MITS Research Report: Cloud Computing Data Leakage Prevention

Verified

Added on  2022/09/26

|3
|996
|22
Report
AI Summary
This research report, prepared for the Victorian Institute of Technology, delves into the critical issue of data leakage in cloud computing. It highlights the pervasive nature of cloud technology across various sectors and the associated security risks, including malware attacks and data breaches. The report focuses on preventive measures such as double authentication, strong password policies, and robust encryption techniques. It emphasizes the necessity of a secure cloud environment for businesses, organizations, and individual users, given the increasing reliance on cloud services. The research also assesses the impact of these security measures and explores the importance of user education in promoting the responsible and secure use of cloud computing technologies. The report references a comprehensive set of sources to support its findings and recommendations, providing a detailed analysis of the challenges and potential solutions in cloud computing security.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
MITS Advanced Research Techniques
Research Report
Candidate:
Student Name
Higher Education Department
Victorian Institute of Technology
Report Title:
Extended Abstract
Cloud computing is the usage of remote servers for data operation and management and is one of the
leading technology of our times. Due to this, it finds numerous usages everywhere, from data storage
and security to services, business, research and other fields. But, cloud computing is prone to several
risks, like malware attacks, data leakages and loss and many more. This research has been conducted
in order to find out the various ways in which the leakage of data can be prevented in cloud computing.
It is a lengthy research dealing with various ways to do so like double authentication, password policy,
good encryption and many more. This research will be beneficial for all those who use cloud
networking and other information technology services, making this technology much more user friendly
and popular. This research is necessary. With the increasing demand of cloud technologies and also
security issues regarding it constantly threatening big and small businesses, common users and other
organizations, the need for having a safe cloud is very important. This research also focuses on the
impacts of these security measures and also their needs and applications. Primarily, we can consider
good password policy, backups and using correct cloud provider as effective means of cloud security,
but for bigger threats like virus attacks, internal damage, proper handling is required. The users must
also be taught about its need, uses and impacts helping cloud computing develop further in future.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
[1] J.W. Rittinghouse, and J.F., Ransome, Cloud computing: implementation, management, and
security. CRC press, 2016.
[2] D.C., Marinescu, Cloud computing: theory and practice. Morgan Kaufmann, 2017.
[3] .S. Hurwitz, D., Jand Kirsch, Cloud computing for dummies. John Wiley & Sons, 2020.
[4] M., Almorsy, J. Grundy, and I., Müller, An analysis of the cloud computing security
problem, arXiv preprint arXiv:1609.01107, 2016.
[5] T., Radwan, M.A. Azer, and N., Abdelbaki, Cloud computing security: challenges and future
trends, International Journal of Computer Applications in Technology, 55(2), pp.158-172, 2017.
[6] O., Cinar, R.H. Guncer, and A., Yazici, Database security in private database clouds, In 2016
International Conference on Information Science and Security (ICISS) (pp. 1-5), IEEE, 2016,
December.
[7] Y., Gao, H., Wu, B., Song, Y., Jin, X. Luo, and X., Zeng, A Distributed Network Intrusion
Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc
Network. IEEE Access, 7, pp.154560-154571, 2019.
[8] G., Somani, M.S., Gaur, D., Sanghi, M. Conti, and R., Buyya, DDoS attacks in cloud
computing: Issues, taxonomy, and future directions, Computer Communications, 107, pp.30-48,
2017.
[9] M., Zekri, S., El Kafhali, N. Aboutabit, and Y., Saadi, DDoS attack detection using machine
learning techniques in cloud computing environments, In 2017 3rd International Conference of
Cloud Computing Technologies and Applications (CloudTech) (pp. 1-7), IEEE, 2017, October.
[10] K. Bhushan, and B.B., Gupta, Security challenges in cloud computing: state-of-
art. International Journal of Big Data Intelligence, 4(2), pp.81-107, 2017.
[11] S. Alneyadi, E. Sithirasenan and V. Muthukkumarasamy, “A survey on data leakage
prevention systems”, Journal of Network and Computer Applications, 62, pp.137-152, 2016
[12] K. Khan, M. Shaheen and Y. Wang, “Using Sparse Matrices to Prevent Information
Leakage in Cloud Computing”, In 2018 IEEE 6th International Conference on Future Internet
of Things and Cloud (FiCloud) (pp. 444-447). IEEE, 2018
[13] J. Calleja, Data leakage in SaaS”, (Bachelor's thesis, University of Malta), 2019
[14] R. Perlman, C. Kaufman and M. Speciner, “Network security: private communication in
a public world”, Pearson Education India, 2016
[15] D. Acemoglu, A. Malekian and A. Ozdaglar, “Network security and contagion”, Journal
of Economic Theory, 166, pp.536-585, 2016
[16] W. Stallings, “Network security essentials: applications and standards”, Pearson, 2016
[17] R. Kumar, “Research methodology: A step-by-step guide for beginners”, Sage
Publications Limited, 2019
[18] A. Wiek and D.J. Lang, “Transformational sustainability research methodology”,
In Sustainability science (pp. 31-41). Springer, Dordrecht, 2016
[19] H. Allam, N. Nassiri, A. Rajan, A. and J. Ahmad. A critical overview of latest
challenges and solutions of Mobile Cloud Computing. In 2017 Second international conference
on fog and mobile edge computing (FMEC) (pp. 225-229). IEEE, 2017
Document Page
[20] [17] G.M. George, and L.S. Jayashree. Safest Secure and Consistent Data Services in the
Storage of Cloud Computing. In International Conference on Artificial Intelligence, Smart Grid
and Smart City Applications (pp. 433-447). Springer, Cham, 2019
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]