Comprehensive Report: Consumer Security Challenges in Cloud Computing

Verified

Added on  2020/01/28

|38
|10339
|29
Report
AI Summary
This report delves into the security challenges confronting consumers in the realm of cloud computing. It begins by defining cloud computing and highlighting its benefits while acknowledging the associated security issues. The research employs a quantitative methodology, incorporating surveys and interviews to gather data on consumer perceptions and experiences. The report identifies key challenges such as data protection, authentication, and data breaches, examining their impact on consumers. It explores various security models, including IaaS, PaaS, and SaaS, and assesses their effectiveness in mitigating risks. The research provides insights into consumer knowledge of cloud computing, factors preventing adoption, and potential solutions to enhance security. The report concludes with recommendations for improving cloud computing security practices and ensuring consumer trust and data safety, making it a valuable resource for understanding and addressing the evolving security landscape of cloud services.
Document Page
What are the security
challenges for consumers
regarding cloud computing
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
Aim of the present research is to carry research on security challenges of consumer in
term of cloud computing. With the help of present research, there are many benefits can be
created at workplace regarding easy access of consumable data that considered scalability, cost
efficiency and high reliability of the data. These benefits assists to provide storage services that
provided in cloud computing. Hence, data could be assess for providing relevant information at
workplace. In this project, quantitative research methods has been used that assists to find out
results on the basis of questions. Survey and interviews are also such important elements that
assists to collect relevant information. However, findings determines in easy way that assists to
face challenges that are related find different aspects.
Document Page
Table of Contents
Introduction......................................................................................................................................3
Aims ................................................................................................................................................3
Outline of the research.....................................................................................................................4
Purpose of research .........................................................................................................................4
Research Rationale...........................................................................................................................4
Research context..............................................................................................................................5
Literature review..............................................................................................................................5
Primary Research Methods..............................................................................................................8
Conclusion.......................................................................................................................................8
CHAPTER 3: RESEARCH METHODOLOGY.............................................................................1
Mixed methodology....................................................................................................................1
CHAPTER 4: DATA COLLECTION.............................................................................................5
4.1 Introduction...........................................................................................................................5
4.2 Thematic analysis..................................................................................................................5
CHAPTER 5: CONCLUSION AND RECOMMENDATIONS...................................................21
5.1 Conclusion...........................................................................................................................21
5.2 Recommendations...............................................................................................................21
REFERENCES..............................................................................................................................23
Appendix........................................................................................................................................26
Document Page
Introduction
Cloud computing is a technique which facilitates the sharing of data and resources for
different computers simultaneously. Despite being a great opportunity for the world of
technology, it has a number of security issues. The cloud computing deals with a large amount of
data that is very important for the companies. It helps them to deal with it and therefore needs to
be handled very sensitively. Cloud computing is a computing model which enables the sharing of
data, resources, and software by different computers simultaneously. The data is present in a
central database and all the computers are connected to the database with a proper networking
system. However, the security issues related to the cloud computing has proved to be a barrier to
the smooth implementation of the technology in the market. The data handled by the cloud is
very large as well as important and needs to be properly and sensitively handled. After the proper
analysis, it has been discovered that there are many risks associated with the security of data.
These risks involve the factors like misplacement of the intellectual property, interference with
the privacy of data, manipulation of the important data as well as loss of proper control over the
data. According to Shiau and Chau (2016, p.358), there are several challenges to the security of
the data like the protection of data, authentication of data as well as breach of data.
Aims
The aims is to recognize the security challenges for consumers regarding cloud computing and
how to resolved these challenges to increase the effectiveness of cloud computing.
The sub questions will help me to achieve that:
To Identify security challenge in cloud computing.
To discuss consumers knowledge in cloud computing.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
To determine what prevent consumers from using cloud computing.
Outline of the research
There are several security challenges to the consumers regarding the data sharing in cloud
computing. The security is highly complicated due to the data being distributed in a very wide
area and being accessed by a number of systems. Zhang et al.(2016, p.807) mentioned that, the
different challenges are the protection of data while it is stored as well as in transmission mode,
the authorization of data- the access to the data should be granted only to the one who have the
authority and the violation of data in an illegal manner. There are several security models which
serve to eliminate or minimize these challenges namely IaaS, PaaS and SaaS.
Purpose of research
It has been years since the concept of cloud computing has been introduced into the market.
Despite being a significant innovation in the 5th field of technology, the dependability is still
questionable due to some security issues. The companies which have a desire to involve in this
technology need to be confident of some critical factors. The data they are sharing with the
computing system must be safe and secure. The companies sharing the data must be convinced
that there shall be no unauthorized access to their data. They also need to be assured of the fact
that their data will not be breached or violated in any circumstances.
Research Rationale
What is the issue
There are several issues regarding the security in the cloud computing technology (Kaur and
Kaur, 2016, p.29). The data stored in the cloud is very confidential for the companies and must
be protected under all conditions. These may consist of some private data of individuals recorded
by the company for certain purposes. The companies may fear the loss of control over the data
provided to the cloud.
Document Page
Why is it an issue
The loss of such confidential data from the database or the misuse of those data may lead the
company to bear an irreparable loss in terms of revenue as well as the reputation of the company.
Why is it an issue now
A number of data hacking techniques have emerged which have lead to the misuse of the
confidential data stored in the cloud. This the reason for the security of the technology has been
questioned.
What does the research shed light on?
The research conducted sheds light upon the different challenges faced by the customers in the
security issue of cloud computing as well as the different models of security which can be
applied to meet those challenges.
Research context
The advancement of technology has lead ways for the evolution of globalization. There are a
number of companies who are trying to expand their business throughout the world. In that case,
they need to have a central body which shall be able to control all the different branches of the
companies. These companies need to share a lot of common data among the branches for the
smooth functioning of the entire system. This problem can be solved with the use of cloud
computing. As said by Pancholi and Patel (2014, p.19), there are several issues related to the
security of the data like the protection of their data, the proper authorization for the use of their
data so that their data is not used by some unwanted party, Also, the data should not be violated
or misused for any illegal purpose. Proper research is been done on the different security models
which meet these challenges.
