logo

BCT APPLIED IN CLOUD COMPUTING

   

Added on  2022-09-09

13 Pages2314 Words21 Views
Running head: BCT APPLIED IN CLOUD COMPUTING
BCT Applied in Cloud Computing
BCT APPLIED IN CLOUD COMPUTING_1
BCT APPLIED IN CLOUD COMPUTING
1
Table of Contents
Introduction................................................................................................................................3
Rationale of the proposal...........................................................................................................3
Problem domain.....................................................................................................................3
Purpose and Justification........................................................................................................4
Research Questions....................................................................................................................4
Conceptual Framework..............................................................................................................5
Motivation..............................................................................................................................5
Significance of the research...................................................................................................5
Findings of the researchers.....................................................................................................6
Materials and Methodology.......................................................................................................6
Research methods...................................................................................................................6
Data collection methods.........................................................................................................6
Ethical issues of the proposal.................................................................................................7
Compliance Requirements.....................................................................................................7
Solution of security problems................................................................................................7
Procedures of the research.....................................................................................................8
Project Plan................................................................................................................................9
Risk analysis...........................................................................................................................9
Duration................................................................................................................................10
Gantt chart............................................................................................................................11
References................................................................................................................................12
BCT APPLIED IN CLOUD COMPUTING_2
BCT APPLIED IN CLOUD COMPUTING
2
Introduction
The development in Information Technology has shown growth in terms of numerous
advanced computer facilities such as cloud computing (Liu, Zhang, & Yang, 2018). There are
drawbacks and positives related to cloud computing as well. The benefits of this IT
innovation include resilient computing, accessing API, advanced online security and effective
virtualization. On the other hand, there are few drawbacks related to this IT innovation as
well, in terms of the privacy and security issues, these issues can come from both the
employees working in the data centers of the cloud computing services as well as from the
hackers (Rao, 2016). The privacy issues include data security issues, service disruption and
multi-tenancy, there are few security measures such as Multi Factor Authentication which
can be used to address these issues.
Block chain technology (BCT) can also be defined as a distributed ledger technology
and it completely based on the peer to peer technology (Thomas, Pastrana, Hutchings,
Clayton, & Beresford, 2017). BCT is much significant for its users as it allows data to be
stored globally, all the real time information can be successfully stored in data centers using
this technology.
The main inspiration and motivation of the proposal is to address the privacy and
security issues of the cloud computing facilities. This research shall be much convenient for
its readers to comprehend the capability of BCT to address the issues which are faced while
using cloud computing facilities.
BCT APPLIED IN CLOUD COMPUTING_3
BCT APPLIED IN CLOUD COMPUTING
3
Rationale of the proposal
Problem domain
Network down time in the cloud servers can be very much vulnerable to the data
which are stored in the cloud servers. There are numerous data security attacks which are
associated to cloud computing services such as DDoS, shared cloud computing services,
negligence coming from the employees working in the data centers, phishing emails and
system vulnerabilities.
The other essential privacy issues related to the use of cloud computing are credential
ad access management, account hijacking, malicious insiders, persistent threats and loss of
sensitive data.
Purpose and Justification
The block chain ledgers are important to improve the integrity of the data which are
stored in the cloud servers. Merkle tree ensures the integrity of both the transactional data as
well as the real time data (Zhang, Deng, Liu, & Zheng, 2018). All the hash functions must be
managed sequentially, and it can help to safeguard the veracity of the fundamental data
blocks. The capabilities of BCT might be useful to address the security and privacy issues of
the cloud computing services and this proposal shall be testing the capabilities of BCT in a
systemized modus.
Inclusions of the research: The solution to the problems faced due to the security
issues of cloud coloring shall be identified only from peer reviewed journals.
Exclusions of the research: Empirical analysis shall not be a part of the solution plan
for the identified issues.
BCT APPLIED IN CLOUD COMPUTING_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mits Advanced Research Techniques And Report
|8
|3577
|16

Cloud Computing Adoption Framework for Business Clouds: A Multi-Layered Security Approach
|33
|17004
|252

Cloud Computing Adoption Framework for Business Clouds: A Multi-Layered Security Approach
|33
|17004
|408

Security in Cloud Computing: Opportunities and Challenges
|9
|1752
|26

Cloud computing adoption framework: A security framework for business clouds
|18
|17028
|244

Cloud Cryptography for Privacy
|14
|3660
|239