Cloud Computing and Network Security

  • 60,000+ Completed Assignments

  • 3000+ PhD Experts

  • 100+ Subjects

Question:

Discuss about the Cloud Computing and Network Security.

Answer:

Introduction

Cloud computing! The term is referred to a model for enabling on demand network and convenient access to shared pool of computing resource networks including the servers, networks, applications, storage and services. The significance of cloud computing is in minimizing the efforts related to management and service provider interaction. It refers to both the applications and hardware and software system that helps in delivering services in the datacenters over the internet. Cloud computing helps in reducing the capital costs and providing better infrastructure management facilities by focusing on core competencies and the ability to offer on demand services to computing. Network security is one of the major concerns which the users have been facing while using the cloud services. Data loss, information security, service quality, economic, and interoperability issues are also posing some serious challenges. The shape of cloud computing is developing rapidly. However, there are some serious challenges and issues related to the security of cloud computing which need to be resolved such that to provide its customers a safer and secured service in the future.

Problem statement

There are challenges related to the privacy issues in cloud computing which has been an area of interest for most of the researchers. Why? The network interconnecting any system in a cloud needs to be secured. Data security, resource allocation and memory management networks involve the encryption of data which helps in encoding the confidential information which are then, fed into the data sharing channel for the purpose of sharing. Any loop hole in the data security system might make the confidential information to be vulnerable to the outsiders.

What are the challenges? There are various security issues for cloud computing as it incorporates various technologies including databases, networks, virtualization, operating system, transaction management, resource scheduling, memory management, load balancing and concurrency control. Thus, the security issues for most of these technologies are applicable to cloud computing. Thus, strong authentication is required for any cloud deployment.

Motivation of the research

Cloud computing has been transforming the way the IT is being managed. The technology promises improved costs efficiency, faster time to time market, accelerated innovation, and the ability to scale applications on demand. Cloud computing has been able to provide substantial benefits in reality that seemed to be requiring huge capital costs previously. Now, as the shape of cloud computing is developing and emerging rapidly both in reality and conceptually, the security and privacy issues still pose considerable challenges. Thus, in order to secure the future trends in the cloud computing deployment, a research is to be conducted for identifying the challenges and finding an effective solution to mitigate the same.

Significance of the research

The research process would be helping in the identification of the major security issues related to the cloud computing. It also helps in finding out appropriate solutions for the several issues and concerns before the adoption of the cloud computing paradigm. The safer cloud computing technology would be providing the users a control over the data or performance of the applications according to their requirements. The research would also be enabling the business organizations to balance the cost of damages due to the security issues against the advantages of opting for cloud computing.

Findings of the researchers in the area

Cloud computing technology and its issues have been the main area of interest of various researchers who have provided valuable information about the same in their literature.  The cloud computing environment is comprised of six different areas which require substantial security attention. The six areas include: (i) “security data at rest”, (ii) “security data at transit”, (iii) user authentication. (iv) Separation of data related to different customers, (v) cloud regulatory and legal issues, and (vi) incident response. According to Li  et al. (2013), these areas require a cryptographic mechanism to address the legal and regulatory issues related to the cloud computing.

Objective of the research

The objectives of the research process are:

  • To find the potential issues and challenges related to the cloud computing
  • To find the adverse effect of the security issues on the performance of cloud applications
  • To find effective solutions for the issues and challenges such that to make the cloud technology to run in a more secured and efficient way

Materials and methods

The research strategy should be including both the primary data collection method incorporating the interview and survey. The consultation of the research methods should be based on the research questions being formulated in the research study. Moreover, the research study should be implementing the qualitative data collection technique which requires the conduction of the interview on the top executives of an organization implementing the cloud computing technology within its business environment. The selection of the respondents for the interview should be on the simple random sampling technique. The data being collected in the process should be analyzed by utilizing the analysis material including the tables, figures, graphs, and analysis software like SPSS.

Expected outcome

There are some serious challenges including the network security data loss, information and service quality, economic, and interoperability issues which have been posing some serious challenges related to the security of cloud computing which need to be resolved such that to provide its customers a safer and secured service in the future. The research study would be helping in determining the major security issues related to the cloud computing. The research would also be enabling the business organizations to balance the cost of damages due to the security issues against the advantages of opting for cloud computing. The safer cloud computing technology would be providing the users a control over the data or performance of the applications according to their requirements.

