In this section, the paper will look into the study research design, the study area, population and the sample population, the sampling technique, the data collection instruments and the methods of data analysis.
The purpose of this assignment is to identify an appropriate methodology for our research topic related to privacy preservation in cloud computing
This document is structured as follows. First a review, analysis and summary of the existing methodologies reported in the collected literatures will be given. Then, the methodology to be used will be proposed to solve the selected research problem. My research will adopt. There were three peer reviewed articles on cloud computing that were analyzed in the literature review to collect necessary data and make a solid conclusion on the issue of privacy and security in cloud computing.
There are several privacy issues linked with cloud computing. This issue has raised a lot of concern as people are losing sensitive information to malicious individuals who use these data for their own benefit and to cause harm.
Reorganized Collected Literature
Research Problem |
Sub-problem |
Collected Literature |
Problem 1 |
Sub-problem 1 |
Literature 1 Literature 2 … |
Privacy issues linked with cloud computing |
The issues of privacy in cloud computing can be grouped into two; that is privacy issues that clients using the cloud network face and the security issues that cloud computing service providers face. |
1Reorganized collected literature
There are several research methodologies but the two most common research methodologies include qualitative and quantitative research. Qualitative research is basically an investigation. The use of qualitative research is to improve the comprehension of vital details, opinions, and inspirations. The qualitative research approach conveys visualizations into the problematic or assists in growing of thoughts or grounds for probable quantitative research.
Additionally, qualitative research is useful in exposing tendencies in hypothesis and thoughts, and dive deeper into the issue in question.
The collected data differs in terms of their forms and structure. Some of the shared approach of qualitative research design include a focus on collections, contribution and distinct conferences.
On the other hand, quantitative Research is utilized to specify issues by strategy for delivering statistical data or information that can be moulded into reasonable figures. It is utilized to measure arrogances, considerations, performances, and other particular factors and misrepresent results from a more noteworthy sample population. Quantitative Research utilizes quantifiable data to express facts and find outlines in analysis. Quantitative information gathering approaches are inexhaustible more composed than Qualitative information gathering approaches. Quantitative information gathering approaches include various strategies for reviews.
Likewise, In quantitative research the point is to determine the connection between a certain independent variable and another dependent variable in a population. Quantitative research outlines are either enlightening (subjects typically estimated once) or trial (subjects estimated when a treatment). A graphic report sets up just relationship between factors. An experiment builds up causality. For a precise gauge of the connection between variables, an sample study for the most part needs an hundreds or even a thousands of subjects; a trial, particularly a hybrid, may require just several subjects. The gauge of the relationship is more averse to be one-sided on the off chance that you have a high cooperation rate in an sample chosen haphazardly from a population. In tests, bias is additionally more improbable if subjects are arbitrarily allocated to treatments, and if subjects and specialists are oblivious to the character of the treatment. In all experiments, subject qualities can influence the relationship one is researching. Limit their impact either by utilizing a less heterogeneous sample of subjects or ideally by estimating the attributes and incorporating them in the investigation.
Qualitative data is the one which can only be described but not measured, whereas quantitative data can be measured. So, the qualitative data develop a hypothesis, while the quantitative research test the hypothesis by means of statistical analysis.
This paper will make use of qualitative research methodology because the method is every so often viewed as a antecedent to quantitative research, as it is generally used in the generation of possible ideas and leads that are useful in formulation of realistic and testable hypothesis. This hypothesis can subsequently be much more comprehensively tested and analyzed mathematically using standard quantitative methods of research. Basing on this reason, qualitative methods are usually related to survey design methods as well as individual case studies as a method of reinforcing and evaluating findings.
I will make use of qualitative methodology as it helps in comprehension of views and perspectives. The method offers clear vision to diverse issues in addition to developing theories and concepts of likely quantitative research.
With detailed analysis looking into problems, the qualitative approach also would help in discovering individual and new thoughts towards the subject matter. The method makes use of different kinds of structured and semi structured approaches to data collection including discussions, interviews, journal exercises and the participation of others.
Data security will be the main issue the research paper will focus on.
The prime goal of the cloud computing service providers is to give sufficient security to its clients as the services are utilized in important business endeavors and also in government associations. Be that as it may, it is discovered that there are several issues identified with the integration of the cloud computing in various kinds of undertakings, for example, the security issues, information issues, legal issues and dependability issues.
Xia et al. (2016) notes that there are two classifications of issues in a company one from the perspective of the inner partners and the other is from the perspective of the outer partners. The cloud computing is utilized to store and recover vital data, essential projects and frameworks up and running into the server.
Furthermore, Sun et al. (2014) emphasizes that the security issues related with cloud computing are of numerous kinds, for example, the risks originating from the merchants of the distinctive endeavors who utilize cloud servers for a significant lot of time and furthermore from the global legal information exchange between two associations.
