logo

Cloud Computing-based Security Solution

   

Added on  2023-06-10

12 Pages2602 Words63 Views
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjkl
zxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmrtyuiopasdfghjklzxcv
Cloud-Computing-based Security Solution
Project Proposal & Plan
8/4/2018
0
Cloud Computing-based Security Solution_1
Cloud Computing-based Security Solution
Table of Contents
Title.......................................................................................................................................................2
Blog Entry.........................................................................................................................................2
Introduction...........................................................................................................................................2
Rationale............................................................................................................................................2
Problem Domain............................................................................................................................2
Purpose & Justification..................................................................................................................3
Sponsor or Supervisor Recommendation...........................................................................................3
Research Questions...........................................................................................................................3
Conceptual or Theoretical Framework..................................................................................................4
Materials & Methods.............................................................................................................................4
Research Methodology......................................................................................................................4
Data Collection Methods...................................................................................................................5
Ethical Issues.....................................................................................................................................5
Compliance Requirements.................................................................................................................5
Analysis of Data................................................................................................................................5
Project Plan...........................................................................................................................................6
Deliverables.......................................................................................................................................6
Work Breakdown Structure...............................................................................................................6
Risk Analysis.....................................................................................................................................7
Duration.............................................................................................................................................9
Timeline & Gantt chart......................................................................................................................9
References...........................................................................................................................................11
1
Cloud Computing-based Security Solution_2
Cloud Computing-based Security Solution
Title
Cloud Computing-based Security Solution
Blog Entry
Cloud is also being used as a primary medium for data storage and management. The latest
and emerging technologies are also making use of cloud computing as one of a partner
technology to achieve the aims and objectives. Thus, cloud computing is sure to have a great
role to play in the area of security as well. The research on the security solutions based on
cloud computing can enhance the overall security architecture. A combination of the two
approaches has been selected as the research methodology as the research aims and
objectives will be better achieved. The research will require qualitative aspect to explore the
security issues and utility of cloud computing in the area of security solutions. It will also be
needed to have statistics and numerical patterns for understanding the mitigation and control
that cloud computing may provide for enhancement of security. The information and data sets
required for carrying out the research will be gathered using the techniques as interviews,
domain analysis, and questionnaires. The automated data analytics tools will be used to
analyse the sets collected. The timeframe estimated for the research is 84 days. There will be
three primary phases in which the research will be carried out.
Introduction
Cloud computing is a form of computing that allows the users to access the computing
resources, such as databases, servers, networking, software packages, etc. over the cloud. The
cloud in this case is referred as the Internet. There are a lot of cloud computing applications
that the users and business organizations are utilizing all across the globe. One such
application of cloud computing is security. There are research and development activities that
are being carried out to understand and apply cloud computing in the area of security (Munir
& Palaniappan, 2013).
Rationale
Problem Domain
With the technological advancements taking place at a rapid scale, there are newer
technologies and applications that are being developed and deployed in the organizations.
Some of the popular technologies that are now being used as emerging and innovative
2
Cloud Computing-based Security Solution_3
Cloud Computing-based Security Solution
techniques are Internet of Things (IoT), Artificial Intelligence, and Big Data. All of these
technologies make use of cloud computing to provide accessibility of the services to the
users. These technological applications are exposed to various forms of security challenges.
The cloud computing frameworks and applications shall be able to provide measures for the
enhancement of security as well (Sharma & Trivedi, 2014).
Purpose & Justification
The main purpose behind the research is to investigate and analyse the role of cloud-
computing to design, develop, and deploy security solutions (Shahid & Sharif, 2015).
There are a lot of applications of cloud in the current business environments as remote
working and tele-commuting has become a necessary for the organizations to mark a name at
the global platforms. Cloud is also being used as a primary medium for data storage and
management. The latest and emerging technologies are also making use of cloud computing
as one of a partner technology to achieve the aims and objectives. Thus, cloud computing is
sure to have a great role to play in the area of security as well. The research on the security
solutions based on cloud computing can enhance the overall security architecture.
Sponsor or Supervisor Recommendation
The supervisor for the research shall have the following skills.
Technical skills on the cloud computing norms, frameworks, architecture, and
applications.
Managerial skills to guide and motivate the research team and to manage the risks and
issues associated with the same.
Communication skills to provide adequate comments on every deliverable to clearly
put across the changes that shall be made.
Knowledge and experience on the security challenges, types of security risks that may
appear, and mitigation strategies that shall be utilized.
Research Questions
The research is being conducted with an aim to investigate and understand the role that cloud
computing plays in the area of security and the mechanisms of cloud that may be used to
design and provide security solutions. The research questions that will be answered upon the
completion are listed below.
3
Cloud Computing-based Security Solution_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cloud Computing, Big Data, Network Security, KMS, Social Media Communication in Machine Training Corporation
|12
|3821
|386

Literature Review on Testing Methods
|9
|2294
|482

Use of Big Data for Government
|10
|1649
|159

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

IoT Security & Privacy: Literature Review
|8
|1987
|72

My Health Record: Non-Functional Requirements, Cloud-based Solutions, and SDLC Approach
|9
|2475
|252