Timeline

Outline Number

Task Name

Duration

Start

Finish

Predecessors

1

Research proposal for impact of Cricket grounds on Australian Economy

85 days

Wed 6/22/16

Tue 10/18/16

 

1.1

   Selection of research topic

25 days

Wed 6/22/16

Tue 7/26/16

 

1.1.1

      Finding the research topic

3 wks

Wed 6/22/16

Tue 7/12/16

 

1.1.2

      Reviewing on the topic being selected

2 wks

Wed 7/13/16

Tue 7/26/16

3

1.2

   Literature review

10 days

Wed 7/27/16

Tue 8/9/16

4

1.2.1

      Reviewing different views on literature

1 wk

Wed 7/27/16

Tue 8/2/16

4

1.2.2

      Summarizing on the reviews

1 wk

Wed 8/3/16

Tue 8/9/16

6

1.3

   Implementation of the research

10 days

Wed 8/10/16

Tue 8/23/16

7

1.3.1

      Identification of the appropriate methodology suitable for the research process

1 wk

Wed 8/10/16

Tue 8/16/16

7

1.3.2

      Implementing the selected methodology

1 wk

Wed 8/17/16

Tue 8/23/16

9

1.4

   Data collection

10 days

Wed 8/24/16

Tue 9/6/16

10

1.4.1

      identification of primary and secondary sources

1 wk

Wed 8/24/16

Tue 8/30/16

10

1.4.2

      Implementing the appropriate data collection method

1 wk

Wed 8/31/16

Tue 9/6/16

12

1.5

   Data analysis

10 days

Wed 9/7/16

Tue 9/20/16

13

1.5.1

      Identifying appropriate tools and techniques for analyzing the data

1 wk

Wed 9/7/16

Tue 9/13/16

13

1.5.2

      Summarizing the findings of the analysis

1 wk

Wed 9/14/16

Tue 9/20/16

15

1.6

   Final report submission

1 mon

Wed 9/21/16

Tue 10/18/16

16

2

Literature review due

0 days

Tue 8/9/16

Tue 8/9/16

7

3

Data collection and analysis report due

0 days

Tue 9/20/16

Tue 9/20/16

16

4

Final Business Report thesis due

0 days

Tue 10/18/16

Tue 10/18/16

17

Table 1: Timeline for the research project

Source: Created by author

References

J. Carstensen, J. Morgenthal and B. Golden, Cloud Computing. Ely: IT Governance Publishing, 2012.

D. Petcu and J. Va?zquez-Poletti, European research activities in cloud computing. New Castle upon Tyne: Cambridge Scholars, 2012.

S. Pearson and G. Yee, Privacy and security for cloud computing. London: Springer, 2013.

K. Jackson, OpenStack Cloud Computing Cookbook. Birmingham: Packt Publishing, 2013.

R. Buyya, C. Vecchiola and S. Selvi, Mastering cloud computing. Waltham, MA: Morgan Kaufmann, 2013.

One of the finest academic solution providers in the UK, MyAssignmentHelp.co.uk, has introduced custom homework writing services that are specially designed to serve the specific requirements of various students. The experts at MyAssignmentHelp.co.uk are capable of handling all kinds of homework and provide the necessary homework help, no matter how complicated the topic is. We also guarantee on-time delivery of the order.

Why Student Prefer Us ?
Top quality papers

We do not compromise when it comes to maintaining high quality that our customers expect from us. Our quality assurance team keeps an eye on this matter.

100% affordable

We are the only company in UK which offers qualitative and custom assignment writing services at low prices. Our charges will not burn your pocket.

Timely delivery

We never delay to deliver the assignments. We are very particular about this. We assure that you will receive your paper on the promised date.

Round the clock support

We assure 24/7 live support. Our customer care executives remain always online. You can call us anytime. We will resolve your issues as early as possible.

Privacy guaranteed

We assure 100% confidentiality of all your personal details. We will not share your information. You can visit our privacy policy page for more details.

Upload your Assignment and improve Your Grade

Boost Grades