Wednesday, October 10, 2018

PB2A

Part 1
The academic discipline that I find most interesting is my major, Computer Engineering. The professor that I chose to go along with my major is Qiang Duan. Professor Duan has a Ph.D. in Electrical Engineering, a M.S, in Telecommunications and Electronic Systems and a B.S. in Electrical and Computer Engineering. Some of Professor Duan's research interests include data communications and computer networking, the next generation Internet, the service-oriented architecture and network-as-a-service, Cloud computing, and Web services.
Part 2
One of the topics that Professor Duan studies that I find very intriguing is next generation internet. I don't know what next generation internet is exactly but just the name of it draws my attention and makes me want to learn more about it. This would be my top option if I had to devote a long time studying something in this field but other options include cloud computing and service oriented architecture.
Part 3
How safe is all your personal information and data when using cloud computing from cyber attacks?
How safe is all your personal information while using cloud computing compared to using a personal computer?
Part 4
Security, Server, Storage, Privacy, Information, Data, Cloud, Cyber Attacks, Iphone, Safe
Part 5
  • Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing Cloud Computing Security Issues."Future Generation Computer Systems, vol. 28, no. 3, 2012, pp. 583-592.
  • Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in Cloud Computing: Opportunities and Challenges." Information Sciences, vol. 305, 2015, pp. 357-383.
  • Henry, Stefan, and Md L. ALI. "Cloud Computing Security Threats and Solutions." I-Manager's Journal on Cloud Computing, vol. 4, no. 2, 2017, pp. 1.
  • Ogigau-Neamtiu, Florin. "cloud Computing Security Issues." Journal of Defense Resources Management, vol. 3, no. 2, 2012, pp. 141-141.
  • Sudha, M. R. "Efficiency of Security Privacy in Cloud Computing." International Journal of Advanced Research in Computer Science, vol. 6, no. 8, 2015.






1 comment:

  1. I think your questions are very interesting, and I'm sure everyone thinks about how safe their information is everyday. Maybe you can narrow your search down to just social media or something, as opposed to the cloud as a whole.

    ReplyDelete