Literature review
Cloud computing is a computing model which enables the sharing of data, resources, and
software by different computers simultaneously. The data is present in a central database and all
the computers are connected to the database with a proper networking system. There are several
issues regarding the cloud computing security. This part of the study mainly describes the
models that can be helpful to mitigate these issues.However, the security issues related to the
cloud computing has proved to be a barrier to the smooth implementation of the technology in
the market. The data handled by the cloud is very large as well as important and needs to be
Document Page
properly and sensitively handled. After the proper analysis, it has been discovered that there are
many risks associated with the security of data. These risks involve the factors like misplacement
of the intellectual property, interference with the privacy of data, manipulation of the important
data as well as loss of proper control over the data. There are several impacts of these risks on
the users like loss of revenue and goodwill of the company, the loss of trust of customers on the
companies as well as a violation of certain laws due to the leakage of highly confidential data.
There is several security models designed to solve these issues. The models IaaS, SaaS, and PaaS
shall be discussed in details in the project.
Rittinghouse and Ransome (2016, p.62) stated that the SaaS model is used in office and
messaging software, DBMS software, payroll and accounts, Computed Automated Drawing
(CAD), CRM (Customer Relationship Management) and HRM (Human Resource Management)
and service desk management. It has entered deep into all leading software companies.Bokhari et
al. (2016, p.10), has stated that in the present time, there are many organizations which are
storing their huge in advance system to the future use. But with less availability of updation of
existing software increases insecurity of the data.
Jumagaliyev (2016, p. 53) stated that in the present time, the transaction of money has done
through online mediums like Go Recharge and Freecharge. During these mode, security and
safety of users transactions have most of the time has created issues. Along with this, the
essential personal information of the user has not secured that much as it has expected by them.
In most of the cases, the sensitive information of private enterprise using the cloud computing is
stored outside their domain or accessibility.
According to Calheiros, Ranjan and et.al. (2011, p. 23-50), PaaS allows the customers to use the
platform or the operating system and the servers to use along with the infrastructure. Generally,
the vendor controls and maintains the physical computer hardware, operating systems, and server
applications while the customer only controls and maintains their developed software
applications. Customers would, therefore, be mainly responsible for any security exploits that
could target their applications, while the vendor is not only responsible for physical security but
also for any security exploits that could target network connections such cloud storage, data
storage, and data access. This has created the security issues regarding revile the information of
the users by hackers and other third parties for personal benefits.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The availability of computing resources all over the internet is done by the help of IaaS. There
are many security features provided by the IaaS which solve the challenges of cloud computing.
Rittinghouse and Ransome (2016, p. 80) mentioned that in the shared cloud network every user
share the same cloud for accessing the infrastructure. It has developed a security issue for its
users while storing and access the information. The cloud has a two IP addresses. One of them is
the public IP address for the application user and another one is private IP address for the cloud.
The public IP address is either permanent or temporary whereas the private IP address is always
temporary. This provides network security and solves the security challenges existing in the
cloud computing. Most of the time, these have hacked by the people to get the important
information of the users.Tchernykh et al.(2016, p.17) said that it also controls the network traffic
to and from the cloud. The firewall also provides the benefit to allow a specific user to access a
specific set of cloud and computing resources using a specific set of rules and thus improves the
security aspect of cloud. IaaS also helps to protect rogue. It also helps to provide secure
extension and securely connects the enterprise sites to the clouds with the use of static IP
connection (Hussein and Khalid 2016, p.53). It also helps to secure the remote access to
individual’s server. It ensures that individual machine is accessed to cloud by a secure network.
The access is based on credentials that a single user is allocated a single server of the cloud. Is
also provides the benefit of remote VPN access. It allows the employees to securely connect to
the cloud by using the VPN clients. It includes the central authentication of the employees that
verifies the identity prior to providing access to the cloud. Alqahtany et al.(2016, p.443) stated
that IaaS gives the facility of Virtual Local Area Network (VLAN) that is an isolated network
with a private IP subnet and a layer of 2 separation constructs. It provides inter-datacenter
communication between different cloud customers. In this way, it reduces the risk of shared
network. The VPN and VLAN in the IaaS mitigate the security challenges of cloud computing
and thus satisfy the users of cloud computing.
According to Islam et al. (2015, p.479), there are several challenges to the security of data stored
in the cloud. The problems arising due to these challenges have a deep impact on the people. The
data shared by the companies can be highly confidential for the company. The data can be
considered as the intellectual property of the company and the loss of such data may prove
disastrous to the company. Some organizations maintain the records of the confidential data of
Document Page
some individuals, the leakage of such data from the cloud may lead to the misuse of the same. In
that case, the company is subject to punishment for violation of certain laws. The company may
lose the control on the data and it can be accessed by unauthorized people for an unethical
purpose.
Islam et al. (2015, p.479) said that the malware infections may lead to the growth of cyber crime
which is a matter of concern for the people. The data may consist of the codes used for
transactions using debit or credit cards and the loss of such data makes the customers lose trust in
the company. In the case of any kind of data shared by the customers, the customers need to be
sure that the data provided by them is completely secure in the hands of the company. If they are
not confident about this fact, they would stop trusting the company and move to some other
company where they can achieve the sense of security. Other than Kumarand Lu, (2010, p. 51-
56) has asserted that these, the data stored in the cloud may be the development ideas of the
company and the loss of the ideas for a new project of the company may cause a significant loss
in terms of revenue.
