Tuesday, May 5, 2020

Security and Privacy Challenges in Cloud Computing †Free Samples

Question: Discuss about the Security and Privacy Challenges in Cloud Computing. Answer: Introduction: I have executed this business research program on the topic Advantages and disadvantages of cloud computing for businesses. I have discussed the increasing use of cloud computing in the business along with the advantages and disadvantages associated with the use of cloud computing for businesses. Technology is widely being used by the businesses with a motive to gain a competitive advantage over the others in the industry. I have discussed the concept of cloud computing which is facilitating storage of the data in the space (Feng, et. al., 2011). Companies are looking for storage mediums for storing the data of the company at a safe and secure platform. I have framed an objective on the basis of which information related to the research program has been gathered. The objective behind conducting the research program is to advantages business is gaining from investing in the cloud computing and challenges faced due to cloud computing (Catteddu, 2010). I have defined a project scope according to which this research has covered the advantages business has realized from the use of cloud computing in the daily operations as well as disadvantages acting as a challenge for businesses using cloud computing. I have developed knowledge of the different aspects related to cloud computing and factors which motivate the business to use cloud computing. I have gathered quality data for the purpose of gaining a better understanding of the concept. I have analyzed different examples of the companies of the real world which are using cloud computing for enhancing the effectiveness of the operations and enhancing the performance (Takabi, et. al., 2010). I have understood that businesses are using cloud computing with a motive to deliver smooth technological services to the customers all around the globe. With the change in business environment, there has been a change in the manner data or information is stored by the business. I have understood t hat these changes in the business environment have resulted in increasing use of cloud computing by businesses (Zhang, et. al., 2010). I have developed knowledge of the various advantages and disadvantages of using cloud computing for businesses. These advantages of using cloud computing include storing the data at a common platform which is safe and secure, minimising the cost of the business involved in storing the data, ease of accessibility of data anytime, enhancement I the productivity of the services and from anywhere, reduction in the chances of error or duplicity as data is being managed from a single computer and retrieval of the data is fast (Sultan, 2010). Disadvantages of using cloud computing are lack of privacy, a threat to the confidentiality which is against the interest of the company, increase the need for technical staff for performing the operations and increase in the financial implications on the part of the business. I have analyzed different cases which proves that use of cloud computing has increased the chances of a threat to privacy and confidentiality. For the purpose of coping with this issue of threat to privacy and confidentiality, proper techniques or measures need to be applied (Subashini Kavitha, 2011). I have gathered data on the basis of the research questions and objectives set for the research program. For gathering quality and authentic data, I have used secondary sources of data collection. Secondary data has enhanced the reliability of the data discussed in this research program. Various books, articles, newspapers, journals, magazines, companys annual reports and other internet sources have been used for collecting data. Knowledge gained during the execution process of this research program has enhanced the skills and knowledge which will help me throughout my life (Chawla Sodhi, 2011). I have gained knowledge of the manner in which a research program has to be conducted. I have taken help from the internet sources which have guided my efforts in the right direction. This learning process has encouraged for performing the research programs in future in a better manner. I found this research program very useful which has formed a base for the future programs I will initiate for meeting the career goals (Danping Lee, 2011). I have come across that conducting a business research has developed my knowledge as well developed my skills which I will apply in future for attaining the goals set. Cloud computing is a trending aspect of the business environment and having knowledge of this will help me in taking better decisions for the management or storing the data. Management of data or information is crucial in this business environment as a threat to confidentiality is increasing. This knowledge has helped in completing this research program effectively and fulfilling the objectives of the business (Hofmann Woods, 2010). Completion of this research was required for attaining the objectives of the program. This knowledge will be used in the future career as knowledge of the trending aspects of the business environment for working effectively. Different roles and responsibilities are assigned to an individual for meeting the goals of the future career. Knowledge of the current trending aspects of the busines s environment will help me in fulfilling the future roles and responsibilities which are part of a future career in a better manner (Kuada, 2012). I have conducted this research program in a sequence for ensuring that the research is completed in an effective manner by covering every aspect. I have prepared a