cybersecurity final
DESCRIPTION
cloud security analysisTRANSCRIPT
![Page 1: CyberSecurity Final](https://reader036.vdocument.in/reader036/viewer/2022082713/55cf9237550346f57b94bbb3/html5/thumbnails/1.jpg)
The need for robust Cyber Security in the Cloud Computing Environment
![Page 2: CyberSecurity Final](https://reader036.vdocument.in/reader036/viewer/2022082713/55cf9237550346f57b94bbb3/html5/thumbnails/2.jpg)
Name: XXXXXXX
XXXXX
Articles Analysis # X
Date…..XXXX
Wang, D. (2014). Towards Robust and Effective Trust Management for Security: A
Survey.Trust, Security and Privacy in Computing and Communications (TrustCom), 13(2), 3-
7.
Based on research of Wang (2014), role of effective and robust trust management is crucial over
cyber security against key cloud applications. In general there are many security challenges over
cloud computing and most of them are addressed based on mutual trust among the organizations,
customers and third party cloud service providers. Author identified a research gap and discussed
in this article with respective to role of trust management over existing cyber-attacks in cloud
computing, as most of the issues are yet to be resolved. Each and every security problem
associated with cloud computing has the need of proper trust management by the respective
parties and thus author proposes further investigation and on the corresponding cyber-attacks and
thus reviewed few of the existing solutions to the security problems related to cloud computing
architecture. Key cyber security properties and attacks are considered while addressing the trust
management challenges, where the author proposed a propelling design solution for effective and
robust trust management over cloud computing. Trust management over cloud security could
address most of the challenges with the traditional security mechanisms against providing ample
cyber security.
![Page 3: CyberSecurity Final](https://reader036.vdocument.in/reader036/viewer/2022082713/55cf9237550346f57b94bbb3/html5/thumbnails/3.jpg)
Author concentrated on the traditional challenges associated with the traditional security
mechanism adopted to provide cloud computing security to defend the cyber-attacks. Based on
the recent studies discussed over the article most of the trust management models were built on
authentication, secured service and access control against the respective security problems
identified as a result cyber-attacks on cloud applications. Trust evaluation is done in this article
to find an effective solution in investigating the potential attacks on cloud computing architecture
and applications, where lot of efforts were discussed in proposing the desired trust management
design and solution.
A brief note on the existing work related to trust management system across the network system
like P2P, MANETs, VANETs and Wireless Sensor networks is given by the author. From the
respective contribution, the current research can be extended to the private, public and hybrid
cloud application like VoIP, multimedia and video conferencing application further. These
researches will rationale the future growth of cyber security constraints on cloud computing
challenges, where the proposed solution will can be used a key reference in proposing a more
robust and secured cloud platform. Mutual authentication, Privacy preservations and Global new
corner aspects reviewed over the current article can be laid as foundation for future research in
defending the cyber-attacks on cloud applications. Sophisticated service oriented, access rights
and privacy oriented cyber security architecture will be implemented based on the current article
contribution.