This presentation discusses the background, literature review, research questions, significance, aims, contribution, research strategy, data gathering and analysis techniques, and ethics of a research on cloud computing and data encryption.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
RESEARCH
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Background of the problem •Outsourcing various sensitive data to various remote services is an issue •Cloud service providers might access the data that belongs to an organization. •Encryption of data has been chosen as the most reliable way to prevent the issues. •Various researchers have mentioned that data that is not encrypted ha s high chances to get accessed by hackers.
Literature review showing the relationship to previous works •Researchers have introduced various ways along with completely-homomorphic encryption. •The methods are not considered as practical because of their high computational overhead for cloud server as well as user (Varghese & Buyya, 2018). •More practical as well as special purpose of solution like searchable encryption had been introduced. •The schemes allow the clients to store encrypted data in cloud and carry out keyword search.
Research question •How cloud platform can be used by organizations? •Is encryption enough for securing data? •How can organizations use encryption techniques for securing confidential data?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Significance of the problem •This problems gives an idea on how cloud computing can be used for the purpose of storing data. •It provides data regarding how encryption can be done in order to secure data. •It provides data regarding why organizations must not trust cloud service providers blindly (Dembla, Flack & Petter, 2015). •Provides a clear understanding on how cryptography can be used for the purpose of encryption of data.
Aims of the research •Aims in designing a searchable encryption scheme which would support precise multi keyword ranked search as well as flexible dynamic operation on collection of documents. •Give a detailed knowledge regarding the encryption techniques used for securing data (Varghese & Buyya, 2018). •Provide detailed knowledge on how data can be secured in an organization.
Contribution •Our contribution in this particular assignment is to carry out research and record the results obtained from it. •Various research methods had been reviewed and the most reliable ones have been selected (Dembla, Flack & Petter, 2015). •The qualitative as well as quantitative research methodology has been reviewed and the one that has chances to produce more results has been selected.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Research strategy, approach and methodology •The research strategy that would be used for the purpose of carrying out this research includes primary as well as secondary research strategy. •Primary research would help in carrying out a real life research by interviewing people and collecting data from them (Dembla, Flack & Petter, 2015). •Secondary research would be carried out by reviewing the data collected from secondary sources. •Methodologies that would be used include qualitative as well as quantitative.
Data gathering and analysis techniques •Interviews •Questionnaires •Surveys •Observations •Focus group •Ethnography •Oral history and case study •Documentsand records
Rigor, validity, reliability and ethics •Reliability and validity includes issues that has been pointed out by quantitative researchers and advocates. •This research would ensure quality as well as rigour. •It would also apply various ethical principles (Dembla, Flack & Petter, 2015). •It ensures that principles of any individual is not harmed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References •Dembla, P., Flack, C., & Petter, S. (2015). Extending the DeLone and McLean IS Success Model to Cloud Computing. •Varghese, B., & Buyya, R. (2018). Next generation cloud computing: New trends and research directions.Future Generation Computer Systems,79, 849-861.