Primary Research Methods
In order to perform the entire research, the researcher needs to take certain methods that can be
useful for successfully conducting the study. The primary research needs to be done and the
population needs to be the customers who are using the cloud technology. Based on the feedback
from the customers, the cloud service providers can easily upgrade their technical aspects. In
addition to that, to mitigate the security challenges of the cloud technology, the organizations
need to train their employee in such a way that the intruders find it hard to break into the system.
Therefore, the proper training for the employee needs to be provided by the company. Along
with that, the new and updated technology also needs to be used by the organizations in order to
mitigate the security issues regarding the cloud computing. Therefore, it can be said that, by
implementing these particular methodologies, the security challenges of the cloud computing can
easily be mitigated.
Conclusion
In this research project, the various threats to the security of data stored in the cloud have been
analyzed. The different issues like data integrity, data security, and unauthorized access to the
data have been explored. Also, the manipulation of data and the data hacking have been
Document Page
discussed. A thorough assessment of the impact of the above-discussed issues has been done.
The research context and the aspects of the research, as well as the purpose of the research, have
been clearly defined. The literary review has been done and the methodology of the research has
been properly mentioned.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CHAPTER 3: RESEARCH METHODOLOGY
Mixed methodology
Research methodology assist to present collected information that help to investigator in
systematic way. In this aspect, following are different areas covered:
Research approach
In this aspect, two types of approaches take place such as deductive and inductive. As per
the current research, investigator use inductive research which enable them to conduct research
program with different theories through creating link with data (du Plessis and Van Niekerk,
2014). It also helpful to assess individual performances of workers towards the organisation. In
this way, investigator need to identify issues which customer face at workplace to use this
software's. As per the systematic steps, management can make changes in different services
which assist to perform better functions. In addition to this, theories are also develops which
make proper growth of the company. Beside this, deductive approach is focus on particular
theory that satisfy each person within the environment. (Fletcher, 2017)
Quantitative methods
Quantitative research determines thorough conducting test hypotheses which make
prediction through using measured amount. It describes event figure that create opportunity to
use advance and powerful statistical tests. It will ensure that depth information can betake place
for conducting research program (Davies and Hughes, 2014). There are different types of
quantitative data such as survey, observations and secondary data. With the help of theories,
quantitative data can be ascertain at workplace which is related to hypotheses derived from
estimation and size of population. It is mainly depends on research questions and participants
who are take part in research programs. If there is no feasibility to using quantitative data,
participants and situational characteristic control their influence on the dependency. In this way,
information for cloud computing network can be gather from different strategies such as
experiments, observations and obtaining relevant data from management information system
(Floud, 2013). In broad categories to identify solutions, many times' researcher take in-depth
interviews, observations method and document review.
Qualitative methods
Document Page
Qualitative research describes kind and quality of subject which interpret and attempting
to understand an event. With the help of narrative description, qualitative research purposes can
be implement with statistical procedures to measure kinds and qualities. This research is
typically focus on individual and single person (Neale and Strang, 2015). In this way, researcher
can focus on group and observations with conducting interview program.
Data collection
Data can be collected from two different and important sources such as primary and
secondary. It assists to conduct research in effective way as per the current data availability.
Current data assists to investigator to make sure that they can use primary and secondary sources
for analysis the business environment (Carrera-Fernández, Guàrdia-Olmos and Peró-Cebollero,
2014). Further, survey is also helpful to researcher to know details programs about organisation
and its services and products. In this aspect, the business can deal with secondary data from
journals, articles, online sources and many other things. Primary data can be collected through
questionnaire which assist to provide benefits to each customer. With the help of both sources,
research can be collected in systematic way and it makes solution for research topic. Data
collection within the research, is demonstrates as process which gather and measure information
different variables of interest that establish systematic fashion for stated questions, test
hypotheses and evaluation of outcomes (Kerr, Eckert and Wandwabwa, 2016). Data collection is
very important for quality assurance and control. It will assist to find reliable information for
assess the business performances and outcomes at workplace.
In addition to this, for assess cloud computing network performances, there are different
types of methods can be used such as survey, interviews and many other elements. It will assist
to grow operations and outcomes in systematic way. There are different types of tools which use
by the organisation to collect relevant data from mobile devices, website traffic and server
activities (Clarke, Zheng-Bradley and Flicek, 2017). In this way, researcher cab also take data
with structured, semi structured and unstructured sources that are collected by the firm. Due to
lot of time and money to load big data into traditional elements.
Survey
In survey, every company look towards closely that examines something elements in
systematic way. In this aspect research analysis their records which the have taken for research
program. In this aspect, survey monkey method is used at workplace by researcher to conduct
2
Document Page
online survey which make easier outcomes and performances within the environment (Epstein,
Stone and Quinlan, 2016). It can be consider in creating polls and survey questionnaire to learn
many things which are related for customer satisfaction. With sign up to access library of sample
survey questions, responses can be collected in real time which can be done through tool which
helpful to make effective survey data into the questionnaire. In addition to this, in starting
collection of data assist to make insight information and create professional reports. Beside this,
there are different types of benchmarks can be created to know that where we are stand (Chen
and Zhang, 2014). As results, it assists to compare ourself with industry leaders and assess the
performances which done in accurate manner. It also helpful to identified best practices within
the environment.
Project approach
Project approach is determines as set of teaching strategies which assist to guide
customer regarding cloud computing. It is very complex framework to attract all customer. Thus,
researcher cannot easily make survive in teaching and learning within the interactive processes
(Fernando, Loke and Rahayu, 2013). It is also creating effective process which make sure that in-
depth investigation can be done by researcher. It makes proper attention and efforts towards
entire customer group who take place to make sure that customer demand is change in day to day
activities. Complex issues are also takes place which can be address about choices and decisions.
Project approach is the best element which assist to engage different customer together to reflect
within the community and active participants. It creates interest of researcher and customer as
well who want to support to different activities (du Plessis and Van Niekerk, 2014). As results,
they can easily analysis performances and outcomes in systematic way which grow profitability
at workplace.
