logo

Experiment Design & Result Analysis for Cloud Computing Security

   

Added on  2023-06-04

14 Pages2733 Words200 Views
 | 
 | 
 | 
1
Introduction to Research
Student’s Name
Course
Professor’s Name
Institution’s Name
Institution’s Location
Date
Experiment Design & Result Analysis for Cloud Computing Security_1

2
1.0 Assignment 4 – Experiment Design & Result Analysis
1.1 The main objective
The major objective of our paper is to help us to become familiar with the research or
experimental processes. We conduct different types of researches or experiments in our lives,
and therefore, this paper will be very important us it will enhance our understanding on how we
can conduct these researches or experiments effectively (Babbie, 2015). This paper will be based
on the previous assignment which discussed privacy and security in cloud computing. As we
know, for effective storage, management, and processing of data in cloud computing, the privacy
and the security of the data must be highly considered and given the required attention to avoid
leakage of the data to the unauthorized persons who can access the data and end up interfering
with or messing the entire network system for their personal gains (Hauer, 2015, pp.2554-2565).
To achieve our objective in this paper, we shall do a detailed review, conduct an analysis, do a
design, and finally implement experiments which will help us to evaluate the methodology in the
previous in the previous assignment, and thus report the findings and the results of the previous
experiment.
1.2 Data collection
1.2.1 Data sources
There are various sources where we shall collect the data required in our research. These
sources will be organizations involved in various operations and use cloud computing in their
Experiment Design & Result Analysis for Cloud Computing Security_2

3
operations. As we know, cloud computing is a technique which involves using a large network of
some remote servers which are normally hosted over the internet for them to store, to manage,
and to process data, rather than using the local servers or some personal computers for storing,
managing, and processing the data (Rittinghouse and Ransome, 2016). Therefore, the
organizations which use cloud computing technology in their operations will be suitable sources
of data for our research. In our case, we shall visit three organizations which have cloud
computing services in their operations. These organizations will be a systems maintenance
organization, a computer producing/selling organization, and a sports organization. All these
three organization deal with bulk amounts of data and have cloud computing departments which
are concerned with the privacy and the security of their data.
1.2.2 Data collection record
After collecting our desired data in the sources discussed above, we shall record the data
in a table which will enhance its presentation and its security (Sun et al., 2014, pp.3601-3604).
The table will also give more descriptions of the data which is very important especially to the
people who might need to use our report in the future. The data collected will be stored in the
sample table shown below:
1.2.2.1 Data collection table
Data
source
name
Source
organization
Data description File
data
format
URL (if
available
online)
Charge
fee
Target
data
source
Data 1 Systems Systems txt --- Free No
Experiment Design & Result Analysis for Cloud Computing Security_3

4
maintenance
organization
maintenance data
Data 2 Computer
producing/sellin
g organization
Production/sales
data
txt --- Free No
Data 3 Sports
organization
Sportsmen/women
data
txt --- Free No
1.2.3 Storage of the collected data
After collecting and recording the raw data needed for our research, it’s very important to
store it safely for easy access and use in the future (Hsu and Patterson, 2014, 2014). The raw data
is converted into the most appropriate format for it to be stored for future use. It’s then stored in
a table, and the sample table shown below can be used for storing the collected data.
1.2.3.1 Data storage table
Data source
name
Date of
collection
Saved file
location
Saved file
name
Saved file
format
No. of data
records
Data 1 12/9/2018 //raw data/ Data1.txt txt 700
Data 2 14/9/2018 //raw data/ Data2.txt txt 1000
Data 3 16/9/2018 //raw data/ Data3.txt txt 800
Experiment Design & Result Analysis for Cloud Computing Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents