A Comprehensive Study on Big Data Security and Integrity over Cloud Storage
Added on 2023-04-20
16 Pages3783 Words392 Views
Running head: RESEARCH PROPOSAL
A comprehensive study on the big data security and integrity over the cloud storage
Name of the Student:
Name of the University:
A comprehensive study on the big data security and integrity over the cloud storage
Name of the Student:
Name of the University:
1RESEARCH PROPOSAL
Table of Contents
Background......................................................................................................................................2
General context............................................................................................................................2
Settings........................................................................................................................................2
Basis for the proposed research...................................................................................................2
Problem Statement...........................................................................................................................3
Presentation of literature-supported open research question.......................................................3
Problem statement.......................................................................................................................3
Goal..................................................................................................................................................4
Relevance and Significance.............................................................................................................4
Literature Review............................................................................................................................6
Big data security issues in cloud computing................................................................................6
Secure big data in cloud...............................................................................................................7
Cloud and big data.......................................................................................................................8
Approach..........................................................................................................................................9
Discussion of methodology used.................................................................................................9
Research milestone with explanation........................................................................................10
References......................................................................................................................................12
Table of Contents
Background......................................................................................................................................2
General context............................................................................................................................2
Settings........................................................................................................................................2
Basis for the proposed research...................................................................................................2
Problem Statement...........................................................................................................................3
Presentation of literature-supported open research question.......................................................3
Problem statement.......................................................................................................................3
Goal..................................................................................................................................................4
Relevance and Significance.............................................................................................................4
Literature Review............................................................................................................................6
Big data security issues in cloud computing................................................................................6
Secure big data in cloud...............................................................................................................7
Cloud and big data.......................................................................................................................8
Approach..........................................................................................................................................9
Discussion of methodology used.................................................................................................9
Research milestone with explanation........................................................................................10
References......................................................................................................................................12
2RESEARCH PROPOSAL
3RESEARCH PROPOSAL
A comprehensive study on the big data security and integrity over the cloud storage
Background
General context
The research proposal is based on comprehensive study on the big data security and
integrity over the cloud storage. The cloud computing is scalable which can provide facilities
over the internet. It is service based classical on the internet that can provide as an infrastructure
to share and collect of resources like storage server, software, hardware with lower cost. Hashem
et al., (2015) stated that the cloud computing is grouped in three service models such as software
as a service, platform as a service and infrastructure as a service. The objective of the cloud
computing is providing effective services over the internet, all the security challenges are related
to the storage of data within the cloud.
Settings
The security breaches in the cloud threat trust among the customer as well as service
provider. The cloud service provider ensures that the security challenges like confirmation of the
users, data exactness, and data accessibility besides loss of the data are main losses which are
required to prevent so that there is proper sharing of the data among the users and cloud
providers (Ali, Khan, & Vasilakos, 2015). There is storage of user’s data within the cloud service
provider which set the servers which can run into the distributed fashion.
Basis for the proposed research
The base of the proposed research is based on data storage security challenges besides
discussion on the approaches which can adopt to make sure that the security issues are to be
modified. The encryption based method can secure the data (Chang & Ramachandran, 2016).
A comprehensive study on the big data security and integrity over the cloud storage
Background
General context
The research proposal is based on comprehensive study on the big data security and
integrity over the cloud storage. The cloud computing is scalable which can provide facilities
over the internet. It is service based classical on the internet that can provide as an infrastructure
to share and collect of resources like storage server, software, hardware with lower cost. Hashem
et al., (2015) stated that the cloud computing is grouped in three service models such as software
as a service, platform as a service and infrastructure as a service. The objective of the cloud
computing is providing effective services over the internet, all the security challenges are related
to the storage of data within the cloud.
Settings
The security breaches in the cloud threat trust among the customer as well as service
provider. The cloud service provider ensures that the security challenges like confirmation of the
users, data exactness, and data accessibility besides loss of the data are main losses which are
required to prevent so that there is proper sharing of the data among the users and cloud
providers (Ali, Khan, & Vasilakos, 2015). There is storage of user’s data within the cloud service
provider which set the servers which can run into the distributed fashion.
Basis for the proposed research
The base of the proposed research is based on data storage security challenges besides
discussion on the approaches which can adopt to make sure that the security issues are to be
modified. The encryption based method can secure the data (Chang & Ramachandran, 2016).
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Case Study Cloud Storage Systemlg...
|5
|1140
|108
(PDF) Cloud Computing Assignmentlg...
|3
|2868
|157
Secure User Data in Cloud Computing Using Encryption Algorithmslg...
|6
|1418
|140
Secure and Efficient Search Techniques in Cloud Computinglg...
|7
|1912
|79
Assignment on Webb Stores and Cloud Computinglg...
|13
|2905
|54
Framework Modeling for User Privacy in Cloud Computinglg...
|8
|5479
|500