Data Security: Analysis of Effect of Cloud Computing

Data Security
Data Security

Want help to write your Essay or Assignments? Click here

Data Security: Analysis of Effect of Cloud Computing

Cloud Computing: Security, New Opportunities and Challenges

Section 1: Topic Endorsements

Cloud computing has been a very successful invention. It has created new opportunities for businesses in terms of storage spaces, access to software and other facilities. Additionally, many businesses have stated that they feel that their data is more secure if it is held in a cloud (Pearson and Yee, 2013). However, just as many businesses and experts have stated that cloud computing exposes data and makes businesses vulnerable in terms of data security (Ali, Khan and Vasilakos, 2015).

For computer scientists, understanding security issues as they relate to cloud computing is important for several reasons (Ali et al., 2015). The first and most important is the fact that in the future, any establishment will likely, partly or entirely, depend on cloud computing for storage of data (Mahmood, 2014). As a computer specialist, a computer scientist will be relied upon to monitor data, ensure security and make necessary adjustments where they are required (Verma and Kaushal, 2011).

Want help to write your Essay or Assignments? Click here

Section 2: Research Overview

The research literature on cloud computing indicates that we know cloud computing, even though safer than botnets, has created unexpected side channels because it is a shared resource (Verma and Kaushal, 2011). We also know that security incidences related to data computing are not unique, just different (Flinn, 2012). However, we do not know exact ways on how to improve data security within oud computing. However, several measures such as passwords, can be used to improve security (Pearson and Yee, 2013).

Cloud computing means that the devices used to provide required computing services do not belong to the end users (Krutz and Vines, 2010). As a result, users do not have control over how these devices are operated or who has access to them (Zhu, Hill and Trovati, 2015). Research regarding cloud computing has been extensive over the last decade as the service has continued to become more common among businesses and individuals. With each security development made, new ways to breach security come up as well (Samani, Honan, Reavis, Jirasek and CSA, 2015).

The basic research question is whether cloud computing has led to the increase or decrease of data security in enterprises, since it has become a business necessity (Nepal, Pathan and SpringerLink, 2014). The purpose of the study is to provide insight on cloud computing and how best to ensure data security. The methodology suggested for this research is equation methodology. Similarly, Moustakas- transcendental phenemonology is the suggested research model. With this in mind, the dissertation title becomes; Cloud Computing: Security, New opportunities and challenges (Schwarzkopf, Schmidt, Strack, Martin and Freisleben, 2012).

References

Ali, M., Khan, S. U., & Vasilakos, A. V. (June 01, 2015). Security in cloud computing:     Opportunities and challenges. Information Sciences, 305, 1, 357-383.

Flinn, J. (2012). Cyber foraging: Bridging mobile and cloud computing. San Rafael, Calif.: Morgan & Claypool.

Samani, R., Honan, B., Reavis, J., In Jirasek, V., & CSA (Organization),. (2015). CSA guide to cloud computing: Implementing cloud privacy and security. Waltham, MA: Syngress

Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Indianapolis, Ind: Wiley Pub.

In Zhu, S. Y., In Hill, R., & In Trovati, M. (2015). Guide to security assurance for cloud computing.

In Mahmood, Z. (2014). Cloud computing: Challenges, limitations and R & D solutions.

Pearson, S., & Yee, G. (2013). Privacy and security for cloud computing. London: Springer.

In Nepal, S., In Pathan, M., & SpringerLink (Online service). (2014). Security, Privacy and Trust  in Cloud Systems. Berlin, Heidelberg: Springer Berlin Heidelberg.

Verma, A., & Kaushal, S. (January 01, 2011). Cloud Computing Security Issues and Challenges:  A Survey.

Schwarzkopf, Roland, Schmidt, Matthias, Strack, Christian, Martin, Simon, & Freisleben, Bernd. (2012). Increasing virtual machine security in cloud environments. (BioMed Central Ltd.) BioMed Central Ltd.

Want help to write your Essay or Assignments? Click here

Author: admin

This is author biographical info, that can be used to tell more about you, your iterests, background and experience. You can change it on Admin > Users > Your Profile > Biographical Info page."

Unlike most other websites we deliver what we promise;

  • Our Support Staff are online 24/7
  • Our Writers are available 24/7
  • Most Urgent order is delivered with 6 Hrs
  • 100% Original Assignment Plagiarism report can be sent to you upon request.

GET 15 % DISCOUNT TODAY use the discount code PAPER15 at the order form.

Type of paperAcademic levelSubject area
Number of pagesPaper urgencyCost per page:
 Total: