas and themes have also been acknowledged about the use of Cloud computing in small business outlets. The functioning has been superfluous towards inducing wider understating of Cloud comput8ing and its numerous challenges.
The findings of such precise research beholds that organizations have quite been beneficial towards conducting efficient study with regards to the use of Cloud computing under varied business operations. Yet there summons numerous other constraints such as privacy and security issues while adopting of Cloud computing technology. The research has also been quite successful in identifying the other related issues and future challenges of Cloud computing [2]. One of the most precise threats that Cloud computing can induce is service hijacking initiated by weak credentials alongside with social engineering. Such factors leads to manipulation and interpretation of sensitive and systematic data as well as redirection of transactions. With these random effects every single layer of Cloud computing is been affected such as IaaS, SaaS and PaaS. Besides such factors there rises another constraint know as data scavenging which formulates fatalities in the world of Cloud computing. Data scavengers recovers data from unused devices of users. Data colocation is the main reason behind the activities of data scavengers [5]. A prolonged study claims that users often neglect or impound less concentration upon deleted data which hovers random opportunities for data scavengers to collect such information and reuse it for miscellaneous purpose.
Conclusion
The study build in this cloud computing assignment has been optimized with certain elaborations leading towards an effective understating of Cloud computing along with its security threats and obstacles. In regards to my opinion, the research has been highly successful in asserting the benefits associated with Cloud computing which organization’s needs to regard in order to enhance business growth. The study has also been significant into propounding related factors and security issues that Cloud computing induces to encounter risk factors into future perspectives [5]. The threats related to Cloud computing also regards in affecting of other service models. The article has been quite helpful for precise organizations in referring towards the numerous constraints Cloud computing induces while advocating the technology for organizational growth. With better knowledge of these risk factors, organizations and entrepreneurs can initiate vulnerabilities to avoid risks in business.
With acute research, it has been claimed that data processing endures several constraints and leads to damage or leakage of data when processing, storing and sending of data variables are not done correctly. Such issues are mainly endured when data is stored or processed by a weak third party transfer as well as there lies weak separation of data and ascertaining of data under a plain text [3]. The IaaS attributes of data is highly affected when data leakages takes place leading to non-calculated locations and reallocations via virtual machine transfer. Besides such facts there are also notable challenges that organizations faces due to Cloud computing. These factors are denial of service, customer data manipulation, VM escape, VM hopping, malicious VM creation, insecure VM migration and spoofing virtual networks. Thus based on all such evidences it can well be assumed that potential risks are induced into Cloud computing and thus incurs miscellaneous threats towards organizations. Certain other constraints too formulates higher risk factors towards the functioning of a business entity such as hypervisor viruses, eaves dropping, virtual machine security, legal interception, trusted transaction, smartphone data slinging, insecure APIs and shared technology vulnerabilities [4]. The research on cloud computing assignment has indicated upon the functioning of the SMEs and has claimed that the services offered to them should be much upgraded. The services infused for the SMEs should be more pondered into the area of offering software and infrastructure with the utilization of Cloud computing. Acknowledging these threats of Cloud computing organizations can adopt modifications into the technological process thus stimulating business growth and productivity. Yet according to the studies that I have negotiated in there are other certain scopes that is to be regarded before adopting of any technological changes or modifications into the Cloud computing process [4]. The research has helped me to well evolve with my understating of Cloud computing and its numerous constraints as well as focused upon the understating of how organizations can uplift walls encountering such problems. There summons to be a major research gap throughout the propaganda presented and that is the lack of any specified theory or solution. The authors have disintegrated the article as it lacks of a specified theory or solution for organizations towards comprehending with technological changes and adopting Cloud computing. I induced a sound understating of the threats, constraints and varied security issues related to Cloud computing and the factors, which could be initiated to encounter such.
References
[1] A. Botta, W. De Donato. V. Persico and A. Pescape, “Integration of cloud computing and internet of things: a survey,” Future generation computer systems, vol. 56, pp. 684-700., 2016.
[2] M. Ali, S.U. Khan and A.V. Vasilakos, “Security in cloud computing: Opportunities and challenges,” Information sciences, vol. 305, pp. 357-383, 2015.’
[3] N. Khan and A. Al-Yasiri, “Identifying cloud security threats to strengthen cloud computing adoption framework,” cloud computing assignment Procedia Computer Science, vol. 94, pp.485-490, 2016.
[4] C. Stergiou, K.E. Psannis, K.E. Kim and B. Gupta, “Secure integration of IoT and cloud computing,” Future Generation Computer Systems, vol. 78, pp. 964-975, 2018.
[5] I.A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani and S.U. Khan, “The rise of “big data” on cloud computing: Review and open research issues.,” Information systems,, vol. 47, pp. 98-115., 2015.