Question

In: Computer Science

write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?

write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?

 

 

Solutions

Expert Solution

RESEARCH DESIGN

In this essay project the key aim of the thesis and objectives to be met and the desire aim are discussed. Additionally, the research questions that were formulated to achieve the desired aim are discussed.

AIMS AND OBJECTIVES

In this project research paper, I reviewed previously researched work so as to acknowledge the existing knowledge so as to find answers to the problem statement questions. Most previously researched work were carried out with traditional literature review which tends to have low scientific value as it not carried out rigorously and probably an unfair approach was utilized (Subashini, S., & Kavitha, V. (2011); Because the systematic literature review is of high quality with clearly defined characteristic and with better and clear scientific perspective. So I have carried out the systematic literature review as a key research method, interviews and surveys are considered to be secondary research methods.

The previously research questions will be answered will be answered by conducting a systemic literature study. The search for sources will most aim on the use of Google Scholar and Web of Science. As the initial search process the term for Infrastructure as a Service (Iaas) was used. Searches were carried out within the article title, Abstract and the keywords. It was observed that the term cloud was sometimes used with a different meaning apart from that of a service. Hence a second search procedure was conducted considering security and cloud within the article titles. The following limitation criterion was utilized for the purpose of filtering the results from publications and setting limits for this research project.

  1. Limits on certain publications on the basis of type of the articles and conference papers
  2. Limits on article publications by English only
  3. Limits on publication period between 2011-2017
  4. Limit in subject matter as it should include computer science fields, IT or business so as to be relevant for this research project.

RESEARCH QUESTIONS

So as to achieve the objects, the research questions that were previously formulated are as follows:

1. Protect consumers data with the issues of multi-tenancy in cloud computing and

2. Solve data remanence issues in multi-tenant cloud.

The outcome of this research gives a clear understanding of the current frameworks that secure protect data in multi tenant clouds, ensuring no access from unauthorized persons (Varadarajan, V., Zhang, Y., Ristenpart, T., & Swift, M. M. (2015, August). This also helps in the preparation of a checklist for the identification of data cloud when a web application is sent to the cloud. The checklist is prepared through the consideration of effective factors that bring satisfaction through the evaluation of different frameworks within the experiment setup.

RESEARCH METHODOLOGY

This research project utilizes a mixed methodology that comprises of qualitative and quantitative methodologies. For the purpose answering the research questions, literature review is utilized as qualitative methodology for and through controlled experiment ad quantitative procedure. Through qualitative methodology literature review is carried out so as to indentify the existing frameworks that makes it possible to verify data in cloud computing. The main issue in this research effort is to maintain and control data security in multi-tenant cloud. By providing cloud data security, issues of insecurity are addressed; authors adhered to some of the general principles that ought to be followed for systemic review for the purpose of indentifying the current studies. Nonetheless, the main aim is to validate the current cloud data protection frameworks that are carried out through thorough research.

I would like to point out that the current work focuses on publications that are within 2011 and 2017, as empirical publications that have been published before then have already been researched by other authors. I will include the reference later within this study for the purpose of comparing my finding with the findings present in the earlier studies so as to indentify the changes that have been included in 2011-2017. The first search in Google Scholar gave a result of 20 publications with the mentioned limits. As an initial indicator of the increased number of research papers on multi tenant cloud computing, the results for all publications that are valid are about 10. The results from web science are estimates, as the mentioned search limitations are not easy to set. The previous outcomes of the literature search string and limitations found in Appendix A. After being reviewed manually for the purpose of relevance to the research the below criteria for inclusion and exclusion as

Inclusion criteria:

  1. Multitenant Cloud security IaaS security should be the major topics in the publications.

2. If several publications report similar studied, only the most recent one should be picked

Exclusion/Limitation criteria

1. Publications that are not in English should not be considered

2. Restrictions in keywords should be set, keyword deviations of keyword set would go beyond results that are reviawable.

3. Publications consisting of specialized contexts such as government or medical should not be considered.

5. Articles that are not online should not be included.

These limitations criteria at the same time define the limitation of this research project scope. They are of importance as they set the overall scope and limitations of their research project to be carried out. The manual review of relevant publications resulted in the following amount of research works to be collected to be used in the next steps of the research. The initial literature review showed that various frameworks that have already been published and the categorization of security considerations. To meet the objectives of this study, I opt for the framework used by Firesmith. This consideration was motivation to my research as other authors also used it and I wanted to compare the research findings in this research project with others, and thus needed to come up with a common ground for a meaningful comparison for the purpose of answering the research questions.

Conclusion

After a thorough research the literature on security in multi tenant cloud computing, most of the existing works is to help cloud users to access their risk before having their crucial data compromised in a security sensitive cloud environment (Wang, L., Ranjan, R., Chen, J., & Benatallah, B. (Eds.). (2011). Hence it is quite obvious that findings from this research need better and specific risk assessment techniques. Currently, there lacks a structured framework that can be used in data security protection when it comes to cloud consumers assessing their data, in order to enhance trust between cloud service providers and the users , not forgetting the effectiveness of the security system that has been put in place. For future work, there is need to develop a better data securing method, which can encompass the complex nature of multi tenant cloud computing service.


Related Solutions

A research project focused on developing a security policy for the use of cloud computing and...
A research project focused on developing a security policy for the use of cloud computing and mobile devices in a selected business environment. Developing a security policy for the use of cloud computing and mobile devices. A summary that would be appropriate to give your manager so that he/she would know the essence of your project. • Description of the business environment. • Compliance or other regulatory requirements under which this business operates. • Description of the specific cloud service...
cloud computing (research paper): The report will contain a more in depth explanation. The report should...
cloud computing (research paper): The report will contain a more in depth explanation. The report should be two pages long in MLA format.
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing,...
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing, Kris Jamsa, 2013, Johns & Bartlett Learning, ISBN: 978-1- 4496-4739-1
Discussion: Cloud Computing in 200 words Discuss Cloud Computing. Give an example of cloud computing. Conduct...
Discussion: Cloud Computing in 200 words Discuss Cloud Computing. Give an example of cloud computing. Conduct a little research on cloud computing and list pros and cons of using Cloud Computing Do you feel safe storing your information on Cloud
In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must...
In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics Please don't rewrite already existing chegg answer
Some authors make the assertion that there are no new security issues with cloud computing at...
Some authors make the assertion that there are no new security issues with cloud computing at a network-, host-, or application-level. They maintain that cloud computing may exacerbate existing issues, but that cloud computing does not present new security issues. Do you agree with that assertion? Explain security issues with cloud computing. Include how they differ from privacy issues. How are organizations and CSPs overcoming those issue? Use examples and references to support your answer. Provide at least one reference...
In your own words, discuss the cloud operating system in detail. Also, research Cloud Computing and...
In your own words, discuss the cloud operating system in detail. Also, research Cloud Computing and explore five major challenges and five major advantages of Cloud Computing.
consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics Need...
consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics Need 600 words discussion
What is cloud computing? What is Amazon's general approach to the cloud computing services it provides?
What is cloud computing? What is Amazon's general approach to the cloud computing services it provides?
Silver Cloud Computing is a company that provides cloud computing services. The company commenced operations on...
Silver Cloud Computing is a company that provides cloud computing services. The company commenced operations on March 1, 2016. It acquired financing from the issuance of common stock for $40,000,000 and issuance of 4% bonds that mature in 2026 for $30,000,000. The income statements and balance sheets for the first two years are provided in a separate Excel spreadsheet. All amounts are in thousands.             Required: The Chief Executive Officer (CEO) is interested in increasing sales and decreasing expenses. You...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT