logo

Data Storage Security in Cloud Computing: Research Paper

   

Added on  2023-06-09

11 Pages2271 Words115 Views
Running head: IT RESEARCH METHODOLOGY
Data Storage Security in Cloud Computing: Research Paper
Name of Student-
Name of University-
Author’s Note-
Data Storage Security in Cloud Computing: Research Paper_1
1IT RESEARCH METHODOLOGY
Topic: Data Storage Security in Cloud Computing
1. Abstract
Cloud computing is considered to be an emerging field because of the advantages that it
provides to the organizations. The use of cloud computing is increasing because of it high
performance, higher availability as well as low the cost of the storing data. The cloud provides
many service to the client. The main feature of the service providers of cloud includes data
storage. The service of cloud mainly provides storage of data to many companies which
produces huge amount of data each day. With all its advantages, there are many organizations as
well that do not implement the cloud technology because of the security that the cloud provide
for storing the data. Data storage of cloud computing needs to implement security policy and
protection against the weakness of data storage in the organizations. This research paper consists
of all the data storage security measures that cloud computing addresses and the ways to solve
those issues.
1.1 Introduction
According to Feng (2018), cloud computing is usually defined as new style for
computing which is scalable and virtualized resources are also provided by the service of cloud
over internet. The cloud computing transmits application software and the data base to large
number of data centers, where the administration of data as well as service is not totally trusted.
This imposes security challenges for the data storage in the organizations. The cloud storage
capacity is mainly focused in this research paper that includes improving the quality of service of
cloud computing. There are many effective as well as flexible technique for the management of
data storage in the organization. This research paper explains many encryption technique
Data Storage Security in Cloud Computing: Research Paper_2
2IT RESEARCH METHODOLOGY
algorithm with authentication of coded data. There are many reasons for which the cloud
computing faces security threats. The security threat may come from unauthenticated person who
can attack some authorized file, avoids the collusion attacks, and attack of malicious data
modification.
1.2 Problem Statement
There are several trends that opens up in the era where cloud computing plays an
important role in most of the industrial sectors. The cloud computing technology is mainly a
development that is internet based and also uses the technology of computing in it. As there are
advantages as well as disadvantages of all technologies, the data storage technology of cloud
computing also serves the industries with advantages as well as disadvantages to work with (Ali,
Khan & Vasilakos, 2015). As cloud computing provides service over the internet, there may be
lot of issues in the internet while accessing the service of cloud computing.
Cloud computing plays the most important role for storing the data in an organization.
But, the problem states when security issue arises with the implementation of data storage in an
organization. All the data storage security issues of cloud computing and the ways to mitigate
them are described in this research paper. Being a cheaper as well as powerful processor, the
cloud computing is combine with Software as a Service (SaaS) architecture that transforms the
data centers of computing on a large scale. There always lies a problem of providing high quality
service to the customers with flexible connections of network. There are many companies that
provide cloud service to the companies. So, to provide the best service for the cloud is also an
important factor in the companies.
Data Storage Security in Cloud Computing: Research Paper_3
3IT RESEARCH METHODOLOGY
1.3 Scope and Objectives
The main aim of this research paper is to find out data storage security of cloud
computing the industrial sectors. As many companies cannot trust cloud computing because of
the security issues, all such security issues related to data storage are to be studied. To mitigate
those security issues, many measures are taken which are also studied in this research paper.
Cloud computing is one of the tremendous emerging technology in the internet technology sector
and helps to mitigate the problem of data storage in small as well as large organizations
(Sookhak et al., 2017). So, to ensure that all companies can use the technology of data storing of
cloud computing, this research paper mitigates the security issues related to data storage in cloud
computing.
1.4 Methodology
In the context the research study, the main reason for conducting this research review is
to analyze and study the effect of data storage security related to cloud computing (Rao &
Selvamani, 2015). The methodology that is used in this research paper is mixed research of
quantitative research. In this research paper, the study about the importance of cloud computing
is analyzed from different papers, and primary research are also conducted with survey
questions. The secondary quantitative data are collected from other journal article in which
quantitative data are studied by different authors.
This research is carried out mainly by forwarding questions like “How data storage of
cloud computing is important to the industries”. “Is the data storage security profitable for the
organization”. “What are the techniques that the company follows as a preventive method of data
storage cloud computing?” Another question that can be asked to the respondents is “How the
Data Storage Security in Cloud Computing: Research Paper_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
A Comprehensive Study on Big Data Security and Integrity over Cloud Storage
|16
|3783
|392

Security Issues of Cloud Computing
|8
|2075
|211

Security Threats in Cloud Computing and Preventive Methods
|13
|3873
|83

Cloud Computing: Security Issues and Research Challenges
|7
|2120
|343

Report on Cloud Computing | HI6008 Assignment
|13
|2269
|225

Security Threats in Cloud Computing
|3
|2604
|41