Data analysis
This is the important part of research which assist to make proper evaluation of the data
that are collected for research. In this aspect, generally two types of methods can be used such as
hypothesis and thematics. In current research, investigator make use of different thematics.
Questionnaire is develops which includes different areas that assist to know about customer
perception regarding thematics approaches (Carrera-Fernández, Guàrdia-Olmos and Peró-
Cebollero, 2014). With the help of this approach, each customer can easily analysis their
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
outcomes and it will assist to focus on data that collected by researcher. In addition to this, it is
also helpful to develop understanding the data collection from 100 respondents.
Sampling
When researcher gather different types of data, it is very complex to make appropriate
outcomes and performance with evaluation. There are many types of sampling methods take
place which used as probabilistic and non probabilistic for various potential customers (Epstein,
Stone and Quinlan, 2016). It will assist to accomplish more and specific information from
customers who are using services of cloud computing network. In this way sample size will be
taken 100 customers who are using services of cloud computing. This sample size is enough to
come up for solution and appropriate action for the research analysis. There are different types of
sample such as random, stratified and many others. It will assist to grow operations and
outcomes of the business in systematic way. As results, targets and outcomes can be consider in
effective basis which reflect to whole respondents. employability and professional development
(Clarke, Zheng-Bradley and Flicek, 2017).
Random sample is selected by researcher for this analysis which represent for equal
chance of selection means sources that can be book through registration lists. Further, researcher
is also takes telephone interview which is probable select different sample as per the
characteristic and population for matter of chance (Kerr, Eckert and Wandwabwa, 2016. It is also
creative sources which make sure that non-probabilistic sample determines as random estimate
for quota sample. It is also deliberately sets such as proportions of levels in whole research
program. In addition to this, it is an areas and process in which units are selected by whole
research that assist to conduct study for generalize proper results. It is very important to choose
sample that is very complicated for wondering such steps that are helpful to make sure all
elements are signifies within the research program (Carrera-Fernández, Guàrdia-Olmos and
Peró-Cebollero, 2014).
Ethical consideration
In respect to make effective research program, it is very essential to make effectively by
researcher. It determines positive views from the help of different resources which can create
effective results at workplace. In this aspect, researcher can demonstrate their objectives and
goals for identify performances with successful methods. It is also makes sure that value added
in research shows effective understanding and positive results. In this aspect, goals and
4
Document Page
objectives can be assess within the business environment to develops functions and operations in
systematic way (du Plessis and Van Niekerk, 2014).
CHAPTER 4: DATA COLLECTION
4.1 Introduction
In the current chapter, the collected data requires to be analysed in regard to obtain
crucial information about the relevant study. Thus, selecting logical and statistical tool are
considered as effective results in terms of improving the logical understanding of evaluation of
data. In regard to evaluate the data, thematic analysis is being used and thus helps in generating
valid and useful information within research. Here, research is being carried out in relation to
understand the security challenges for consumers regarding cloud computing. Therefore,
analysing the questionnaire it helps in identifying the gaps within the research and thus provides
suitable and reliable information about different security challenges for consumers about cloud
computing.
4.2 Thematic analysis
Theme 1- Gender
Male Female
48
48.5
49
49.5
50
50.5
51
51.5
Column B
Illustration 1: Theme 1
It can be assessed that there are varied number of respondents involved in conducting the
study and thus involves males and females to provide their opinions and reviews regarding the
5
Document Page
conducted study. There are 51 male respondents while 49 of female respondents are selected for
participating in the data collection. However, majority of the respondents are male and thus it
identifies the security challenges for consumers regarding cloud computing. On the other hand,
49 respondents are female who says that organizations need to protect the information or data
saved on cloud computing. There is high range of security challenges being faced by businesses
in regard to protect the information saved on cloud computing.
Theme 2- Service and traffic hijacking is the main security challenge faced by consumers in
cloud computing.
Service and traffic hijackingTrusted transactionHypervisor virusesRisk of multiple cloud tenantsPrivacy
0
5
10
15
20
25
30
35
40
45
50
Column C
Illustration 2: Theme 2
It can be assessed that there are different security challenges being faced by consumers in
cloud computing. Out of 100 respondents majority of the respondent i.e. 44 assesses that security
and traffic hijacking is one of the security challenge being faced by consumers in cloud
computing. Therefore, it is essential for consumers to get their data protected and thus overcome
the security challenges identified within cloud computing. While, there are 12 respondents
evaluates that trusted transaction is considered as an effective approach and thus results in
creating challenges for consumers regarding protecting the information. Also, there are 12
respondents who assesses that hypervisor viruses are one of the effective challenge being faced
6
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
by consumers in cloud computing. Thus, all such challenges are required to be identified in terms
of assessing the security challenges faced by consumers in cloud computing. There are 12
respondents who assesses that risk of multiple cloud tenants is also one of the major issue being
occurred within business in regard to identify the problems faced by consumers. While, privacy
is also one of the major security challenge faced by consumers in cloud computing and thus it
helps in maintaining privacy so that security challenges are considered as the crucial tool that
helps in affecting the data or information saved upon cloud computing. Thus, the major security
challenge is service and traffic hijacking that is considered as security issue faced by consumers
in cloud computing and therefore affects the consumers in varied ways.
Theme 3- Does your organization uses cloud services.
Yes
No
Illustration 3: Theme 3
It can be evaluated that importance of cloud computing is very crucial in carrying out
desired functions. Therefore, it is essential for businesses to adopt cloud services in regard to
store their data and thus use the same whenever required. There are 71 respondents out of 100
who states that businesses uses cloud computing in regard to provide wide range of services in
relation to protect the data or information upon cloud network. Therefore, it is essential for
businesses to use such services that helps in using cloud computing and thus record essential data
or information upon the network and protect it from any theft or loss. While, there are 29
respondents who assesses that their organization do not use cloud services and therefore it saves
7
Document Page
their data upon using preferred languages and thus carry out the services in an effective way.
