PhD TIM-Review Literature Related To Cloud Security

PhD TIM-Review Literature Related To Cloud Security

  • Huang, W., Ganjali, A., Kim, B. H., Oh, S., & Le, D. (2015). The State of Public Infrastructure-as-a-Service Cloud Security. ACM Computing Surveys (CSUR), 47(4), Article 68, 1-31.

http://dx.doi.org.proxy1.ncu.edu/10.1145/2767181

  • Ardagna, C. A., Asal, R., Damiani, E., & Vu, Q. H. (2015). From Security to Assurance in the Cloud: A Survey. ACM Computing Surveys (CSUR), 48(1), Article 2, 2-50.

http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=108810871&site=eds-live

  • Chhabra, S., & Dixit, V. S. (2015, March). Cloud computing: State of the art and security issues. ACM SIGSOFT Software Engineering Notes, 40(2), 1-11.

http://dx.doi.org.proxy1.ncu.edu/10.1145/2735399.2735405

  • Dahbur, K., Mohammad, B., & Tarakji, A. B. (2011). A Survey of Risks, Threats and Vulnerabilities in Cloud Computing. Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications (p. Article 12, pp. 1-6). New York, NY: ACM.

http://dx.doi.org.proxy1.ncu.edu/10.1145/1980822.1980834

Read the assigned resources pertaining to this week’s topics. Conduct a comprehensive literature search and review four additional peer-reviewed scholarly articles that provide sufficient background on the topics within the cloud computing security area. Write a thematically sorted, critical annotated bibliography of all articles in which you address the items below (for each work).

  • The work’s purpose
  • A concise summary of its contents
  • Its relevance to the topic
  • An analysis of the contribution’s unique characteristics
  • Your critical analysis of the study’s strengths and weaknesses

Each annotation should consist of at least 250 words, must be formatted properly, and must have a logical flow and transition between them. The final submission must contain a title page, table of contents, and reference list. Ensure an intuitive correlation and reference to any works other than those directly annotated that provide additional breadth and depth to the subject matter. Also, note that the analysis of the works should not focus on any challenges faced with the technologies’ implementation, development, or application as a technological analysis will be conducted in the following week. This annotated bibliography should provide sufficient background on the topic to provide a foundation for additional scholarly work.

Length: 8 annotations of approximately 250 words each

Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic.

 

 

Solution Preview

Annotated Bibliography

Ardagna, C. A., Asal, R., Damiani, E., & Vu, Q. H. (2015). From Security to Assurance in the             Cloud: A Survey. ACM Computing Surveys (CSUR), 48(1), Article 2, 2-50.

The article surveys the interface between cloud security and the cloud security assurance to the tenants that is, the service providers and the customers. By providing an overview of the cloud security mechanisms, the article evaluates its significance in the industry. Primarily, the article explores research projects and articles that evaluate the cloud computing security mechanisms as it is of significance to the tenants. While the service providers offer protection mechanisms that enable users to control their data and applications, the tenants are unable to assess the security risks and vulnerabilities. Besides, the employed cloud security is characterized by vast vulnerabilities such as on the application layer which can jeopardize the infrastructure. As such, the research community has been exploring means for improving cloud computing security to foster trust among the users by assuring them that their data is properly managed and protected.

(2,537 words)

Open chat
Hello
Contact us here via WhatsApp