research plan on the basis of which research has been conducted. This research plan or schedule has provided a direction to me while conducting this research and ensuring that the research is performed without skipping out any important aspect which could have affected the successful completion of the research. I have selected the research topic and gathered data related to the research topic. I have learned about different methods or techniques which are being used by the researchers for conducting the research successfully and within the time frame. Challenge faced while conducting this research program was the completion of the research within the limited time available. For coping with this challenge, I have effectively used research methods or techniques (Aljabre, 2012). This research is very useful which has shaped my knowledge in a better manner regarding the research topic. I have understood that there is a need to consider different factors while selecting cloud computing for the business. These factors have the potential to create positive as well as negative impact on the business. Positive factors which I have analyzed include a reduction in the cost and increase in saving, enhancing the speed of the performing the functions of the business, enhancement in the productivity of the business and enhances the reliability as a backup of data can be created with the use of cloud computing. Negative factors which I have analyzed are lack of suitability for everyone, limited connectivity as cloud computing is dependent on the internet, lack of security and lack of customer support. I have used qualitative method for collecting data for the research. I have selected two major organizations of this area and name of the organizations are IBM and Google ( Armbrust, et. al., 2010). Secondary data has been collected which is second-hand data and is a reliable form of data which has contributed towards the quality of the research. Authentic sources have been used for this research program. Reliability and validity are important for every research as these factors together determine the quality of the research. I have identified few limitations while conducting this research. These limitations are related to data collection process, analysis of the data and maintaining the reliability and validity of the collected data for the research. Time schedule has been prepared by me for the identification of the different activities of this research and identifying the time which will be required for completing the activities (Chawla Sodhi, 2011). I have conducted this research in a systematic manner for ensuring that the research is focused on the goals set. For the attainment of the objective of the research, it was crucial to divide the research into different activities. These activities have ensured that the research has been conducted as per the plans and is moving in the right direction. Assignment one has covered the literature review part, objectives and scope which have formed a base for the concept of cloud computing. Assignment two has covered the research methodology section and summary of the literature review. This methodology section has developed my knowledge regarding the various approaches which can be used for conducting the research, collecting data, analyzing the collected data and forming conclusions on the basis of analyzed data (Danping Lee, 2011). I have understood that the research learning process is important as this enhances the learning and knowledge. This business research has encouraged and prepared me for conducting research programs in future for attaining the objectives. I will use this knowledge gained from the execution of this research program for conducting research in future. For attaining success in the future as a profession, there is a need to gather data of the business environment and how to apply the knowledge gained for performing the roles and responsibilities assigned. I have learned a lot from the execution of this research which will help me in meeting the career goals. References Aljabre, A. 2012, Cloud computing for increased business value, International Journal of Business and social science, 3(1). Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. Zaharia, M. 2010, A view of cloud computing, Communications of the ACM, 53(4), 50-58. Catteddu, D., 2010, Cloud Computing: benefits, risks and recommendations for information security, Springer, Berlin, Heidelberg, pp. 17-17. Chawla, D. Sodhi, N., 2011, Research methodology: concepts and cases, Vikas Publishing House. Danping, L. Lee, C.K., 2011, A review of the research methodology for the re-entrant scheduling problem, International Journal of Production Research, 49(8), pp.2221-2242. Feng, D.G., Zhang, M., Zhang, Y. Xu, Z., 2011, Study on cloud computing security, Journal of software, 22(1), pp.71-83. Hofmann, P. Woods, D. 2010, Cloud computing: The limits of public clouds for business applications, IEEE Internet Computing, 14(6), 90-93. Kuada, J., 2012, Research methodology: A project guide for university students, Samfundslitteratur. Subashini, S. Kavitha, V., 2011, A survey on security issues in service delivery models of cloud computing, Journal of network and computer applications, 34(1), 1-11. Sultan, N. 2010, Cloud computing for education: A new dawn?, International Journal of Information Management, 30(2), 109-116. Takabi, H., Joshi, J.B. Ahn, G.J., 2010, Security and privacy challenges in cloud computing environments, IEEE Security Privacy, 8(6), pp.24-31. Zhang, Q., Cheng, L. Boutaba, R. 2010, Cloud computing: state-of-the-art and research challenges Journal of internet services and applications, 1(1), 7-18.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.