Thus, majority of respondents helps in selecting cloud services for protecting the information and
thus help them to secure the information and thus carry out the activities.
Theme 4- Increasing computing capacity is the main reason behind choosing cloud
computing.
Flexibility
Increasing computing capacity
Elasticity
Others
0
5
10
15
20
25
30
35
Column B
Illustration 4: Theme 4
Here, ti can be evaluated that 26 out of 100 respondents assesses that flexibility is
considered as the effective way through which main reason behind choosing cloud computing.
Therefore, providing flexibility is considered as appropriate factor that helps in choosing cloud
computing and thus it helps in improving the performance of firm in regard to record the
information in an effective way. Further, there are 30 respondents who assesses that consumers
selects such method i.e. increasing computing capacity helps in selecting the cloud computing
that helps in storing information and data in terms of carrying out appropriate information. Also,
there are 17 respondents who assesses that elasticity is considered as an effective reason which in
terms of choosing cloud computing so that consumers data or information could be stored in an
effective way. Hence, it is significant for firm to undertake such method and thus proves crucial
for businesses to use such method and thus choose cloud computing in terms of enhancing
8
Document Page
business performance. While, there are 27 respondents who select other option because it
involves the main reason behind selecting cloud computing and therefore, selects appropriate
method and thus selects effective measure to choose cloud computing for storing information.
Theme 5- Migrating to the cloud would put security at risk.
Strongly disagree
Disagree
Neutral
Agree
Strongly agree
Illustration 5: Theme 5
It can be assessed that 24 respondents out of 100 respondents disagrees to the fact that
migrating to the cloud computing would put security at risk. Therefore, it is essential for
consumers to understand the risk before migrating to the cloud for keeping the information. It is
at risk and therefore, helps in recording all the necessary information so that success could be
attained. Moreover, there is 1 respondent who is at neutral position and therefore, do not think
that they should migrate or not to the cloud and it would put security at risk. Further, there are 75
respondents who assesses that migrating to the cloud would put security at risk and thus it would
impact upon their information in relation to loss or theft of information. Therefore, it is essential
for respondents to identify the possible reasons that would occur when migrating to the cloud as
it would impact upon the security at risk. Majority of the respondents assesses that migrating to
the cloud would put security at risk and thus record the information in an effective manner.
Theme 6- Reliability is the major concern when it comes to security in the cloud.
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reliability Lack of control Others
0
10
20
30
40
50
60
70
80
90
100
Column B
Illustration 6: Theme 6
It can be evaluated that there are 91 out of 100 respondents who assesses that reliability is
considered as one of the effective concern that helps in providing security in the cloud. Thus, it is
essential for respondents to carry out effective practices and identify the main concern to security
in the cloud. Hence, it is essential for scholar to identify that 4 respondents assesses that lack of
control is also the concern when it comes to security in the cloud and thus carries out effective
practices so that it comes to security in the cloud. Also, 5 respondents chooses other option that
helps in identifying the concerns when it comes to security in the cloud. Therefore, it is essential
for researcher to assess that reliability is the major concern that helps in protecting the
information saved on cloud and thus helps in recording the data so that appropriate information
is being selected in terms of attaining desired success. Majority of the respondents are choosing
reliability option that helps in bringing changes in regard to bring security in the cloud.
Theme 7- Authentication in the cloud is the most suitable method to ensure data security.
10
Document Page
Authentication in the
cloud
Encryption
techniques in cloud
Others
Illustration 7: Theme 7
It can be evaluated that 71 out of 100 respondent evaluates that authentication in the
cloud evaluates that it is one of the crucial method that helps in ensuring data security so that it
helps in improving business performance. It also results in improving firm's success and thus
results in carrying out appropriate information that is being used in regard to adopt suitable
information and thus ensure to protect or secure the data. While, there are 20 respondents who
evaluates that encryption techniques in maintaining data security so that proper measures could
be taken in terms of improving performance of firm in regard to protect way. Further, there are 9
respondents who assesses that authentication of information when storing in the cloud needs to
be done as it helps them to enhance their rights and thus protects the information that could be
further used in order to ensure data security and thus results in carrying out effective results.
Theme 8- Requirements for hardware of virtualization support is the problem which is
faced at the time of protection of data.
11
Document Page
Support for
specific
hardware
Requirements
for hardware of
virtualization
platform
Others (if any)
Illustration 8: Theme 8
It can be assessed that there are 23 respondents who assesses that support for specific
hardware helps in identifying the problems that is being faced in virtualization support. It is also
essential for firm to carry out effective research and thus evaluate the problems being faced by
researcher in regard to evaluate the problems identified in virtualization support and therefore,
helps in assessing that recording data upon cloud computing requires appropriate tool and thus
faces serious issues in terms of improving business performance. Further, there are 48
respondents who evaluates that requirements for hardware of virtualization platform assesses that
it needs to be considered as the major problem being faced in virtualization support and therefore
it is essential to be considered as the major concern in cloud computing. While, there are 29
respondents who selects others option in regard to carry out effective results and thus record the
information upon cloud computing.
Theme 9- Better data safety and control consider as the main advantage of using cloud
computing.
12
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Availability of easy access to hardware and software
Better data safety and control
0
5
10
15
20
25
30
35
40
Column B
Illustration 9: Theme 9
It can be assessed that cloud computing possess effective advantage that helps in
assessing that 21 respondents out of 100 identifies that availability of easy access to hardware
and software is one the crucial advantage which helps in carrying out cloud computing so that
best results could be attained. Therefore, it is essential for business to obtain effective advantage
so that cloud computing helps in carrying out effective result. Also, there are 14 respondents who
assesses main benefit of cloud computing is organizing the data effectively and thus it assesses
that 14 respondents are involved in order to obtain the benefits of cloud computing. Majority of
the respondent assesses that 36 out of 100 respondents evaluates that cloud computing helps in
carrying out better data safety and control and thus helps in improving the business performance
and thus results in carrying out effective results so that best outcomes could be attained. Also,
there are 29 respondents who assesses that access the data anytime of at any location is
considered as another advantage which helps in using cloud computing.
