Literature Review Example Cloud Computing
Literature Review Example Cloud Computing
Writing a literature review on any topic can be a daunting task, but delving into the realm of cloud
computing adds another layer of complexity. As technology continues to advance at a rapid pace,
staying up-to-date with the latest research, theories, and applications in cloud computing becomes
increasingly challenging.
A literature review requires extensive research, critical analysis, and synthesis of existing literature to
provide a comprehensive overview of the current state of knowledge in a particular field. When it
comes to cloud computing, this entails navigating through a vast array of scholarly articles, journals,
conference papers, and books, each offering unique insights, perspectives, and methodologies.
One of the primary challenges in writing a literature review on cloud computing is the sheer volume
of available literature. With the exponential growth of research in this field, sifting through countless
sources to identify relevant and credible information can be overwhelming. Moreover, synthesizing
disparate findings and ideas into a coherent narrative requires careful attention to detail and
analytical prowess.
Additionally, the dynamic nature of cloud computing means that new developments and innovations
are constantly emerging. Keeping pace with these advancements while conducting a literature review
can be a formidable task, as it requires continuous monitoring of the latest research trends and
breakthroughs.
Given the complexity and time-consuming nature of writing a literature review on cloud computing,
many individuals and organizations opt to seek assistance from professional writing services. ⇒
StudyHub.vip ⇔ offers expert assistance in crafting literature reviews tailored to the specific needs
and requirements of clients. With a team of experienced writers well-versed in the field of cloud
computing, ⇒ StudyHub.vip ⇔ ensures high-quality, well-researched literature reviews that adhere
to academic standards and guidelines.
By entrusting your literature review to ⇒ StudyHub.vip ⇔, you can save time and effort while
ensuring that your review is comprehensive, insightful, and up-to-date. Whether you're a student,
researcher, or industry professional, ⇒ StudyHub.vip ⇔ provides the expertise and support needed
to navigate the complexities of writing a literature review on cloud computing.
Order your literature review today and let ⇒ StudyHub.vip ⇔ alleviate the burden of this
challenging task, allowing you to focus on other aspects of your research or academic endeavors.
With ⇒ StudyHub.vip ⇔, crafting a literature review on cloud computing has never been easier.
The identified challenges include three critical challenges such as: 'public cloud security concern',
'efficient management issue', and 'integration complexity'. The need of this review paper is to
provide the awareness of the current emerging technology which saves the cost of users. Different
authors have different views cloud technology in education sector. It promises to provide a flexible
IT architecture, accessible through internet for lightweight portable devices. However cloud
computing has potential risks and vulnerabilities. Othman, Cloud computing service composition: A
systematic literature review. Today cloud computing is utilized as a part of both mechanical field and
scholarly field. It is a new virtualization model for the quick provisioning of shared resources,
software, applications and services over the internet to fulfill the elastic demand of the customer with
minimum effort or interaction with the service provider. Cloud encourages its clients by giving
virtual assets by means of web. After study the existing approaches, issues and challenges are point
out during data processing over the cloud. The user can access the data from anywhere just with the
help of an internet connection. The mainstay point is that cloud computing means having a server
firm that can host the services for users connected to it by a network. This paper describes the cloud,
its challenges, evolution, attacks along with the approaches required to handle data on cloud. See
Full PDF Download PDF See Full PDF Download PDF Related Papers International Journal for
Research in Applied Science and Engineering Technology Cloud Computing: A Study of the Cloud
Computing Services Tajinder Kaur Download Free PDF View PDF Cloud Computing: Overview and
its Deployment Model IJERA Journal We live in the era of gigantic complexity. The paper presents
the cost savings and reduction in the level of difficulty in adopting a cloud computing Service
(CCS). To access this computing, the user should be authenticated through by providing their
identification credentials like Userid and password for security purposes. In the long run, this paper
comes to light to render the service modal, types of cloud computing: IaaS, PaaS, SaaS, ways of
cloud computing as well as advantages and disadvantages of Cloud Computing. It includes a
discussion of the main service model of cloud computing, the general deployment models, the
characteristics of Cloud computing and terminologies adopted in cloud computing. The practice of
using a network of remote servers hosted on the Internet to store, manage, and process data, rather
than a local server or a personal computer. Since there is no infrastructure investment requires, shrink
or expand the resources based on on-demand and the payment based on usage, it becomes popular
among different technology aspects. Lower fee, flexibility, the model of pay-as-you-go are the main
reasons, which caused the distributed computing are turned into reality. Cloud computing offers
dynamically scalable resources provisioned as a service over the Internet. However, cloud technology
is vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patient's
electronic health records and in these situations, security challenges in cloud computing environment
are a matter of challenge with rising usage of cloud technology. In particular, hybrid cloud, a
combination of both public and private clouds, offers benefits of both the public and private clouds.
