close
test_template

A Critical Literature Review on The Different Implementations of Cloud Computing

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 1439 |

Pages: 3|

8 min read

Updated: 16 November, 2024

Words: 1439|Pages: 3|8 min read

Updated: 16 November, 2024

Table of contents

  1. Introduction
  2. Overview of Literature
  3. Implementations in Health Industry
  4. Multi-Source Multimedia Technology
  5. Security Improvements
  6. Security Improvements for Smart Phones
  7. Service Providers and Cloud Computing
  8. Conclusion
  9. References

Introduction

This review focuses on the ‘Different Implementations of Cloud Computing’. The review specifically covers implementations in the health industry, Multi-Source Multimedia technology, security, and Network Service Providers. These areas have seen significant advancements and contributions to their respective fields by revisiting old research models and introducing new models and potential implementations. For the health industry, the study proposes a novel method to encrypt patient data for secure communication with doctors. In the realm of Multi-Source Multimedia, researchers are leveraging cloud computing advantages, presenting a two-tier data distribution system. The security section reviews various research papers, including one that enhances biometric identification and another that improves frameworks and protocols protecting smart devices.

Overview of Literature

This review examines different academic journals and magazines from 2018, addressing the topic of ‘Different Implementations of Cloud Computing’. These journals and magazines, sourced from IEEE, are among the most recent publications covering a wide range of areas.

Implementations in Health Industry

A research paper by Qinlong Huang, Wei Yue, Yue He, and Yixian Yang (2018) introduces a new model for secure Profile Matching and data sharing via Identity-based Broadcast Encryption (IBBE) in Mobile Healthcare Social Networks (MHSN). This model allows doctors to re-encrypt patient data using Ciphertext, ensuring data privacy during cloud transfer. The Profile Matching mechanism applies equality tests to patient data, enabling flexible access while preserving patient privacy. Moreover, Profile Matching reduces costs for patients. The analysis and evaluation of MHSN demonstrate its practicality in protecting data and privacy.

Multi-Source Multimedia Technology

The MMCSACC model, proposed by Wei Zhang, Xinchang Zhang, and Huiling Shi (2018), addresses the challenge of designing a new technology that exploits cloud computing advantages. This system involves a two-tier design and implementation process for a multi-source multimedia conference system. By utilizing a data distribution model and considering system requirements, the researchers identified the appropriate variable bandwidth model. They introduced data forwarding priority to maintain uncompromised data distribution, leveraging cloud computing's centralized processing. Experimental results highlight the model's merits, such as high delivery ratio, improved user experiences, and performance, pushing the limits of multimedia conferencing and cloud computing.

Security Improvements

Cloud computing significantly influences security identification, particularly biometric identification, which is increasingly used across technologies. As cloud computing evolves, it aims to reduce large data costs by transitioning to cloud storage, raising potential privacy concerns. A paper by Liehuang Zhu, Chuan Zhang, Chang Xu, Ximeng Liu, and Cheng Huang (2018) proposes a more efficient model to protect biometric identification privacy. This model enables database owners to encrypt query data for cloud submission, where identification procedures are performed on the encrypted database, allowing owners to review outcomes. Despite potential forgery and collusion risks, the model outperforms previous protocols, enhancing performance.

Security Improvements for Smart Phones

The modern era's information access and transfer through smart devices and network services have revolutionized our lives. This advancement challenges security professionals to keep pace with increasing breaches. Over the years, studies have proposed various authentication and security ideas for smartphones and cloud computing technologies, often lacking understanding and knowledge. While addressing existing security issues, these efforts are insufficient due to threats to security integrity, coherent authentication analysis, and implementation challenges. A study by Zeeshan Siddiqui, Omar Tayan, and Muhammad Khurram Khan (2018) hopes to address these issues by reviewing authentication frameworks and protocols, highlighting security threats and issues. Graphs demonstrate authentication challenges, necessitating further research.

Service Providers and Cloud Computing

Cloud computing has opened new research areas, altering the relationship between Cloud Service Providers (CSPs) and Network Services Providers (NSPs). This development encourages NSPs to transition from traditional network services to offering cloud services. While research has addressed CSPs and NSPs' internal competition, a paper by Jun Huang, Jinyun Zou, and Cong-Cong Xing (2018) explores the competition between these entities. The paper introduces a new model using comprehensive analysis and numeric experiments, exemplifying the competition between service providers in cloud computing.

Get a custom paper now from our expert writers.

Conclusion

This review presents various cloud computing implementations across diverse industries. New study models are introduced, enhancing industry efficiency through cloud computing. These advancements demonstrate the potential for cloud computing to revolutionize services and improve operational effectiveness across different sectors.

References

  • Huang, Q., Yue, W., He, Y., & Yang, Y. (2018). Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing. IEEE.
  • Zhang, W., Zhang, X., & Shi, H. (2018). MMCSACC: A Multi-source Multimedia Conference System Assisted by Cloud Computing for Smart Campus. IEEE.
  • Siddiqui, Z., Tayan, O., & Khan, M. K. (2018). Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols. IEEE.
  • Huang, J., Zou, J., & Xing, C.-C. (2018). Competitions Among Service Providers in Cloud Computing: A New Economic Model. IEEE.
  • Zhu, L., Zhang, C., Xu, C., Liu, X., & Huang, C. (2018). An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing. IEEE.
Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

A Critical Literature Review on the Different Implementations of Cloud Computing. (2019, April 10). GradesFixer. Retrieved November 19, 2024, from https://gradesfixer.com/free-essay-examples/a-critical-literature-review-on-the-different-implementations-of-cloud-computing/
“A Critical Literature Review on the Different Implementations of Cloud Computing.” GradesFixer, 10 Apr. 2019, gradesfixer.com/free-essay-examples/a-critical-literature-review-on-the-different-implementations-of-cloud-computing/
A Critical Literature Review on the Different Implementations of Cloud Computing. [online]. Available at: <https://gradesfixer.com/free-essay-examples/a-critical-literature-review-on-the-different-implementations-of-cloud-computing/> [Accessed 19 Nov. 2024].
A Critical Literature Review on the Different Implementations of Cloud Computing [Internet]. GradesFixer. 2019 Apr 10 [cited 2024 Nov 19]. Available from: https://gradesfixer.com/free-essay-examples/a-critical-literature-review-on-the-different-implementations-of-cloud-computing/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now