Similarly, Tari et al. (2014) outlines that cloud computing is one of the strategies by which the internal and in addition the outer partners of an undertaking speak with one another to achieve higher efficiency for the association. It very well may be seen that in a few circumstances the vendors of an organization need to give a type of security to the customers on the security issue, thus varied forms of cloud computing infrastructure such as IaaS is required. Be that as it may, there are diverse sorts of security issues related with each cloud computing services as outlined below;
Relevance of the Research Problem
The research problem, that is security of data with advancement of IT infrastructure is of high relevance. The paper is useful in discussing on data integrity, data confidentiality, data privacy and data availability
Literature # |
Research Problem |
Methodology |
Your Sub-problem |
Relevance |
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. |
For the purposes of preserving privacy of data, sensitive images have to be encrypted before outsourcing thus making the plain text sphere to be ineffectual |
Qualitative approach was used to researching on different forms in which data have been encrypted and stored to enhance data security. |
Data encryption is yet to be wholly used by organizations. Data encryption and decryption is challenging for most users of IT infrastructure. |
High – data encryption is particularly relevant to enhance privacy and security of information. |
Data security and privacy in cloud computing. |
Data security has constantly been the main problem in information technology. Within the environment of cloud computing, Data security has become above all serious since the data is located in different places on the internet. |
Qualitative approach was used looking into detail different research materials to discuss data integrity, data confidentiality, data privacy and data availability |
Security of data has been an issue of concern with many platforms requiring permission to access personal data |
High – The paper is useful in discussing on data integrity, data confidentiality, data privacy and data availability |
Security and Privacy in Cloud Computing |
Cloud computing has evolved to be a hotspot for almost every industry thereby attracting cyber criminals who use the platform for their malicious activities. |
Qualitative research approach by evaluating previous research work on issues surrounding cloud computing. |
Access to confidential data by unauthorized people. Manipulation of data/information for cyber-crimes thereby encouraging increase in number of cyber criminals |
High – Security and privacy of data is a cause of concern since malicious people can use data to cause harm. |
Summary of reviewed methodologies
In this section, the paper will look into the study research design, the study area, population and the sample population, the sampling technique, the data collection instruments and the methods of data analysis.
My research will adopt. There were three peer reviewed articles on cloud computing that were analyzed in the literature review to collect necessary data and make a solid conclusion on the issue of privacy and security in cloud computing.
Benefits and Limitations
Benefits of the study
The study is beneficial as it incorporates information from various sources useful in providing a deep understanding of issues surrounding cloud computing technologies
In this study, the perceptions, opinions and options of all stakeholders involved with the use of Information technology infrastructure are sought and taken into account to give outline some of the most significant issues in cloud computing.
Framework and Explanation
Research design
The paper a qualitative research design approach given that the approach best served to answer the questions and the purposes of the study. The qualitative research is one in which several research articles on the topic in question are studied by evaluating the data collected which is considered to be representative of the subject matter. This is to say, only sample research documents are studied, and findings from these articles are expected to be generalized to the entire research.
Given that a qualitative approach was used, there was no specific target population under study. Literature review of previous research articles was used for the study.
The method of data collection for this research study is literature review of cloud computing related articles. A qualitative review is to be used as the approach is efficient than quantitative method and t would convey visualizations into the problematic or assists in growing of thoughts or grounds for probable quantitative research.
Additionally, qualitative research is useful in exposing tendencies in hypothesis and thoughts, and dive deeper into the issue in question.
The information collected from the literature review were analyzed field were analyzed. A bar graph was used to showcase difference in opinion of issues that were recognized as pertinent to cloud computing
List of References
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Aljawarneh, S.A., Alawneh, A. and Jaradat, R., 2017. Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems, 74, pp.385-392.
Fu, Z., Sun, X., Liu, Q., Zhou, L. and Shu, J., 2015. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), pp.190-200.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.
Gupta, U., Saluja, M.S. and Tiwari, M.T., 2018. Enhancement of Cloud Security and removal of anti-patterns using multilevel encryption algorithms.
Hossain, M.A. and Taslima, S., 2016. A Study on Threatened Risks for Cloud Computing Security & How to Overcome These Risks. International Journal, 6(4).
Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K. and Choo, K.K.R., 2016. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, pp.98-120.
Kaleeswari, C., Maheswari, P., Kuppusamy, K. and Jeyabalu, M., 2018. A Brief Review on Cloud Security Scenarios.
Li, Y., Gai, K., Qiu, L., Qiu, M. and Zhao, H., 2017. Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, pp.103-115.
Majeed, A., Bhana, R., Haq, A., Kyaruzi, I., Pervaz, S. and Williams, M.L., 2016. Internet of Everything (Ioe): Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets). International Journal of Advanced Computer Scienceand Applications (IJACSA), 7(3).
Sun, Y., Zhang, J., Xiong, Y. and Zhu, G., 2014. Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), p.190903.
Tari, Z., Yi, X., Premarathne, U.S., Bertok, P. and Khalil, I., 2015. Security and privacy in cloud computing: Vision, trends, and challenges. IEEE Cloud Computing, 2(2), pp.30-38.
Tari, Z., 2014. Security and Privacy in Cloud Computing. IEEE Cloud Computing, 1(1), pp.54-57.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X. and Ren, K., 2016. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), pp.2594-2608.
Wood, M., 2017. How to make SD-WAN secure. Network Security, 2017(1), pp.12-14.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download