Download Free PDF View PDF A Survey Paper on Security Challenges in Healthcare Cloud
Computing shalini g Cloud computing is the BuzzWord of today. Its business models like PaaS, SaaS
and IaaS have been some of the biggest changes in todays world impacting not only the computer
industry but also several other fields, one such is the health care. National Institute of Standards and
Technology, 2012. International Journal of Advanced Computer Science and Applications (IJACSA),
2016. 7(1). Cloud computing is used as data storage so data security and privacy issues such as
confidentiality, availability and integrity are important factor associated with it. As in cloud
computing environment data is out of client ownership this prompts extraordinary danger of
information trustworthiness, information secrecy and information weakness and so on.
This paper provides a survey on the achievable security merits by making use of multiple distinct
clouds simultaneously. Open source software enables IT to quickly build and deploy applications,
but at the cost of control and governance. We have further analysed the identified challenges with
respect to time and study strategy. Considering the increasing usage of cloud services by government
bodies poses an emerging threat to e-government and e-governance structures and continuity of
public services of national and local government bodies. It provides marketability, fidelity, coherence,
high-performance and adequately low-lying cost conceivable way out as compared to dyed-in-the-
wool infrastructure.Aloft the internet, it is the technology yielded in the form of service and these
services are furnished with the hardware system in the data centres.This paper gives the meticulous
outlining for cloud and focuses on the primarily outlook of Cloud Computing. This paper presents a
systematic review on different cloud security issues with their respective pros and cons and
imparting the existing methodologies done by the researchers for cloud security. Health care industry
is slowly moving towards cloud because of the benefits provided by cloud computing. Download
Free PDF View PDF Cloud Computing and Security Issues IJERA Journal Cloud computing has
become one of the most interesting topics in the IT world today. Cloud model of computing as a
resource has changed the landscape of computing as it promises of increased greater reliability,
massive scalability, and decreased costs have attracted businesses and individuals alike. Different
authors have different views cloud technology in education sector. Security and privacy are the key
issues for Cloud Computing and still face some huge challenges. However, cloud technology is
vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patient's
electronic health records and in these situations, security challenges in cloud computing environment
are a matter of challenge with rising usage of cloud technology. Organizations are pushing toward
cloud computing for getting advantage of its cost lessening and versatility highlights. The shift to
cloud is a landmark in the IT industry and has raised keen interest both from the industrial
community and academia. The need of this review paper is to provide the awareness of the current
emerging technology which saves the cost of users. One of real obstacle in moving to cloud
computing is its security and protection concerns. We have identified a list of ten challenges, by
extracting data from a sample of 120 papers, in the adoption of hybrid cloud. It simply states that
cloud computing means accessing, retrieving and fetching the data and programs over the internet
rather than the computer's hard disk. International Journal of Database Management Systems, 2013.
5(2): p. 1. Universities play an important role in development process of Nation. This paper describes
the cloud, its challenges, evolution, attacks along with the approaches required to handle data on
cloud. This is one of the most significant revolutions in Information Technology, after the emergence
of the Internet. Data security and privacy protection are the two main factors of user's concerns
about the cloud technology. Cloud computing provides tremendous opportunity for small and
medium scale enterprises to grow their business using IT services with zero deployment cost.
Download Free PDF View PDF A Survey Paper on Security Challenges in Healthcare Cloud
Computing shalini g Cloud computing is the BuzzWord of today. Cloud computing is used as data
storage so data security and privacy issues such as confidentiality, availability and integrity are
important factor associated with it. Various security models have been produced to adapt to these
security dangers. Cloud storage provides user to access remotely store their data so it becomes
necessary to protect data from unauthorized access, hackers or any type of modification and
malicious behavior. You can download the paper by clicking the button above. In the long run, this
paper comes to light to render the service modal, types of cloud computing: IaaS, PaaS, SaaS, ways
of cloud computing as well as advantages and disadvantages of Cloud Computing.
International Journal of Big Data Intelligence 5, 2014. 1(3): p. 127-140. To browse Academia.edu
and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
From this cloud computing environment, both resources and applications are provided through the
Internet as a service on demand. Download Free PDF View PDF A Survey Paper on Security
Challenges in Healthcare Cloud Computing shalini g Cloud computing is the BuzzWord of today.
Universities in India are dominant adopter of IT services. Motivational Interviewing for Health Care
Professionals: A Sensible Approach. This paper enhanced advance security goal for cloud data
storage. This triggered a lot of research activities, resulting in a quantity of proposals targeting the
various cloud security threats. The goal of this paper is to find out the advantages and disadvantages
of databases widely employed in cloud systems and to review the challenges in developing cloud
databases. Storage as a Service (SaaS) based applications are vulnerable to virus attacks.Online
operating systems are available on cloud to the user for free.Viruses can spread as attachments of
email, of part of the software or can stay in Master Boot Record (MBR) of the operating system
available on cloud. This study is to review different security techniques and challenges from both
software and hardware aspects for protecting data in the cloud and aims at enhancing the data
security and privacy protection for the trustworthy cloud environment. Cloud computing is clearly
one of the most enticing technology areas of the current times of computing and networking, at least
in part to its cost-efficiency and flexibility. The aim of this research is to find the ability and
possibility to implement the cloud computing in higher education of the KRG. To access this
computing, the user should be authenticated through by providing their identification credentials like
Userid and password for security purposes. Since there is no infrastructure investment requires,
shrink or expand the resources based on on-demand and the payment based on usage, it becomes
popular among different technology aspects. You can download the paper by clicking the button
above. This whitepaper will attempt to clarify these issues by offering a comprehensive definition of
cloud computing, and the business benefits it can bring. This paper provides a survey on the
achievable security merits by making use of multiple distinct clouds simultaneously. We have
followed all the SLR steps by developing SLR protocol first which was then validated and
implemented. Transparency is needed for regulatory reasons and to ease concern over the potential
for data breaches. As the field of cloud computing is spreading the new systems are creating. In
modern era of Information Technology, the accesses to all information about the important activities
of the related fields. Othman, Cloud computing service composition: A systematic literature review.
Cloud encourages its clients by giving virtual assets by means of web. IoT, industry 4.0, smart cities
and novel artificial intelligence (AI) applications that require devices to be connected in ever present
cloud platforms, provide an increasing wide range of potential zombie armies to be used in
Distributed Denial of Service (DDoS) attacks which are amongst the most critical attacks under
cloud computing environment. This complete process to find evidence in cloud environment is
known as cloud forensics. See Full PDF Download PDF See Full PDF Download PDF Related
Papers A Comparison of ECC and Improved ECC Algorithm for Cloud Security International
Journal of Scientific Research in Computer Science, Engineering and Information Technology
IJSRCSEIT Cloud computing is a distributed environment that encompasses thousands of computers
that work in parallel to perform a task in lesser time than the traditional computing models. Users
need to understand the risk of data breaches in the cloud environment. There are many challenges
also there for adopting cloud computing like well managed service level agreement (SLA), privacy,
interoperability and reliability. Health care industry is slowly moving towards cloud because of the
benefits provided by cloud computing.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds
to upgrade your browser. The resources can be dynamically allowing also for an optimum resource
by a pay-per-use model it means customized Service Level. Whenever, a task is distributed over web,
there encounters a series of potential threats that challenges the security of data such as buffer
overflow, session hijacking and black hole attacks. The user can access the data from anywhere just
with the help of an internet connection. Cloud storage provides user to access remotely store their
data so it becomes necessary to protect data from unauthorized access, hackers or any type of
modification and malicious behavior. Cloud Computing technology has witnessed significant
advances in its implementation and become widely adopted by either private or public sectors.
Considering the increasing usage of cloud services by government bodies poses an emerging threat
to e-government and e-governance structures and continuity of public services of national and local
government bodies. The paper highlights issues related to cloud computing. National Institute of
Standards and Technology, 2012. Othman, Cloud computing service composition: A systematic
literature review. The meaning of data storage security is to secure data on storage media. Cloud
computing offers dynamically scalable resources provisioned as a service over the Internet. Cloud
Computing holds the potential to eliminate the necessities for high quality infrastructure. Download
Free PDF View PDF A Survey Paper on Security Challenges in Healthcare Cloud Computing shalini
g Cloud computing is the BuzzWord of today. Adoption of cloud infrastructure promises enterprises
numerous benefits. MHE-KRG universities and institutions are confronting many challenges and
concerns in term of security, user privacy, lack of integration with current systems, and data and
documents ownership. In the cloud computing environment, it becomes particularly serious because
the data is located in different places even in all the globe. Cloud databases are essentially employed
for information-escalated applications, such as storage and mining of huge data or commercial data.
But there are also some security issues in cloud computing because data is stored on worldwide
platform. Technology has moved in this direction because of the advancement in computing,
communication and networking technologies. From this cloud computing environment, both
resources and applications are provided through the Internet as a service on demand. In modern era
of Information Technology, the accesses to all information about the important activities of the
related fields. The aim of this research is to find the ability and possibility to implement the cloud
computing in higher education of the KRG. Motivational Interviewing for Health Care Professionals:
A Sensible Approach. A survey has been conducted to evaluate the CC services that have been
applied to KRG universities have by using cloud computing services. One of real obstacle in moving
to cloud computing is its security and protection concerns. In the cloud computing environment the
Universities will not have to own the infrastructure so they can abstain from any capital expenditure
and instead they can utilize the resources as a service and pay as per their usage. International J. of
Computer Science Issues, 2012. 9(4): p. 77-83. As in cloud computing environment data is out of
client ownership this prompts extraordinary danger of information trustworthiness, information
secrecy and information weakness and so on. Clients should address all the identified challenges in
general and the critical challenges in particular.
Instead of only encryption or authentication, this paper suggests attribute based encryption and
attribute based authentication together, during communication over the cloud for achieving better
security. Despite the hype about the cloud, customers are reluctant to deploy their business in the
cloud. Storage as a Service (SaaS) based applications are vulnerable to virus attacks.Online operating
systems are available on cloud to the user for free.Viruses can spread as attachments of email, of part
of the software or can stay in Master Boot Record (MBR) of the operating system available on
cloud. In the long run, this paper comes to light to render the service modal, types of cloud
computing: IaaS, PaaS, SaaS, ways of cloud computing as well as advantages and disadvantages of
Cloud Computing. After study the existing approaches, issues and challenges are point out during
data processing over the cloud. In the cloud computing environment the Universities will not have to
own the infrastructure so they can abstain from any capital expenditure and instead they can utilize
the resources as a service and pay as per their usage. This expansion in cloud processing condition
likewise expands security challenges for cloud engineers. In modern era of Information Technology,
the accesses to all information about the important activities of the related fields. CC is an online
service can store and retrieve information, without the requirement for physical access to the files on
hard drives. The paper highlights issues related to cloud computing. Farhad Khalatbari Final
Research Project Cloud infrastructure for an Academic system Summary Shoaib Zama Download
Free PDF View PDF Cloud Computing: Secure and Scalable Data Access Security Models
Anupama Prasanth Cloud computing has built up itself as a standout amongst the most famous
advancements accessible presently. In particular, hybrid cloud, a combination of both public and
private clouds, offers benefits of both the public and private clouds. Our study aims at the various
security models that were produced for securing information. Universities play an important role in
development process of Nation. This complete process to find evidence in cloud environment is
known as cloud forensics. To browse Academia.edu and the wider internet faster and more securely,
please take a few seconds to upgrade your browser. This paper presents comprehensive study on the
issues and challenges related to security and privacy domain in cloud environment. Cloud computing
is clearly one of the most enticing technology areas of the current times of computing and
networking, at least in part to its cost-efficiency and flexibility. Download Free PDF View PDF See
Full PDF Download PDF Loading Preview Sorry, preview is currently unavailable. This is one of the
most significant revolutions in Information Technology, after the emergence of the Internet. The need
of this review paper is to provide the awareness of the current emerging technology which saves the
cost of users. It was obvious recently that a lot of organizations and enterprises are transferring their
workloads to the cloud. A cloud computing based services also face such kinds of security issues
where applications deployed on cloud can face same kind of attacks as that on client-server model.
This triggered a lot of research activities, resulting in a quantity of proposals targeting the various
cloud security threats. This paper presents a systematic review on different cloud security issues with
their respective pros and cons and imparting the existing methodologies done by the researchers for
cloud security. We have further analysed the identified challenges with respect to time and study
strategy. It includes a discussion of the main service model of cloud computing, the general
deployment models, the characteristics of Cloud computing and terminologies adopted in cloud
computing. The user can access the data from anywhere just with the help of an internet connection.
Transparency is needed for regulatory reasons and to ease concern over the potential for data
breaches. It promises to provide a flexible IT architecture, accessible through internet for lightweight
portable devices.
Othman, Cloud computing service composition: A systematic literature review. From this cloud
computing environment, both resources and applications are provided through the Internet as a
service on demand. Dr. AHMET EFE Cloud computing is the subject of the era and is the current
keen domain of interest of organizations due to its promising opportunities and catastrophic impacts
on availability, confidentiality and integrity. This article contains a review of technical literatures
relating security challenges and security issues of Cloud Computing. This information will help to
find new techniques to improve forensics process in cloud forensics. Various security models have
been produced to adapt to these security dangers. One of real obstacle in moving to cloud computing
is its security and protection concerns. Different authors have different views cloud technology in
education sector. In the end of this paper survey was conducted in different educational school,
academies and colleges where already implemented and some are under process. Stand-alone
applications have been replaced with electronic applications, committed servers with various
appropriate servers and devoted storage with system storage. Many attackers can use cloud services
to create vulnerability in the cloud system. In the cloud computing environment, it becomes
particularly serious because the data is located in different places even in all the globe. We have
identified a list of ten challenges, by extracting data from a sample of 120 papers, in the adoption of
hybrid cloud. International Journal of Big Data Intelligence 5, 2014. 1(3): p. 127-140. Instead of
only encryption or authentication, this paper suggests attribute based encryption and attribute based
authentication together, during communication over the cloud for achieving better security. In this
paper, we make a comparative research analysis of the existing research work regarding the data
security and privacy protection techniques used in the cloud computing. The paper highlights issues
related to cloud computing. It is a new virtualization model for the quick provisioning of shared
resources, software, applications and services over the internet to fulfill the elastic demand of the
customer with minimum effort or interaction with the service provider. Cloud computing has various
advantages i.e. reliability, cost effective, scalability, fault tolerance, backup. However, cloud
technology is vulnerable to cyber gaps that pose an adverse impact on the security and privacy of
patient's electronic health records and in these situations, security challenges in cloud computing
environment are a matter of challenge with rising usage of cloud technology. Having several
advantages cloud computing is a trending discipline which must be adopted by users so as to
increase optimized use of services in form of software, hardware and infrastructure which benefits to
the user or organization in form of cost effectiveness, reusability, choice making and change
management. Farhad Khalatbari Final Research Project Cloud infrastructure for an Academic system
Summary Shoaib Zama Download Free PDF View PDF Cloud Computing: Secure and Scalable
Data Access Security Models Anupama Prasanth Cloud computing has built up itself as a standout
amongst the most famous advancements accessible presently. Cloud computing increases optimized
use of resources such as servers, software and infrastructure. There are some forensics tools
implemented to find information about these attacks in cloud environment. Lower fee, flexibility, the
model of pay-as-you-go are the main reasons, which caused the distributed computing are turned into
reality. Thus cloud computing has become an interesting and increasingly essential trend. The paper
presents the cost savings and reduction in the level of difficulty in adopting a cloud computing
Service (CCS). Health care industry is slowly moving towards cloud because of the benefits provided
by cloud computing. This paper presents a systematic review on different cloud security issues with
their respective pros and cons and imparting the existing methodologies done by the researchers for
cloud security. Download Free PDF View PDF A New Approach for providing security mechanism
in cloud with possible solutions and results Sarvesh Kumar Download Free PDF View PDF See Full
PDF Download PDF Loading Preview Sorry, preview is currently unavailable.
Most of the Indian Universities have adopted the traditional usage of IT resources and have incurred
a heavy cost while implementing it. However, cloud technology is vulnerable to cyber gaps that pose
an adverse impact on the security and privacy of patient's electronic health records and in these
situations, security challenges in cloud computing environment are a matter of challenge with rising
usage of cloud technology. The paper highlights issues related to cloud computing. We have further
analysed the identified challenges with respect to time and study strategy. Different authors have
different views cloud technology in education sector. After study the existing approaches, issues and
challenges are point out during data processing over the cloud. To browse Academia.edu and the
wider internet faster and more securely, please take a few seconds to upgrade your browser. This
paper describes the cloud, its challenges, evolution, attacks along with the approaches required to
handle data on cloud. It simply states that cloud computing means accessing, retrieving and fetching
the data and programs over the internet rather than the computer's hard disk. IoT, industry 4.0, smart
cities and novel artificial intelligence (AI) applications that require devices to be connected in ever
present cloud platforms, provide an increasing wide range of potential zombie armies to be used in
Distributed Denial of Service (DDoS) attacks which are amongst the most critical attacks under
cloud computing environment. As more and more information of individuals and companies are
placed in the cloud, there is a growing concern about the safety of information. The Cloud
computing emerges as a new computing paradigm which aims to provide computation, software,
data access, and storage services that do not require end-user knowledge of the physical location and
configuration of the system that delivers the services. In addition Cloud Computing was predicted to
transform the computing world from using local applications and storage into centralized services
provided by organization. They highlighted the obstacles of current social databases in terms of
usability, flexibility, and provisioning. This triggered a lot of research activities, resulting in a
quantity of proposals targeting the various cloud security threats. Security issues is one of the biggest
concerns that has been affecting the growth of cloud computing.It adds complications with data
privacy and data protection continues to affect the market. Since there is no infrastructure investment
requires, shrink or expand the resources based on on-demand and the payment based on usage, it
becomes popular among different technology aspects. This study is to review different security
techniques and challenges from both software and hardware aspects for protecting data in the cloud
and aims at enhancing the data security and privacy protection for the trustworthy cloud
environment. It has increased much veneration, yet with fast usage of cloud computing, the security
factor has come to forefront. However, in the most recent years, there was a substantial conversion
in the IT industry in terms of commercial applications. Thus cloud computing has become an
interesting and increasingly essential trend. The aim is to show how services are deployed to the
internet users as well as organization via a medium or concept called as cloud. Whenever, a task is
distributed over web, there encounters a series of potential threats that challenges the security of data
such as buffer overflow, session hijacking and black hole attacks. This paper presents a detailed
review of Cloud Computing. You can download the paper by clicking the button above. But there
are also some security issues in cloud computing because data is stored on worldwide platform. The
identified challenges include three critical challenges such as: 'public cloud security concern',
'efficient management issue', and 'integration complexity'. Clients should address all the identified
challenges in general and the critical challenges in particular. The aim of this research is to find the
ability and possibility to implement the cloud computing in higher education of the KRG. We assert
that considering various kinds of DDoS attack tools, proactive capabilities, virtual connecting
infrastructures and innovative methods which are being developed by attackers very rapidly for
compromising and halting cloud systems, it is of crucial importance for cyber security strategies of
both national, central and local government bodies to consider pertinent pre-emptive
countermeasures periodically and revise their cyber strategies and action plans dynamically.