Theme 10- Data protection is considered as the major security issues found within cloud
computing.
13
Document Page
Data protection
Back up
Storing vast data
0
10
20
30
40
50
60
Column B
Illustration 10: Theme 10
It can be evaluated that carrying out the research it helps in assessing that there are varied
security issues found within cloud computing and thus helps in assessing that 55 respondents out
of 100 assess that data protection is one of the major security issue that is occurred within cloud
computing. It is considered as one of the main issue which is being faced by business and
therefore, they need to overcome such issue so that they could store the data effectively within
cloud computing. Further, there are 12 respondents who assesses that back up is another issue
which is being by consumers in regard to store the information within cloud computing. Hence,
it affects the security issue carried out at the time of cloud computing. 33 respondents assesses
that storing vast data is another problem and thus it affects the security issues within cloud
computing. Hence, it is essential for scholar to assess different security issues being faced within
cloud computing. Hence, it is essential to assess the major security issue and therefore, data
protection which helps in affecting the issues and thus carry out cloud computing in an effective
way.
Theme 11- Free to save vast data helps cloud providers to improve the familiarity of cloud
services among consumers.
14
Document Page
Free to save vast
data
Promoting cloud
computing
Others (please
specify)
Illustration 11: Theme 11
It can be assessed that cloud providers could help in improving the familiarity of cloud
services among consumers and thus 44 respondents out of 100 evaluates that it needs to be
provided free to save vast data. Therefore, it is considered as an effective approach in regard to
improving the familiarity of cloud services among consumers and thus improve the performance
of firm in market. While, there are 39 respondents that assesses that promoting cloud computing
assists in increasing the familiarity of cloud services and thus helps consumers to increase the
cloud computing. Also, 17 respondents assesses that there are several other methods that could
be used in regard to promote the familiarity of cloud services among consumers. Therefore, it is
essential for business to adopt effective strategy and thus helps in improving the popularity of
cloud services among consumers and therefore it results in carrying out the services in an
effective way. Majority of the respondents help in free to save the vast data and thus protect the
cloud providers in regard to improve the familiarity of cloud services among consumers.
Theme 12- Company is using different security techniques at the time of transferring data
within cloud and home network.
15
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
0
5
10
15
20
25
30
35
40
45
50
Column B
Illustration 12: Theme 12
It can be stated that businesses are using effective security techniques at the time of
transferring data within cloud and home network and thus there are 65 respondents out of 100
assesses that respondents strong agree to the fact and thus they use effective security techniques
at the time of transferring the data within cloud and home network. Therefore, it is essential for
business to use appropriate network strategy and thus results in carrying out transferring of data
within cloud and home network. There are no respondents who are at neutral position it means
that they neither agree not disagree to the fact. Further, there are 35 respondents who strongly
disagree to the fact that using different security techniques at the time of transferring data within
cloud and home network assists in identifying the different security techniques that aims to
transfer the data within cloud and home network and thus assists in improving the security issues
at the time of transferring data within cloud and home network.
Theme 13- Cloud provider are required to develop trust among consumers regarding
protecting the privacy of data.
16
Document Page
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
Illustration 13: Theme 13
It can be assessed that 55 respondents are required to develop trust among consumers in
regard to protect the privacy of data and thus it helps them to protect the information which help
ins safeguarding the privacy of data and thus it helps them to improve the performance of firm in
market. Therefore, it is essential for cloud provider to develop trust among consumers regarding
protecting the privacy of data. Therefore, it is essential for researcher to undertake effective
practices and thus results in protecting the privacy of data. There is 0 respondent that agrees or
disagrees to the fact that developing trust among consumers regarding protecting the privacy of
data and thus helps in protecting the information and developing trust so that it helps in
consuming regarding protecting the privacy of data. There are 45 respondents out of 100 that
helps in developing trust and developing consumers regarding protecting the privacy of data and
thus results in providing crucial information so that trust could be developed in regard to
improve the performance of firm in market.
Theme 14: Businesses are required to protect theft of data through using proper data
protection methods
Do you think that businesses are required to protect theft of data through
using proper data protection methods?
Frequency
Yes 78
No 22
17
Document Page
Description: As per the findings, it can be stated that customers understand the
importance of being protected by the organization. There are different type of issues that are
being faced by business due to which the performance of the firm negatively affects. As per the
data collected from customers, it has been identified that there are about 78 of the customers who
think that business are required to protect theft of data through using proper data protection
methods. On the other hand, there are 22 of the customers who does not think this way. There are
different set of system that are adopted by companies to make their data protected. In this
context, effective systems should be used in order protected the personal information.
Theme 15: Security issue is being mostly faced by consumers when storing data on cloud
computing
Which of the security issue is being mostly faced by consumers when
storing data on cloud computing?
Frequency
Data access control 12
Data theft 42
Data integrity 20
18
Yes No
0
10
20
30
40
50
60
70
80
90
78
22
Frequency
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Data location 26
Description: As per the above conducted data, is can be determined that there are about
12 of the customers who think that data access control can be determined as the main issue that
are being faced customers when the data is being stored in cloud computing. Further, there are 26
of the service users who think that data location is the main issue. Further, there are 20 of the
customers who think that the main issues that are faced in protecting the information in cloud
computing is data theft. As per the findings, it can be determined that the rate of data theft is
raising at an increasing rate. It is important to consider all the aspect by the firm so that better
and high quality services can be provided by to customers.
Theme 16: The major legal issues faced by businesses in cloud computing contracts
What are the major legal issues faced by businesses in cloud computing
contracts?
Frequency
Protection of information 51
Liability towards consumers 25
Managing performance 24
19
12
42
20
26
Data access control
Data theft
Data integrity
Data location
Document Page
Description: From the above collected questionnaire, it can be stated that there are 24 of
the customers who think that the main legal issues that are faced by them is related with
managing performance. Further, there are 25 of the employees who think that the liability
towards consumers is the major issues. However, the majority of the people think that the main
legal issue faced by business in cloud computing contract is protection of information. All the
information that are protected in cloud should be managed in such a way all the people are able
to make sure that their data is safe and secured. This is effective way to develop positive
perception within customers.
20
51
25
24
Protection of information
Liability towards consumers
Managing performance
Document Page
CHAPTER 5: CONCLUSION AND RECOMMENDATIONS
5.1 Conclusion
It can be articulated from the study that through carrying out dissertation it helps in
identifying different issues related to security challenges faced by consumers and thus protect the
data or information in regard to carry out cloud computing. Therefore, it is essential for
researcher to identify the crucial issues and thus protect the data which could affect the security
and require to protect the information that is carried out within business. Hence, it is significant
for firm to identify the security challenges that affecting the cloud computing. It is essential for
firm to adopt effective legal and regulatory bodies so that it helps in protecting cloud computing
as well as information that is put upon the network so that issues related to theft and loss of data
could be avoided. Also, there are different threats being faced by researcher in regard to provide
solutions regarding protecting the data and thus overcome security challenges so that threats
could be avoided.
Moreover, proper safety issues need to be provided in regard to safeguard the data and
thus overcome the security challenges and thus threats could be avoided in regard to overcome
the issues being faced by researcher. Also, it is essential for scholar to develop effective trust and
relationship and thus bring required changes so that security issues could be attained. Thus, it
helps in protecting the information and carrying out effective cloud computing that results in
providing appropriate information so that it could avoid the issues faced by firm. It is the best
way through which service provider assists in making effective development and thus attain
desired results so that cloud computing helps in protecting the information in regard to perform
the task in an effective way.
5.2 Recommendations
It involves different elements that suggests consumers to undertake effective security
challenges and thus protect consumers regarding safeguarding the information and data. Further,
researcher should protect the data and information in regard to carry out effective security
challenges and thus results in improving the business performance in market. It is suggested that
security challenges focuses upon protecting the data or loss of threat which results in creating
back up of information and thus use the file in regard to carry out effective security issues. Also,
in regard to protect the information and thus carry out effective responsibility of securing the
21
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
information and data. Also, it is recommended that using effective security challenges helps in
avoiding that security and safety helps in improving the performance of firm in market. It is
essential for firm to undertake effective practice and thus recommend that security and safety
issues results in improving the performance and thus measure their performance in an effective
way.
Also, it is recommended that carrying out effective security challenges for consumers
regarding cloud computing. Thus, it is significant for business security challenges in regard to
improve the performance in regard to carry out effective business practices so that best results
could be attained. Business should execute security challenges and thus safeguard the data or
information in regard to improve the performance of firm in market. It is significant for firm to
adopt effective strategy so that security need to be maintained in regard to protect the cloud
computing and thus safe the information in relation to carry out effective results so that best
success could be attained.
22
Document Page
REFERENCES
Books and Journals
Accumulo, A., Cassandra, A., Giraph, A., Hadoop, A. and Storm, H.A., (2016). AWS, 175
dynamoDB, 559 EC2, 559 elastic cloud computing, 301, 302, 559 elastic compute cloud,
18–19. policy, 420(421), p.424-428.
Alqahtany, S., Clarke, N., Furnell, S. and Reich, C., (2016). A forensic acquisition and analysis
system for IaaS. Cluster Computing, 19(1), pp.439-453.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M.
(2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
Bokhari, S.M.A., Azam, F. and Abbas, M., (2015). Limitations of Service Oriented Architecture
and its Combination with Cloud Computing. Bahria University Journal of Information &
Communication Technology, 8(1), p.7-15.
Calheiros, R. N., Ranjan, R., Beloglazov, A., De Rose, C. A., & Buyya, R. (2011). CloudSim: a
toolkit for modeling and simulation of cloud computing environments and evaluation of
resource provisioning algorithms. Software: Practice and Experience, 41(1), 23-50.
Carrera-Fernández, M. J., Guàrdia-Olmos, J. and Peró-Cebollero, M., 2014. Qualitative methods
of data analysis in psychology: an analysis of the literature. Qualitative Research. 14(1).
pp.20-36.
Chen, C. P. and Zhang, C. Y., 2014. Data-intensive applications, challenges, techniques and
technologies: A survey on Big Data. Information Sciences. 275. pp.314-347.
Clarke, L., Zheng-Bradley, X. and Flicek, P., 2017. The international Genome sample resource
(IGSR): A worldwide collection of genome variation incorporating the 1000 Genomes
Project data. Nucleic acids research. 45(D1). pp.D854-D859.
ComPUtING, C. (2011). Cloud computing privacy concerns on our doorstep. Communications of
the ACM, 54(1), 36-38.
Davies, M. B. and Hughes, N., 2014. Doing a successful research project: Using qualitative or
quantitative methods. Palgrave Macmillan.
Devi, T. and Ganesan, R., 2015. Platform-as-a-Service (PaaS): Model and Security Issues.
Indonesian Journal of Electrical Engineering and Computer Science, 15(1), pp.151-161.
23
Document Page
du Plessis, H. and Van Niekerk, A., 2014. A new GISc framework and competency set for
curricula development at South African universities. South African Journal of Geomatics.
3(1). pp.1-12.
Epstein, L., Stone, N. D. and Quinlan, G., 2016. Comparison of Data Collection for Healthcare-
Associated Infection Surveillance in Nursing Homes. Infection Control & Hospital
Epidemiology. 37(12). pp.1440-1445.
