Вы находитесь на странице: 1из 3

TECHNOLOGICAL INSTITUTE OF THE PHILIPPINES

RUBRIC FOR RESEARCH PAPER


Name of Student______JANORAS, CANDY C. Section :___IT41FC3_________________________
Title / Topic : _______JOURNAL SYNTHESIS___________ Subject_____IT503__________________________

Outcome : Students will deliver effective oral presentations and demonstrate a command of the English language.

CRITERIA BEGINNER ACCEPTABLE PROFICIENT EXEMPLARY SCORE


1 2 3 4
Introduction There is no clear The introduction states the The introduction The introduction is
introduction of main topic main topic but does not states the main topic engaging, states the
and the structure of the adequately preview the and previews the main topic and previews
paper is missing structure of the paper structure of the paper the structure of the
paper.
Purpose The purpose or argument The central purpose or Clearly states the Clearly and concisely
is generally unclear argument is not consistently paper's purpose in a states the paper's
clear throughout the paper single sentence purpose in a single
sentence, which is
engaging, and thought
provoking
Content Central purpose or Information supports a Information provides Balanced presentation of
argument is not clearly central purpose or argument reasonable support relevant and legitimate
identified. Analysis is at times. Analysis is basic for a central purpose information that clearly
vague or not evident. or general. Reader gains or argument and supports a central
Reader is confused or may few insights. displays evidence of purpose of argument and
be misinformed a basic analysis of a shows a thoughtful, in-
significant topic. depth analysis of a
Reader gains some significant topic. Reader
insights. gains important insights
Organization The writing is not In general, the writing is The ideas are The ideas are arranged
logically organized. arranged logically, although arranged logically to logically to support the
Frequently, ideas fail to occassionally ideas fail to support the central purpose or argument.
make sense together. The make sense together. The purpose or argument. They flow smoothly
reader cannot identify a reader is fairly clear about They are usually from one point to
line of reasoning and loses what writer intends. clearly linked to each another and are clearly
interest other. For the most linked to each other. The
part, the reader can reader can follow the
follow the line of line of reasoning.
reasoning.
Grammar, Spelling, There are so manyerrors The writing has many There are occassional The writing is free or
Writing Mechanics that meaning is obscured. errors, and the reader is errors, but they don't almost free of errors.
(puntuation, italics, The reader is confused distracted by them represent a major
capitalixation, etc.) and stops reading distraction or obscure
meaning
Tone The tone is The tone is not consistently The tone is generally The tone is consistently
unprofessional. It is not professional or appropriate professional. For the professional and
appropriate for an for an academic research most part, it is appropriate for academic
academic research paper. paper. appropriate for an research paper.
academic research
paper.
Use of References References are seldom Although attributions are Professionally Compelling evidence
cited to support occassionally given, many legitimate sources from professionally
statetements statements seem that support claims legitimate sources is
unsubstantiated. The reader are generally present given to support claims.
is confused about the and attributions is for Attribution is clear and
source of information and the most part, clear fairly represented
ideas. and fairly
represented.
Quality of References There are no virtually no Most of the references are Although most of the References are primarily
sources that are from sources that are not references are peer-reviewed
professionally reliable. peer-reviewed and have professionally professional journals or
The reader seriously uncertain reliability. The legitimate, a few are other approved sources.
doubts the value of the reader doubts the accuracy questionable. The The reader is confident
material and stops of much of the material reader is uncertain of that the information and
reading. presented. the reliability if some ideas can be trusted.
of the sources.
Bibliography Done in the correct format Done in the correct format Done in the correct Done in the correct
with many errors. with some errors. Includes format with some format with some errors.
Includes 3 major 4 major references (e.g. errors. Includes 5 Includes more than 5
references(e.g. science science journal articles, major references (e.g. major references (e.g.
journal articles, books, but books but not more than science journal science journal articles,
not more than two internet two internet sites articles, books but books but not more than
sites. not more than two two internet sites
internet sites
Other Comments / Observations TOTAL SCORE

RATING = (TotalScore) x 100%


36
Evaluated by :
TECHNOLOGICAL INSTITUTE OF THE PHILIPPINES
QUEZON CITY
CTI003/ ITE503-CURRENT TRENDS AND ISSUES IN COMPUTING

Journal Synthesis
PRELIM

Student Name Candy C. Janoras Dr. Ma. Christina R. Aragon


Program: BSIT Adviser
Section: IT41FC3

Prelim Topics/Area of Research:

1. Cloud Computing
a. Security Issues and Solutions in Cloud Computing
b. Cloud Computing Challenges and Solutions
c. Secure Cloud Storage

Summary: Article 3: Secure cloud storage (2011), platforms


provide easy access to a to a companys high-
Article 1: Security Issues and Solutions in Cloud performance computing and storage infrastructure
Computing (2012), a Cloud computing, as one of the through web accommodations. We consider the
sultriest words in IT world, has drawn great attention. quandary of building a secure cloud storage
Theres carious IT companies develop cloud computing accommodation on top of a public cloud infrastructure
systems and cognate products to customers. However, where the accommodation provider is not thoroughly
there are still some difficulties for customers to adopt trusted by the customer. We describe, at a high caliber,
cloud computing, in which many security issues subsist, several architectures that accumulate recent and non-
because data for a customer is stored and processed in standard cryptographic primitives in order to achieve our
cloud, not in a local machine. This paper briefly goal. We survey the benefits such an architecture would
introduces cloud computing and its key concepts. In provide to both customers and accommodation providers
categorically, we intend to discuss security requisites and give an overview of recent advances in cryptography
and security issues involving data, application and incentivized concretely by cloud storage.
virtualization in cloud computing, as well as current
solutions to these issues. Journal Synthesis:

