logo

Methodology for Privacy Preservation in Cloud Computing - Desklib

   

Added on  2023-06-05

15 Pages2898 Words229 Views
 | 
 | 
 | 
NIT6130 INTRODUCTION TO RESEARCH
ASSIGNMENT 3 – METHODOLOGY
by
Rachid Hamadi
Student ID: 30099999
Methodology for Privacy Preservation in Cloud Computing - Desklib_1

Table of Contents
Table of Contents.................................................................................................................................ii
List of Tables......................................................................................................................................iii
Chapter 1 Methodology........................................................................................................................1
1.1 Research Problem and Reorganized Collected Literature..........................................................2
1.1.1 Research Problem Statement...............................................................................................2
1.1.2 Reorganized Collected Literature........................................................................................2
1.2 Types of Methodology...............................................................................................................3
1.2.1 Qualitative and Quantitative Methodologies.......................................................................3
1.2.2 Type of Chosen Methodology.............................................................................................5
1.3 Review of the Existing Methodologies......................................................................................5
1.3.1 Selected Sub-Problem.........................................................................................................5
1.3.2 Analysis of the Selected Methodologies.............................................................................6
1.3.3 Relevance of the Research Problem....................................................................................7
1.3.4 Summary of the Reviewed Methodologies.........................................................................7
1.4 Proposed Methodology...............................................................................................................9
1.4.1 Identification and Justification............................................................................................9
1.4.2 Benefits and Limitations.....................................................................................................9
1.4.3 Framework and Explanation.............................................................................................10
List of References...............................................................................................................................12
ii
Methodology for Privacy Preservation in Cloud Computing - Desklib_2

List of Tables
1Reorganized collected literature...........................................................................................2
2Summary of reviewed methodologies....................................................................................9
iii
Methodology for Privacy Preservation in Cloud Computing - Desklib_3

Chapter 1
Methodology
In this section, the paper will look into the study research design, the study area, population and
the sample population, the sampling technique, the data collection instruments and the methods
of data analysis.
The purpose of this assignment is to identify an appropriate methodology for our research topic related to
privacy preservation in cloud computing
This document is structured as follows. First a review, analysis and summary of the existing
methodologies reported in the collected literatures will be given. Then, the methodology to be used will
be proposed to solve the selected research problem. My research will adopt. There were three peer
reviewed articles on cloud computing that were analyzed in the literature review to collect
necessary data and make a solid conclusion on the issue of privacy and security in cloud
computing.
1
Methodology for Privacy Preservation in Cloud Computing - Desklib_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and Privacy in Intelligence Assistance: A Mixed Methods Approach to Analyzing Collaboration Challenges
|16
|2722
|140

Data Security in Cloud Computing Systems
|12
|2956
|40

Application of Natural Language Processing in Education: Methodology
|13
|2843
|158

Methodology of Fraud and Theft Detection using Data Mining
|13
|3105
|190

Introduction to Research: Assignment-3 Methodology
|14
|2242
|163

Quantitative Research Methods
|14
|2478
|47