logo

POS Technology: Integrity of Collected Data Research Paper 2022

   

Added on  2022-10-18

15 Pages4057 Words19 Views
RESEARCH PAPER 0
Proof of Storage

RESEARCH PAPER 1
Executive summary
POS refers to the proof of storage which is a kind of process that
provides a platform for performing data integrity in the organization. It is
an advanced technology which is now used in the business industries for
controlling and managing their data and checks the integrity of collected
data. The key purpose of this research is to describe the concept of POS
technology and evaluate their importance in the business sectors. The
major focus of this report is on how the POS system is used for checking
the integrity of collected data and signals. A Literature review has
conducted in order to analyse the opinions of other authors and evaluate
the results of other journal paper. There are several research methods
included by the authors which include, research design, data analysis,
data collection and so on. Therefore, it is identified that POS technology
is more effective rather than other which can be used in the
organizations for improving the performance of systems.
Table of Content

RESEARCH PAPER 2
s
Introduction................................................................................................3
Background of the problem........................................................................3
Literature review........................................................................................4
Body............................................................................................................8
Proposal...................................................................................................8
Research question....................................................................................8
Research aims and significance...............................................................8
Research Methodology............................................................................9
Introduction..........................................................................................9
Research design....................................................................................9
Research approach...............................................................................9
Research strategy.................................................................................9
Data gathering methods.....................................................................10
Data analysis.......................................................................................10
Data validity........................................................................................10
Data reliability....................................................................................10
Timeline....................................................................................................11
References................................................................................................12

RESEARCH PAPER 3
Introduction
The term POS is defined as the proof of storage which provides a
platform to the consumers for effectively verifying the integrity of stored
and collected data. Such kind of technology is mainly used in the
companies for controlling and managing the security risks linked with
the information technology. It is observed that to utilize proof of storage
system, the users send coded information to the server while keeping a
small amount of state locally. However, this research study focus on the
fundamental concept of POS system along with cloud computing. There
are numbers of papers published in the last few years and many authors
provided their views on this topic. It is identified that the dynamic proof
of storage is a more useful technique which enables consumers to check
the integrity of outsourced files and efficiently update the data files in the
cloud server. The key objective of this paper is to analyse the key aspects
of both proofs of storage and cloud computing. A literature review will be
conducted in order to find the viewpoints of other researchers and
analyse the results of other journal papers. There are various sections
will be included in this research paper, for example, the background of
the problem, literature review, research questions, aims and significance,
research methodologies and timeline.
Background of the problem
Proof of storage is another technology that has the potential to
check the overall integrity of the obtained data and documents and
transfer files in the cloud base servers. It is observed that the POS and
cloud computing uses internet connection while sharing data files which
is directly linked with the cyber-attacks and crimes. Cloud computing is
an advanced information technology which is now used by many
companies and users for controlling and managing a large amount of
data (Zafar, et al., 2017). Therefore, security is the biggest issue faced by
consumers while using POS and cloud computing technologies which is
the problem statement of this research. It is identified that encryption is

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Research Proposal
|6
|1282
|232

A Comprehensive Study on Big Data Security and Integrity over Cloud Storage
|16
|3783
|392

Critical Analysis and Problem Definition Report on Research Methods in IT
|11
|2896
|335

THE CLOUD COMPUTING
|15
|3490
|21

Report on Cloud Computing | HI6008 Assignment
|13
|2269
|225

Secure and Efficient Search Techniques in Cloud Computing
|7
|1912
|79