Article 2: Cloud computing and security issues in Based from the research this three articles Ive been
the cloud (2014), the global computing infrastructure is study that the cloud computing is an developing
rapidly moving towards cloud based architecture. computing model which emanates from grid
Recent developments in the field of could computing computing, distributed computing, parallel computing,
have immensely changed the way of computing as well virtualization technology, utility computing and other
as the concept of computing resources. In a cloud based computer technologies and it has more advantage
computing infrastructure, the resources are normally in characters such as sizably voluminous scale
someone else's premise or network and accessed computation and data storage, virtualization, high
remotely by the cloud users (Petre, 2012; Ogigau- expansibility, high reliability and low price
Neamtiu, 2012; Singh & jangwal, 2012). The term cloud accommodation. The security quandary of cloud
computing is rather a concept which is a generalized computing is very consequential and it can obviate the
meaning evolved from distributed and grid computing. rapid development of cloud computing. This paper
Cloud computing is described as the offspring of introduces some cloud computing systems and analyzes
distributed and grid computing by some authors (Che, cloud computing security quandary and its strategy
Duan, Zhang & Fan, 2011). While it is important to take according to the cloud computing concepts and
advantages of deploying it to expand the sectors, the characters. The data privacy and accommodation
security aspects in a cloud computing environment availability in cloud computing are the key security
remains at the core of interest. Cloud services and service quandary. Single security method cannot solve the
providers are being evolved which has resulted in a new cloud computing security quandary and many
business trend based on cloud technology. traditional and incipient technologies and strategies
must be used together for forfending the total cloud
computing system.
In the first article, the security issues involving data, References
application, and virtualization technologies and
solutions to these issues present. Cloud computing [1] Pengfei You, Yuxing Peng, Weidong Liu, and
system, particularly in the public cloud, users' data is Shoufu Xue. Security Issues and Solutions in Cloud
stored and processed. Users cannot control the cloud Computing, National University of Defense
structure that dealing with their data, which cause by Technology, Jiangsu Automation Research Institute,
threats to the data. These security issues about users' data Air Defense Forces Academy, CPLA, Zhengzhou,
are showed: Data Breach, It usually violates the users China, 2012.
security properties of data by integrity and
confidentially. Integrity, it refers to the users protecting
data from the unauthorized modification, fabrication or [2] Monjur Ahmed and Mohammad Ashraf
removal. While the data from unauthorized deletion, Hossain. CLOUD COMPUTING AND SECURITY
modification or fabrication. While the confidentiality ISSUES IN THE CLOUD. Senior Lecturer, Daffodil
refers to the only authorize parties or systems that having Institute of IT, Freelance IT Consultant, Dhaka,
the ability to access the protected data. Bangladesh, 2013.
Second article, tell that the cloud computing is a
global computing infrastructure is speedily moving [3] Mahima Joshi, and Yudhveer Singh Moudgil.
towards cloud based architecture. While the important Secure cloud storage. Computer Science and
advantage of a cloud base computing is to deploy a Engineering Department & Uttaranchal Institute of
diversified sector, the security aspects in a cloud-based Technology, Dehradun, 2011.
computing environment remain at the core of interest.
The security is the most emphasized feature for any form [4] Storage Network Industry Alliance,
of computing, making it an obvious expectation that http://www.snia.org, 2011.
security issues are important for cloud environment as
well. As the cloud computing approach, the associate the [5] P. Mell and T. Grance, The NIST definition of
users' sensitive data stored both at clients' end as well as Cloud Computing, National Institute of Standards
in cloud servers, identity management, and and Technology (NIST),
authentication are very crucial in cloud computing. http://csrc.nist.gov/publications/nistpubs/800-
There is a need for advanced and extended technologies, 145/SP800-145.pdf, 2011.
concepts, and methods that provide a secure server
which leads to a secure cloud.
While in the third article, which the cloud
foundations can approximately categorize by private or
public. In a private cloud, the infrastructure was
managed and owned by the customer and located on
premise. In specific. While in a public cloud
infrastructure is owned and managed by a cloud service
provider and is located on premise. To secure the data
information of an organization by the cloud the used the
Encryption works. Whether the company wants to
protect their documents from potential identity thieves,
files should be locked down in case the company host
access, encrypting them is the only way to make sure
there is the only one with access to them. Another
problem that may arise from using a cloud storage
backup is security. You are essentially passing on
responsibility for the protection of the data to other
people and if these providers are not that careful about
the data that is being stored, it may find the backed up
data compromised. One solution to such an issue is to get
the source to make sure that the data is definitely secure
from security breaches.

The solution to this issue is a simple talk with the


provider and an assurance that should they anticipate
securing the business, that they inform the company
ahead of time and give an option for relocating the
company's backed up data to other sources. Another
option is to ask them to inform the company for closure
so it can get the company stored information and can find
other alternatives to their storage offerings.

Вам также может понравиться