Data Security In Cloud Computingprofuniversitycomment By Ca Is This W ✓ Solved

Data Security in Cloud Computing Prof University Comment by CA: Is this what you are eluding to? Exploring the management of trust in data security in a cloud computing environment. Data Security in Cloud Computing Description Data security in cloud computing consists of policies and procedures that help protect cloud systems, infrastructure, and data. With cloud users, there is not enough trust management that has been put in place to promote maximum cloud growth (Ghazizadeh & Cusack, 2018). These research results are the area of data security in cloud computing to find more insights that can help keep data more secure while in the cloud.

Information Gap There is the information gap of the lack of enough cloud computing management to increase users' trust in all the operations partaken. Due to this, there is the presented problem of data security which is costly to the organizations. Comment by CA: Is this the topic? Comment by CA: What do you mean? Models/Theories Developed in the Area From the research identified, the model that has been used for analysis is the trust model.

The trust model is the security strength evaluator to the cloud services and the applications (Ghazizadeh & Cusack, 2018). Ghazizadeh and Cusack (2018) state that the model helps set up security at the identity cloud services as it finds the inadequacies and enhances the cloud's infrastructure to ensure maximum security. One of the cited problems from the body of knowledge is cloud computing's management system concerning their trust in data collection and synthesis. To Exploring more on the management system problem, both the trust model and the evaluation theory are used to identify trust in the cloud, which is essential for data security. Through this, proper recommendations concerning data security in the cloud will be made.

Comment by CA: Topic? Research Type Both qualitative and quantitative research methods will be used. Qualitative research will be used as it is fundamental to measure the quality of data security rather than its quantity (Senyo et al., 2018). Besides, it is essential in describing things as the numerical expressions are hard to define such things. Quantitative research will help explore the facts, percentages, and measures when exploring data security in the cloud (Senyo et al., 2018).

With the two methods mixed, both the why and what questions will be answered. Research Target Group Comment by CA: This is very broad. Where will you get your data? The possible population used for data collection is the small and medium enterprises (SMEs) in the United States that have stored their information in the cloud. They were seen to be the most effective population as they deal with a large amount of data which is the cloud, that requires security as they are faced with trust management issues.

References Ghazizadeh, E., & Cusack, B. (2018). Evaluation Theory for Characteristics of Cloud Identity Trust Framework. Cloud Computing-Technology and Practices , . Senyo, P. K., Addae, E., & Boateng, R. (2018).

Cloud computing research: A review of research themes, frameworks, methods, and future research directions. International Journal of Information Management , 38 (1), .

Paper for above instructions


Introduction


Cloud computing has become an integral part of business operations, providing organizations with the flexibility to store and manage data on remote servers. However, data security remains a chief concern. According to Ghazizadeh and Cusack (2018), data security in cloud computing consists of a series of policies and procedures aimed at safeguarding cloud systems, applications, and data. This paper explores the management of trust within this environment, emphasizing the need for improved strategies to protect sensitive information, particularly for small and medium enterprises (SMEs), which often lack robust data security protocols.

The Importance of Trust in Cloud Computing


The trust management mechanism plays a fundamental role in cloud computing. User trust is often compromised due to a lack of transparency and control over data stored in the cloud. Ghazizadeh and Cusack (2018) argue that rates of cloud adoption have not matched potential growth due to this trust gap, leading to higher costs associated with incomplete security measures. Organizations need to establish trust not only between service providers and users but also internally within their operational framework.

Current State of Data Security in Cloud Computing


Data Breaches and Their Implications


Data breaches in cloud environments have far-reaching consequences. For instance, a study by Senyo, Addae, and Boateng (2018) reveals that enterprises experience significant financial losses, reduced consumer confidence, and potential legal challenges when sensitive information is compromised. Such breaches serve as a stark reminder of the necessitated security vigilance within cloud infrastructures.

Deficiencies in Management Systems


Current management systems for cloud data are often inadequate, failing to build the necessary level of trust among users. As the digital landscape evolves, traditional security measures, which predominantly focus on prevention, often fall short of mitigating the risks associated with cloud storage (Ghazizadeh & Cusack, 2018). A modernized data security strategy must account for dynamic risks and incorporate rigorous trust models that evaluate the strength and integrity of cloud services.

