logo

Mits Advanced Research Techniques And Report

   

Added on  2022-08-24

8 Pages3577 Words16 Views
MITS Advanced Research Techniques
Research Proposal
Candidate:
Student Name
Higher Education Department
Victorian Institute of Technology
Proposed Title:
Minimize unauthorized data leakage
Abstract
Data leakage is the main limitation related with the deployment of cloud computing services which is
progressively used in our society as well as in corporate organizations. The reliability, validity and
integrity of the data can be compromised due to data leakage issues in the cloud computing
environment. This proposal is very much noteworthy for the readers of this proposal to recognize the
security loopholes of a network. The ways to minimize the data leakages issues shall be evacuated in
this proposal from ta network security perspective. The proposal shall be having numerous sections and
each of the section will be very much significant to enhance the validity of the discussions of the paper.
This proposal shall be considering secondary data analysis technique where data will be collected from
dependable secondary data sources like the peer reviewed journals. The collected data shall not
require any sort of numeric analysis hence the collected secondary data shall be analyzed with the help
of qualitative technique. Systematic literature review shall be considered as the research design of this
proposal and the sampling technique which will be considered in this proposal is random sampling
technique. The research philosophy which shall be considered in this proposal is realism philosophy.
The concluding section of this proposal shall be presenting a time frame which will be stating the time
required for each of the activities involved in the research.
Outline of the Proposed Research
Corruption of database is one of the prime challenges which are faced due to the data leakage issues in
the cloud servers. In order to address these challenges few precautionary steps are required to be taken
so that the chances of data leakage gets reduced. The rationale and the purpose of this research shall
be discussed in this section of the proposal. Data leakage is defined as the type of unauthorized data
tramission from cloud servers, data can be transferred from the cloud services both electronically as
well as physically. Data leakage occurs in a cloud computing environment due to numerous issues such
as weaker passwords of the cloud computing accounts, theft of the credential of the cloud computing
accounts, exploitation of the networking vulnerabilities by the social engineers, diverse categories of
malicious attacks, downtime issues, data privacy issues and vendor lock in. There are diverse

categories of network security which can have a direct impact on the data which are stored in the cloud
computing servers such as the Distributed Denial of Service (DDoS), firewall, email gateways,
Intrusion Detection System (IDS), network access control, (NAC) and Virtual Private Networks
(VPN).The protection to the access to the files is known as network security, it is very much essential to
maintain the security and integrity of the data which are stored, managed and retrieved in the cloud
servers. Numerous workstations can be created in the network which can ensure the security of a
network from the data security. Thus, this proposal will be very much important to understand how the
privacy issues of the cloud computing will be minimized so that the security of the data which are
stored in the cloud servers is maintained.
Background
Cloud leak is defined as the type of leakage where some of the essential or sensitive data
which are stowed in the cloud servers are exposed to the internet [9]. Network security is
defined as the set of policies which are set by the networking engineers which protects the
usability as well as the integrity of the network and the data which comes in and out of a
private network. The practice of using a network of remote servers which are hosted in the
internet to manage diverse types of data is termed as cloud computing. Billions of people all
around the globe is using cloud computing services to protect the integrity of the data. Any
sort of data security issues like data leakage can have a huge impact on the data which are
stored in the cloud servers [10]. There are numerous ways which can address the data
leakage issues in a cloud environment such as the good quality encryption, training the users
of the cloud environment. Setting a decent password policy is one of the prime ways to restrict
the social engineers to identify the network security vulnerabilities. Data backup can be very
much significant to deal with issues like data alteration. This proposal will be different from
the other researches as it will be conducted based on network security perspective.
There are numerous ways which can ensure minimization of data leakage in any cloud
environment like the identification of the critical data of the business, the use of the data loss
prevention software is also very much significant to protect the data from the data leakage
threats [12]. Monitoring the traffic of all networks is also be very much significant ways to
minimize data leakage threats in a cloud computing environment. It can also be said that the
employees who works in the cloud computing environment must be following Bring Your Own
Device policy which can ensure that there are no data leakage threats coming from the cloud
computing environment [11]. Checking the sensitivity of the data is very much essential for
the protection of the data from the data leakage threats as well. Data leak prevention policy
and Information Leak prevention can be very much significant to minimize the data leakage
threats as well.
Purpose
The objective of the research can be understood in the first place from this unit of the proposal. The
engagement of the sources is one of the prime objectives of any research proposal. The expected final
result of a result can also be identified with the help of this section of the proposal. The primary
purposes of this proposal are to identify the reasons behind the unauthorized data leakage in cloud
computing and minimize the chances of data leakage so that cloud computing. The goal of this research
is to conduct secondary data from peer reviewed journal to identify the exact way by which data
leakage occurs in any cloud commuting environment. Analysis and justifications provided by the

scholars of the peer reviewed journals shall be considered to identify the ways by which data leakage
can be minimized. Thus, thus research can be very much beneficial for the readers of this proposal as it
can make them understand the procedures required to minimize the chances of data leakage while
using cloud computing services from the network security perspective.
Rationale
The reason behind the conduction of a research can be understood using the research rationale. The
hypothesis of a research is conducted using research rationale as well. Research rationale are very
much common in descriptive research, experimental research as well as library research.
There are numerous reasons behind the data leakage issues which are faced in cloud computing
environment such as the security loop holes of the network. Apart from that there are numerous factors
which cause data leakage such as the carelessness of the employees, setting the weak passwords,
accidental emailing of sensitive information, human error and system glitches [8]. Thus, it can be said
that each of these factors has to be addressed by the strategic planners of the cloud computing
environment in order to deal with data leakage threats [7]. There are previous researches has only
focused on the ways by which data leakage occurs in the cloud computing servers. On the contrary this
research shall not only identify the ways by which data leakage occurs but also recommend the ways
which can this issue can be minimized. The loopholes of the cloud computing services shall be
identified in this research which was not discussed in any of the previous researches. This research
shall also focus on the improvements which is required in the cloud computing servers which can
minimize the network vulnerabilities.
This research shall be very much beneficial for both the strategic planners of the cloud computing
services as well as for the users of this service. The strategic planners of the cloud computing services
can understand the ways by which data leakage occurs from this research. This research paper shall
also help the cloud computing users to identify the ways which can minimize the chances of data
leakage whenever they store their essential data in the cloud servers.
Research Topic and central research question
Research questions is defined as the type of questions which can help to understand the content of a
research [6]. The sub sections of a research paper can easily be understood using the research
questions. The specific concerns or the actual reason behind the conduction of a project can be
understood with the help of the research questions [13]. The selection of the research questions
depends upon the nature of the project and perception of the analyst of the research. Research
questions must be very much specific so that the exact reason behind the conduction of the proposal is
identified by the researchers of the proposal.
Based on the background proposal it can be understood that data leakage can have a huge impact on
the data which are stored in the cloud servers. Thus, it can be said that there are few areas related with
data leakage of cloud computing which has to be focused, discussed and analyzed so that the chances
of data leakage gets reduced to a significant extent. The research questions of this proposal are as
followings:
What are network security issues related with the deployment of the cloud computing services?

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mits Advanced Research Techniques Research Report 2022
|6
|1197
|19

Experiment Design & Result Analysis for Cloud Computing Security
|14
|2733
|200

Open Source Solutions for Building IaaS Clouds
|4
|866
|52

THE CLOUD COMPUTING
|15
|3490
|21

Hannaford Brothers Security Breach Report 2022
|2
|924
|24

BCT APPLIED IN CLOUD COMPUTING
|13
|2314
|21