close
test_template

A Critical Literature Review on The Different Implementations of Cloud Computing

About this sample

About this sample

close

Words: 1439 |

Pages: 3|

8 min read

Published: Apr 11, 2019

Words: 1439|Pages: 3|8 min read

Published: Apr 11, 2019

This review is on the ‘Different Implementations of Cloud Computing’. When writing this review only certain topics were chosen. Through this review you will see implementations for the health industry, Multi-Source Multimedia technology, security and Network Service Providers. All of these areas have made major improvements and contributions to their specific industries, by reviewing old models of research and introducing new models of research and potential implementations. In terms of the health industry, the study reviewed proposes a new way to encrypt data of patients, to transfer it back and forth to their doctor. When reviewing Multi-Source Multimedia, it was found that researchers are trying to utilise the advantages of cloud computing and presented a two-tier data distribution system. For security there are various research papers reviewed, one of them identified how to improve biometric identification and another suggested how to improve the framework and protocols protecting smart devices. Overview of Literature This review consists of different academic journals and magazines from this year, to tackle the topic of ‘Different Implementations of Cloud Computing’. These journals and magazines are all from the year 2018, making them some of the most recent journals and magazines to tackle a broad range of areas. All of these journals and magazines were collected from IEEE.

'Why Violent Video Games Shouldn't Be Banned'?

The areas that will be covered range from security to improving current software architecture, each with accompanying brief summaries to explain what they’re about. Authors Year Paper Title Paper Summary Qinlong Huang, Wei Yue, Yue He, Yixian Yang 2018 Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing Increasing security surrounding the type of health data that is shared through different health social network services. Wei Zhang, Xinchang Zhang, and Huiling Shi 2018 MMCSACC: A Multi-source Multimedia Conference System Assisted by Cloud Computing for Smart Campus The paper is about improving on Multimedia Conference Systems technology through utilising centralised processing. ZEESHAN SIDDIQUI, OMAR TAYAN, AND MUHAMMAD KHURRAM KHAN 2018 Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols The paper is about testing the security of authentication in mobile phones, when utilising cloud computing. Jun Huang, Jinyun Zou, and Cong-Cong Xing 2018 Competitions Among Service Providers in Cloud Computing: A New Economic Model The paper is about bridging the gap between Cloud Service Providers (CSPs) and Network Service Providers (NPSs). LIEHUANG ZHU, CHUAN ZHANG, CHANG XU XIMENG LIU AND CHENG HUANG 2018 An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing The paper is about improving the security surround biometric identification by using an outsourcing scheme.

A research paper (Q. Huang, W. Yue, Y. He and Y. Yang 2018) from this year proposed, a new model for Profile Matching and sharing data securely, is introduced through Identity-based Broadcast Encryption (IBBE) to share data with doctors. The IBBE comes into play to set up preconditions for the doctors so they can then re-encrypt the data through Ciphertext and send it off through the cloud without leaking sensitive information. Through the Profile Matching mechanism in MHSN, equality tests are applied to patients’ data. IBBE is used by patients to allow them flexible access to their friends’ data. MHSN keeps the private data of patients preserved. In addition, Profile Matching helps keep costs down for patients. The analysis and evaluation of MHSN showed that it is a practical way in order to protect data and consequently a patient’s privacy. Multi-source Multimedia MMCSACC is a new model that is proposed in a research paper (W. Zhang, X. Zhang and H. Shi 2018), that takes on the challenge of designing a new technology that utilises the advantages of cloud computing. The system that is proposed takes you through the two-tier design and implementation process for MMCSACC. By utilising a data distribution model and taking into consideration the requirements of the multi-source multimedia conference system; they were then able to find the appropriate variable bandwidth model to use. They introduced the concept of data forwarding priority, to ensure that the distribution of data wasn’t compromised. The advantages of cloud computing’s centralised processing, was heavily utilised to accomplish this. In addition, they made sure to test that the MMCSACC was an achievable concept. The results in this research were experimental but still shows its merits, such as a high delivery ratio, better user experiences and better performance. This research really helps to push the limits of multimedia conferencing and cloud computing through utilising distributed application designs.