Trust Models in Cloud Computing


The Trust Model


The trust model serves as a framework to evaluate and enhance the security of cloud services. It identifies weaknesses in identity verification, access controls, and data protection mechanisms (Ghazizadeh & Cusack, 2018). Trust can be seen as a critical asset within cloud services, where both the provider’s and the customer’s vulnerabilities must be addressed.

Evaluation Theory


Utilizing evaluation theory alongside the trust model provides a more robust assessment of data security measures (Ghazizadeh & Cusack, 2018). By employing both models, organizations can better understand the trust dynamics in cloud storage, allowing for informed decisions about data management strategies.

Research Methodology


Research Type


A mixed-methods approach will be adopted for this research, involving both qualitative and quantitative methodologies. Qualitative research will focus on gaining in-depth insights into user experiences with data security, shedding light on trust management obstacles in a rapidly evolving cloud environment (Senyo et al., 2018).
Conversely, quantitative research will provide statistical data regarding the prevalence of data breaches and security incidents, helping to quantify the extent of trust issues in cloud services (Senyo et al., 2018). By integrating both methods, this research aims to address both 'how' and 'why' questions regarding data security in cloud computing.

Target Population


The research will target SMEs in the United States that utilize cloud storage solutions. This demographic is especially relevant as they often deal with significant amounts of sensitive data without sufficient resources to implement comprehensive security policies. Understanding their perspectives and experiences will offer valuable insights into the broader issues of trust and security in cloud computing.

Solutions for Enhancing Data Security


Strengthening Trust Management


1. Adoption of Advanced Encryption Techniques: SMEs should leverage end-to-end encryption frameworks to ensure data security during transmission and storage. This provides an added layer of security against unauthorized access.
2. Regular Security Audits: Conducting frequent security assessments can help identify and rectify vulnerabilities within cloud systems.
3. Investing in Employee Training: Educating employees about data security practices will mitigate the risks of phishing attacks and unintentional data breaches.
4. Leveraging Multi-Factor Authentication (MFA): Implementing MFA enhances security by requiring users to provide multiple forms of verification before granting access to sensitive information.
5. Utilizing Blockchain Technology: The application of blockchain can enhance data integrity and authenticity, promoting enhanced trust in transactions involving sensitive data.

Conclusion


Data security in cloud computing is vital in fostering trust among users and addressing the challenges associated with data breaches. This paper reinforces the necessity of improving management systems and the importance of trust models in enhancing data security strategies. By adopting a robust approach to data security that leverages advanced technologies and fosters a culture of security awareness, organizations can protect sensitive information while growing their cloud-based applications.

References


1. Ghazizadeh, E., & Cusack, B. (2018). Evaluation Theory for Characteristics of Cloud Identity Trust Framework. Cloud Computing: Technology and Practices.
2. Senyo, P. K., Addae, E., & Boateng, R. (2018). Cloud computing research: A review of research themes, frameworks, methods, and future research directions. International Journal of Information Management, 38(1).
3. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592.
4. Marinos, A., & Briscoe, G. (2009). Community cloud computing. Cloud Computing Technology and Science.
5. Ruan, K., et al. (2011). Spatial data storage and privacy in the cloud. IEEE 2011 Fourth International Conference on Advanced Computing and Communication Technologies.
6. Prajapati, B. M., et al. (2020). Data Security Model for Cloud Computing. Journal of Computer Applications, 161(6), 1-7.
7. Li, H., & Li, Y. (2018). The data security risk management based on cloud computing. Proceedings of 2018 International Conference on Cyberworlds.
8. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.
9. Yang, H., et al. (2013). Cloud Computing Security Management. International Journal of Advanced Computer Science and Applications, 4(3).
10. Chong, F., & Carraro, G. (2006). Architecture for Cloud Computing. Microsoft Corporation White Paper.
This assignment has explored the intersection of cloud computing and data security through the lens of trust management, establishing a comprehensive framework and actionable solutions necessary for safeguarding sensitive information in an increasingly cloud-dependent world.