Fernando, N., Loke, S. W. and Rahayu, W., 2013. Mobile cloud computing: A survey. Future
generation computer systems. 29(1). pp.84-106.
Fletcher, A. J., 2017. Applying critical realism in qualitative research: methodology meets
method. International Journal of Social Research Methodology. 20(2). pp.181-194.
Floud, R., 2013. An introduction to quantitative methods for historians. Routledge.
Hussein, N.H. and Khalid, A., (2016). A survey of Cloud Computing Security challenges and
solutions. International Journal of Computer Science and Information Security, 14(1),
p.52-58
Islam, T., Manivannan, D. and Zeadally, S., (2015). A Classification and Characterization of
Security Threats in Cloud Computing. INTERNATIONAL JOURNAL OF NEXT-
GENERATION COMPUTING, 7(1), pp.478-480.
Jafarpour, S. and Yousefi, A., (2016). Security Risks in Cloud Computing: A Review.
Jumagaliyev, A., Whittle, J.N.D. and Elkhatib, Y.S.S.A., (2016). Evolving multi-tenant SaaS
cloud applications using model-driven engineering
Kaur, M. and Kaur, K., (2016). A Comparative Review on Data Security Challenges in Cloud
Computing.
Kerr, R., Eckert, L. O. and Wandwabwa, J., 2016. Postpartum haemorrhage: Case definition and
guidelines for data collection, analysis, and presentation of immunization safety data.
Vaccine. 34(49). pp.6102-6109.
Kumar, K., & Lu, Y. H. (2010). Cloud computing for mobile users: Can offloading computation
save energy?. Computer, 43(4), 51-56.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—
The business perspective. Decision support systems, 51(1), 176-189.
Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. Communications of the
ACM, 53(6), 50.
24
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.
Neale, J. and Strang, J., 2015. Blending qualitative and quantitative research methods to optimize
patient reported outcome measures (PROMs). Addiction. 110(8). pp.1215-1216.
Pancholi, V.R. and Patel, B.P., (2014). Enhancement of Cloud Computing Security with Secure
Data Storage using AES. International Journal for Innovative Research in Science and
Technology, 2(9), pp.18-21.
Priya, B., Kaur, S. and Kaur, R., (2016). Services in Cloud Environment and Security Issues.
Rittinghouse, J.W. and Ransome, J.F., (2016). Cloud computing: implementation, management,
and security. CRC press.
Rittinghouse, J.W. and Ransome, J.F., (2016). Cloud computing: implementation, management,
and security. CRC press.
Shiau, W.L. and Chau, P.Y., (2016). Understanding behavioral intention to use a cloud
computing classroom: A multiple model comparison approach. Information &
Management, 53(3), pp.355-365.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of
cloud computing. Journal of network and computer applications, 34(1), 1-11.
Tchernykh, A., Lozano, L., Schwiegelshohn, U., Bouvry, P., Pecero, J.E., Nesmachnow, S. and
Drozdov, A.Y., (2016). Online bi-objective scheduling for IaaS clouds ensuring quality of
service. Journal of Grid Computing, 14(1), pp.5-22.
Wang, Cong, Qian Wang, Kui Ren, and Wenjing Lou. "Privacy-preserving public auditing for
data storage security in cloud computing." In INFOCOM, 2010 Proceedings IEEE, pp. 1-9.
Ieee, 2010.
Yesilyurt, M. and Yalman, Y., (2016). New approach for ensuring cloud computing security:
using data hiding methods. Sādhanā, 41(11), pp.1289-1298.
Yu, S., Wang, C., Ren, K., & Lou, W. (2010, March). Achieving secure, scalable, and fine-
grained data access control in cloud computing. In Infocom, 2010 proceedings IEEE (pp. 1-
9). Ieee.
25
Document Page
Appendix
Questionnaire
Name
Age
Gender
Male
Female
What are the different security challenges faced by consumers in cloud computing?
Service and traffic hijacking
Trusted transaction
Hypervisor viruses
Risk of multiple cloud tenants
Privacy
Does your organization uses any cloud services?
Yes
No
What is the main reason behind choosing cloud computing?
Flexibility
Increasing computing capacity
Elasticity
Others
Do you think migrating to the cloud would put security at risk?
Strongly disagree
Disagree
Neutral
Agree
Strongly agree
What do you think are concerns when it comes to security in the cloud?
Reliability
Lack of control
Others
26
Document Page
What is the most suitable method to ensure data security?
Authentication in the cloud
Encryption techniques in cloud
Others
What type of problems you face in virtualization support?
Support for specific hardware
Requirements for hardware of virtualization platform
Others (if any)
According to you what are the main advantages of using cloud computing?
Availability of easy access to hardware and software
Organizing the data effectively
Better data safety and control
Access the data anytime or at any location
Which one according to you is major security issues found within cloud computing?
Data protection
Back up
Storing vast data
Through which way cloud providers could improve the familiarity of cloud services among
consumers?
Free to save vast data
Promoting cloud computing
Others (please specify)
Do you agree that company is using different security techniques at the time of transferring data
within cloud and home network?
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
Cloud provider are required to develop trust among consumers regarding protecting the privacy
of data?
27
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Strongly agree
Agree
Neutral
Disagree
Strongly disagree
Do you think that businesses are required to protect theft of data through using proper data
protection methods?
Yes
No
Which of the security issue is being mostly faced by consumers when storing data on cloud
computing?
Data access control
Data theft
Data integrity
Data location
What are the major legal issues faced by businesses in cloud computing contracts?
Protection of information
Liability towards consumers
Managing performance
Recommend crucial ways through which security challenged could be overcome for consumers
regarding using cloud computing?
______________________________________________________________________________
______________________________________________________________________________
___________________________________________________________________________
28
chevron_up_icon
1 out of 38
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]