In: Computer Science
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?
RESEARCH DESIGN
In this essay project the key aim of the thesis and objectives to be met and the desire aim are discussed. Additionally, the research questions that were formulated to achieve the desired aim are discussed.
AIMS AND OBJECTIVES
In this project research paper, I reviewed previously researched work so as to acknowledge the existing knowledge so as to find answers to the problem statement questions. Most previously researched work were carried out with traditional literature review which tends to have low scientific value as it not carried out rigorously and probably an unfair approach was utilized (Subashini, S., & Kavitha, V. (2011); Because the systematic literature review is of high quality with clearly defined characteristic and with better and clear scientific perspective. So I have carried out the systematic literature review as a key research method, interviews and surveys are considered to be secondary research methods.
The previously research questions will be answered will be answered by conducting a systemic literature study. The search for sources will most aim on the use of Google Scholar and Web of Science. As the initial search process the term for Infrastructure as a Service (Iaas) was used. Searches were carried out within the article title, Abstract and the keywords. It was observed that the term cloud was sometimes used with a different meaning apart from that of a service. Hence a second search procedure was conducted considering security and cloud within the article titles. The following limitation criterion was utilized for the purpose of filtering the results from publications and setting limits for this research project.
RESEARCH QUESTIONS
So as to achieve the objects, the research questions that were previously formulated are as follows:
1. Protect consumers data with the issues of multi-tenancy in cloud computing and
2. Solve data remanence issues in multi-tenant cloud.
The outcome of this research gives a clear understanding of the current frameworks that secure protect data in multi tenant clouds, ensuring no access from unauthorized persons (Varadarajan, V., Zhang, Y., Ristenpart, T., & Swift, M. M. (2015, August). This also helps in the preparation of a checklist for the identification of data cloud when a web application is sent to the cloud. The checklist is prepared through the consideration of effective factors that bring satisfaction through the evaluation of different frameworks within the experiment setup.
RESEARCH METHODOLOGY
This research project utilizes a mixed methodology that comprises of qualitative and quantitative methodologies. For the purpose answering the research questions, literature review is utilized as qualitative methodology for and through controlled experiment ad quantitative procedure. Through qualitative methodology literature review is carried out so as to indentify the existing frameworks that makes it possible to verify data in cloud computing. The main issue in this research effort is to maintain and control data security in multi-tenant cloud. By providing cloud data security, issues of insecurity are addressed; authors adhered to some of the general principles that ought to be followed for systemic review for the purpose of indentifying the current studies. Nonetheless, the main aim is to validate the current cloud data protection frameworks that are carried out through thorough research.
I would like to point out that the current work focuses on publications that are within 2011 and 2017, as empirical publications that have been published before then have already been researched by other authors. I will include the reference later within this study for the purpose of comparing my finding with the findings present in the earlier studies so as to indentify the changes that have been included in 2011-2017. The first search in Google Scholar gave a result of 20 publications with the mentioned limits. As an initial indicator of the increased number of research papers on multi tenant cloud computing, the results for all publications that are valid are about 10. The results from web science are estimates, as the mentioned search limitations are not easy to set. The previous outcomes of the literature search string and limitations found in Appendix A. After being reviewed manually for the purpose of relevance to the research the below criteria for inclusion and exclusion as
Inclusion criteria:
2. If several publications report similar studied, only the most recent one should be picked
Exclusion/Limitation criteria
1. Publications that are not in English should not be considered
2. Restrictions in keywords should be set, keyword deviations of keyword set would go beyond results that are reviawable.
3. Publications consisting of specialized contexts such as government or medical should not be considered.
5. Articles that are not online should not be included.
These limitations criteria at the same time define the limitation of this research project scope. They are of importance as they set the overall scope and limitations of their research project to be carried out. The manual review of relevant publications resulted in the following amount of research works to be collected to be used in the next steps of the research. The initial literature review showed that various frameworks that have already been published and the categorization of security considerations. To meet the objectives of this study, I opt for the framework used by Firesmith. This consideration was motivation to my research as other authors also used it and I wanted to compare the research findings in this research project with others, and thus needed to come up with a common ground for a meaningful comparison for the purpose of answering the research questions.
Conclusion
After a thorough research the literature on security in multi tenant cloud computing, most of the existing works is to help cloud users to access their risk before having their crucial data compromised in a security sensitive cloud environment (Wang, L., Ranjan, R., Chen, J., & Benatallah, B. (Eds.). (2011). Hence it is quite obvious that findings from this research need better and specific risk assessment techniques. Currently, there lacks a structured framework that can be used in data security protection when it comes to cloud consumers assessing their data, in order to enhance trust between cloud service providers and the users , not forgetting the effectiveness of the security system that has been put in place. For future work, there is need to develop a better data securing method, which can encompass the complex nature of multi tenant cloud computing service.