Security Improvements for Personal Identification Another influence of cloud computing, is on improving security identification. One type of improvement being implemented is ‘biometric identification’, which is starting to become widely used in different technologies. As cloud computing develops further, in order to bring down costs of large data, they want to completely move over to cloud storage. However, it was identified that it can lead to potential privacy issues for users. We see in this paper, a new more efficient model is proposed, to protect the privacy of biometric identification. It is described as “… the biometric to execute a biometric identification” (Zhu, Zhang, Xu, Liu and Huang 2018), which basically allows the owner of the database, to encrypt query data and submit it to the cloud. Secondly, the cloud services perform the identification procedures, over the encrypted database, which will then allow the owner to review the outcome. After a thorough analysis of the security of this new model, the data collected in this paper demonstrates that identification requests can still be forged and cause collusion with cloud services. However, when compared to previous protocols, the results still show the model is viable and can help to increase performance. Security Improvements for Smart Phones In this modern age, were we can freely access and transfer information, through different smart devices and network services, it has completely enveloped our lives.

This advancement has made it difficult for security professionals to keep up with the ever increasing breaches, compared to before when securing data wasn’t such a huge challenge. However, this increase and advancement in technology, has pushed the security professionals to improve their skills and have made it their primary task to better understand the world of data. Over the years there have been a lot of different studies, proposing different ideas on authentication and security, which were developed for smart phones and cloud computing technologies, with a lack of understanding and knowledge. On one hand, they have been good enough to address the various security issues in existing technology. However, the effort has not been enough as there exists many threats on the integrity of security, coherent authentication analysis and the lack of implementations of authentication scenarios; this makes it difficult for studies to be implemented correctly. The research paper (Siddiqui, Tayan and Khan 2018) that this study comes from, hopes to rectify that by taking an in depth look of security, through reviewing different authentication frameworks and protocols. This helps to shine light on various security threats and issues, by updating the services of smart phones and cloud computing. Through the use of graphs, they are able to summarise and demonstrate the authentication challenges, which are in need of further research.

The final results of this research is left open. It was able to identify the most recent authentication vulnerabilities, with all related threats and issues that needed to be addressed for further research, to help better secure cloud computing services and smart devices. A New Model for Service Providers Cloud Computing has opened up new research areas over the years, which is starting to change the relationship between Cloud Service Providers (CSPs) and Network Services Providers (NSPs). This increase in development has made even NSPs, start to move away from offering the traditional network services, to offering cloud services to their end users. Through the years we have seen many research papers, address the progress of the internal competition of CPSs and NSPs as separate entities. However, the research paper (Huang, Zou and Xing 2018) that this study comes from, delves into the issue of the lack of research done, on the competition they have between each other. This paper introduces a new model that can help to exemplify, using comprehensive analysis, as well as various numeric experiments that give credence to the new model. That this model can be applied, to model the competition between service providers in cloud computing.

Get a custom paper now from our expert writers.

Conclusion In this review were many examples of different implementations of cloud computing and how it’s expanding to so many different industries. Overall, we saw new models of study being introduced, that can further help to improve different industries efficiency in their service through cloud computing.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

A Critical Literature Review on the Different Implementations of Cloud Computing. (2019, April 10). GradesFixer. Retrieved April 19, 2024, from https://gradesfixer.com/free-essay-examples/a-critical-literature-review-on-the-different-implementations-of-cloud-computing/
“A Critical Literature Review on the Different Implementations of Cloud Computing.” GradesFixer, 10 Apr. 2019, gradesfixer.com/free-essay-examples/a-critical-literature-review-on-the-different-implementations-of-cloud-computing/
A Critical Literature Review on the Different Implementations of Cloud Computing. [online]. Available at: <https://gradesfixer.com/free-essay-examples/a-critical-literature-review-on-the-different-implementations-of-cloud-computing/> [Accessed 19 Apr. 2024].
A Critical Literature Review on the Different Implementations of Cloud Computing [Internet]. GradesFixer. 2019 Apr 10 [cited 2024 Apr 19]. Available from: https://gradesfixer.com/free-essay-examples/a-critical-literature-review-on-the-different-implementations-of-cloud-computing/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now