logo

Data Security in Cloud Computing Systems

   

Added on  2020-04-01

12 Pages2956 Words40 Views
 | 
 | 
 | 
Applied research 1Security of the data securityNameCourseProfessorSchoolCityDate
Data Security in Cloud Computing Systems_1

Applied research 2Table of ContentsTable i: The table highlights the reorganization of the literature that is collected..................4Table ii: The summary of reviewed technology...........................................................................9YFigure i: Framework of the methodology...................................................................................11YChapter 1 Methodolog1.1 Research problem and Reorganized Collected Literature1.1.1 Research problem statement........................................................................................21.1.2 Reorganized Collected Literature................................................................................31.2 Types of methodologies...........................................................................................................41.2.1 Compare and contrast of methodologies.....................................................................51.2. 2 Type of chosen methodology.......................................................................................61.3 Review, Analysis, and summary of existing methodologies.................................................61.3.1 Selection of sub problem...............................................................................................61.3.2 Analysis of the selected methodologies........................................................................61.3.3 Relevance of the research problem..............................................................................81.3.4 Summary of the reviewed technology..........................................................................81.4 Proposed methodology............................................................................................................91.4.1 Justification of the methodology..................................................................................91.4.2 Benefits and limitations of methodology.....................................................................91.4.3 Framework and Explanation.....................................................................................10References......................................................................................................................................11
Data Security in Cloud Computing Systems_2

Applied research 3Chapter 1 MethodologyThe intent behind this project 3 is determining on the methodology for the study. My study subject is security of the data on the cloud computing. In the task 2 I would do a literature evaluate and in this I would certainly examine the methods as well as the problems and try identifying on the appropriate solutions to the case issues. This assignment is divided into various tasks. The research is structured as follows. On the first assessment is to identify the research problems, And reorganize collected data. The other task would be to describe the methodology of the research as well as the type of the methodology which will be used for the research. Another taskwhich would be analyzed is the review of the existing methodologies this would be done throughselection of sub-problem, analysis and the relevance of the research problem. The last task wouldbe to propose the methodology by identification and justification, as well as benefits and limitations. 1.1 Research problem and Reorganized Collected Literature 1.1.1 Research problem statementThis research for my research is on the security of data on cloud computing. There are several research with regards to the security of the cloud computing (Kaufman, 2009). The major research focus has been the security techniques for protecting on the data in the cloud computing.There is also overview of the data security and the Privacy security concerns in the cloudcomputing. These are the major research article which my previous literature review focused on.My research encounters some problem which are related to various elements. The process of the data security in the cloud computing has various challenges (Kaufman, 2009). One of the major concern is the aspect of confidentiality. The question which could arise are all the cloud
Data Security in Cloud Computing Systems_3

Applied research 4computing technologies protected from the breach? There is need to carry out a security test which could be done to protect on the data from the malicious authorized users for example the cross-site scripting, but the issue which could arise is that do all organization do the security test. Other challenge is the aspect of integrity to offer the security to the data of the client. Moreover, the research has been faced with the aspect of availability which has been a significant issues when it comes to the downtime which has been facing my organization.1.1.2 Reorganized Collected LiteratureResearch Problem Sub-problem Collected Literature Problem 1 Sub-problem 1 Literature 1 Literature 2 ... Sub-problem 2 Protecting data Data Security in cloud computing(Venkata Sravan Kumar Maddineni Shivashanker Ragi,2011)Problem 2 Sub-problem n Security and privacy issues Problems in the processof Cloud Computing. (Deyan Chen & Hong Zhao,2012)(Almulla, Chon Yeun. 2010)Table i: The table highlights the reorganization of the literature that is collected1.2 Types of methodologiesQuantitative vs. qualitative
Data Security in Cloud Computing Systems_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Methodology for Privacy Preservation in Cloud Computing - Desklib
|15
|2898
|229

Security and Privacy in Intelligence Assistance: A Mixed Methods Approach to Analyzing Collaboration Challenges
|16
|2722
|140

Introduction to Research: Assignment-3 Methodology
|14
|2242
|163

Methodology for Research on the Effectiveness of Online Learning
|12
|2222
|118

Application of Natural Language Processing in Education: Methodology
|13
|2843
|158

Methodology of Fraud and Theft Detection using Data Mining
|13
|3105
|190