Bonanza Offer FLAT 20% off & $20 sign up bonus Order Now
Cloud computing! The term is referred to a model for enabling on demand network and convenient access to shared pool of computing resource networks including the servers, networks, applications, storage and services. The significance of cloud computing is in minimizing the efforts related to management and service provider interaction. It refers to both the applications and hardware and software system that helps in delivering services in the datacenters over the internet. Cloud computing helps in reducing the capital costs and providing better infrastructure management facilities by focusing on core competencies and the ability to offer on demand services to computing. Network security is one of the major concerns which the users have been facing while using the cloud services. Data loss, information security, service quality, economic, and interoperability issues are also posing some serious challenges. The shape of cloud computing is developing rapidly. However, there are some serious challenges and issues related to the security of cloud computing which need to be resolved such that to provide its customers a safer and secured service in the future.
There are challenges related to the privacy issues in cloud computing which has been an area of interest for most of the researchers. Why? The network interconnecting any system in a cloud needs to be secured. Data security, resource allocation and memory management networks involve the encryption of data which helps in encoding the confidential information which are then, fed into the data sharing channel for the purpose of sharing. Any loop hole in the data security system might make the confidential information to be vulnerable to the outsiders.
What are the challenges? There are various security issues for cloud computing as it incorporates various technologies including databases, networks, virtualization, operating system, transaction management, resource scheduling, memory management, load balancing and concurrency control. Thus, the security issues for most of these technologies are applicable to cloud computing. Thus, strong authentication is required for any cloud deployment.
Cloud computing has been transforming the way the IT is being managed. The technology promises improved costs efficiency, faster time to time market, accelerated innovation, and the ability to scale applications on demand. Cloud computing has been able to provide substantial benefits in reality that seemed to be requiring huge capital costs previously. Now, as the shape of cloud computing is developing and emerging rapidly both in reality and conceptually, the security and privacy issues still pose considerable challenges. Thus, in order to secure the future trends in the cloud computing deployment, a research is to be conducted for identifying the challenges and finding an effective solution to mitigate the same.
The research process would be helping in the identification of the major security issues related to the cloud computing. It also helps in finding out appropriate solutions for the several issues and concerns before the adoption of the cloud computing paradigm. The safer cloud computing technology would be providing the users a control over the data or performance of the applications according to their requirements. The research would also be enabling the business organizations to balance the cost of damages due to the security issues against the advantages of opting for cloud computing.
Cloud computing technology and its issues have been the main area of interest of various researchers who have provided valuable information about the same in their literature. The cloud computing environment is comprised of six different areas which require substantial security attention. The six areas include: (i) “security data at rest”, (ii) “security data at transit”, (iii) user authentication. (iv) Separation of data related to different customers, (v) cloud regulatory and legal issues, and (vi) incident response. According to Li et al. (2013), these areas require a cryptographic mechanism to address the legal and regulatory issues related to the cloud computing.
The objectives of the research process are:
The research strategy should be including both the primary data collection method incorporating the interview and survey. The consultation of the research methods should be based on the research questions being formulated in the research study. Moreover, the research study should be implementing the qualitative data collection technique which requires the conduction of the interview on the top executives of an organization implementing the cloud computing technology within its business environment. The selection of the respondents for the interview should be on the simple random sampling technique. The data being collected in the process should be analyzed by utilizing the analysis material including the tables, figures, graphs, and analysis software like SPSS.
There are some serious challenges including the network security data loss, information and service quality, economic, and interoperability issues which have been posing some serious challenges related to the security of cloud computing which need to be resolved such that to provide its customers a safer and secured service in the future. The research study would be helping in determining the major security issues related to the cloud computing. The research would also be enabling the business organizations to balance the cost of damages due to the security issues against the advantages of opting for cloud computing. The safer cloud computing technology would be providing the users a control over the data or performance of the applications according to their requirements.
Outline Number | Task Name | Duration | Start | Finish | Predecessors |
1 | Research proposal for impact of Cricket grounds on Australian Economy | 85 days | Wed 6/22/16 | Tue 10/18/16 | |
1.1 | Selection of research topic | 25 days | Wed 6/22/16 | Tue 7/26/16 | |
1.1.1 | Finding the research topic | 3 wks | Wed 6/22/16 | Tue 7/12/16 | |
1.1.2 | Reviewing on the topic being selected | 2 wks | Wed 7/13/16 | Tue 7/26/16 | 3 |
1.2 | Literature review | 10 days | Wed 7/27/16 | Tue 8/9/16 | 4 |
1.2.1 | Reviewing different views on literature | 1 wk | Wed 7/27/16 | Tue 8/2/16 | 4 |
1.2.2 | Summarizing on the reviews | 1 wk | Wed 8/3/16 | Tue 8/9/16 | 6 |
1.3 | Implementation of the research | 10 days | Wed 8/10/16 | Tue 8/23/16 | 7 |
1.3.1 | Identification of the appropriate methodology suitable for the research process | 1 wk | Wed 8/10/16 | Tue 8/16/16 | 7 |
1.3.2 | Implementing the selected methodology | 1 wk | Wed 8/17/16 | Tue 8/23/16 | 9 |
1.4 | Data collection | 10 days | Wed 8/24/16 | Tue 9/6/16 | 10 |
1.4.1 | identification of primary and secondary sources | 1 wk | Wed 8/24/16 | Tue 8/30/16 | 10 |
1.4.2 | Implementing the appropriate data collection method | 1 wk | Wed 8/31/16 | Tue 9/6/16 | 12 |
1.5 | Data analysis | 10 days | Wed 9/7/16 | Tue 9/20/16 | 13 |
1.5.1 | Identifying appropriate tools and techniques for analyzing the data | 1 wk | Wed 9/7/16 | Tue 9/13/16 | 13 |
1.5.2 | Summarizing the findings of the analysis | 1 wk | Wed 9/14/16 | Tue 9/20/16 | 15 |
1.6 | Final report submission | 1 mon | Wed 9/21/16 | Tue 10/18/16 | 16 |
2 | Literature review due | 0 days | Tue 8/9/16 | Tue 8/9/16 | 7 |
3 | Data collection and analysis report due | 0 days | Tue 9/20/16 | Tue 9/20/16 | 16 |
4 | Final Business Report thesis due | 0 days | Tue 10/18/16 | Tue 10/18/16 | 17 |
Table 1: Timeline for the research project
Source: Created by author
J. Carstensen, J. Morgenthal and B. Golden, Cloud Computing. Ely: IT Governance Publishing, 2012.
D. Petcu and J. Va?zquez-Poletti, European research activities in cloud computing. New Castle upon Tyne: Cambridge Scholars, 2012.
S. Pearson and G. Yee, Privacy and security for cloud computing. London: Springer, 2013.
K. Jackson, OpenStack Cloud Computing Cookbook. Birmingham: Packt Publishing, 2013.
R. Buyya, C. Vecchiola and S. Selvi, Mastering cloud computing. Waltham, MA: Morgan Kaufmann, 2013.
One of the finest academic solution providers in the UK, MyAssignmentHelp.co.uk, has introduced custom homework writing services that are specially designed to serve the specific requirements of various students. The experts at MyAssignmentHelp.co.uk are capable of handling all kinds of homework and provide the necessary homework help, no matter how complicated the topic is. We also guarantee on-time delivery of the order.
Upload your Assignment and improve Your Grade
Boost Grades