Project Proposal Template EmpRes 2022-23

docx

School

Griffith University *

*We aren’t endorsed by this school

Course

AUDITING

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

17

Uploaded by CommodoreWorldOstrich

Report
MSc Project Proposal 21/03/2023 Template for Empirical Research Projects Please read and delete before final submission: This is the Project Proposal Template for CST4040 for empirical research. You cannot assume that this template or your chosen topic can be used for the actual MSc project. However, if you like your topic, you can take this project proposal to your supervisor at the start of your project supervision and ask. In this project proposal, you are not allowed to use direct quotes. All text has to be your own formulation. If you want to use the content of another author you must paraphrase it, say it entirely in your own words. Please change the date of the proposal before submission. Empirical research is based on observation and measurement of phenomena. In other words, the researcher gathers data to be compared against a theory or hypothesis or to explore phenomena. Student Name Surname Student number Penelope Smith M0001111 Programme of Study MSc Computer Science Name of Supervisor Ariadne Naxodika Title of the project
Project Proposal Template for Empirical Research Projects Elke Duncker Enhancing Cybersecurity in Cloud Computing: A Multi-Layered Approach Abstract This proposal for study seeks to improve cloud computing's security on multiple fronts. The goal of this project is to develop and implement a comprehensive strategy for dealing with cloud security issues. The goal of this contribution is to help those in the computer science and IT fields by giving them new perspectives and useful design advice. The goal of this study is to strengthen cloud computing's security by examining its potential gains and assessing its results, thereby securing more private information. The proposed work has potential for reducing cyber threats and protecting cloud-based infrastructure. Table of Contents Table of Contents ................................................................................................................. 2 1. Introduction .................................................................................................................. 2 2. Literature Review ........................................................................................................ 3 3. Research Methods ........................................................................................................ 3 4. Proposed Work ............................................................................................................. 4 4.1. Intended contribution of the work ......................................................................... 4 4.2. Benefits of the proposed work .............................................................................. 4 4.3. Procedures and activities of the proposed work .................................................... 4 4.4. Design Suggestions ............................................................................................... 5 2
Project Proposal Template for Empirical Research Projects Elke Duncker 4.5. Evaluation of the project ....................................................................................... 5 4.6. Resources needed .................................................................................................. 5 4.7. Access to participants and clients ......................................................................... 6 4.8. Ethical Aspects ...................................................................................................... 6 5. Work plan and schedule ............................................................................................... 6 6. Discussion and Conclusion .......................................................................................... 6 7. Bibliography ................................................................................................................ 7 8. Appendixes .................................................................................................................. 7 9. Submission Procedure .................................................................................................. 8 10. Submission Deadline for Proposal: Sunday, the 16 th Apr 23:59 hrs. ........................... 8 11. Marking Criteria .......................................................................................................... 8 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Project Proposal Template for Empirical Research Projects Elke Duncker 1. Introduction The broad adoption of cloud computing in the modern digital world has, however, given rise to security concerns regarding the storage and processing of sensitive data in the cloud (Thriveni et al., 2015). Through the investigation of three hypotheses, this study intends to strengthen cloud computing's security. Research Questions: 1. How can new cyber-attacks and vulnerabilities that target cloud computing be protected against? 2. How can the security of cloud computing be improved by addressing the shortcomings of the current authentication and access control mechanisms? 3. To what extent can modern encryption and data protection methods guarantee the safety of information stored and sent on the cloud? This initiative adds to the growing body of work investigating threats to cloud computing by answering the questions raised by the aforementioned researchers (Thriveni et al., 2015). The distributed nature of cloud computing's infrastructure and data provide for new security concerns, requiring the creation of cutting-edge safeguards. The primary objective of this study is to answer the identified research questions in an effort to improve cloud computing ecosystem security. The project aims to achieve the following goals: To Find new vulnerabilities and security dangers in the cloud and figure out how to fix them. 4
Project Proposal Template for Empirical Research Projects Elke Duncker To make cloud computing more secure, authentication and authorization procedures should be strengthened. Investigate cutting-edge strategies for encryption and data protection to safeguard your cloud-based information (El Bazi et al., 2023). By bringing together different aspects of cloud computing security and suggesting cutting-edge solutions, this study is both novel and timely (Thriveni et al., 2015). By performing this study today, we can use cutting-edge methods to safeguard cloud data and address pressing security issues (Hudic et al., 2017). 2. Literature Review Despite the broad usage of cloud computing, concerns have been raised over the safety of sensitive data handled and stored on the cloud (Chang et al., 2015). To place the research within the field of cloud computing security and to identify important findings and concepts, this literature review conducts a critical examination of the current academic literature pertinent to the research topics indicated in the introduction. Numerous research efforts have been made to discover and counteract new cyber dangers and vulnerabilities in cloud computing. Information leakage in third-party compute clouds has been extensively studied by Ristenpart et al. (2014), revealing the dangers of unauthorised access and emphasising the necessity for efficient prevention methods. Furthermore, Kamara et al. (2019) have highlighted the necessity of designing and implementing sophisticated security methods by emphasising the importance of robust security measures in encrypted cloud storage. In order to protect the privacy and security of cloud data, these studies highlight the critical need to address new cyber risks and vulnerabilities (Hudic et al., 2017). 5
Project Proposal Template for Empirical Research Projects Elke Duncker There has been a lot of study done on the benefits of cloud computing as well as the drawbacks of the current authentication and access control techniques ( El Bazi et al., 2023). In multi-tenant cloud systems, where secure access to shared resources is a difficulty, Njuki et al. (2016) have identified the limitations of existing solutions. Their research highlights the importance of bolstering authentication systems and access control mechanisms to reduce the likelihood of security incidents. Rong et al. (2018) build upon this work by proposing improved authentication mechanisms for cloud computing settings, with the goal of increasing security for all users. The importance of authentication and access control systems in protecting the confidentiality and security of data has been highlighted by these research. Cloud security relies heavily on the use of cryptography and other data protection methods. The relevance of encryption in safeguarding sensitive data stored in the cloud was recently brought to light by Saripalli et al. (2017), who provided an improved data security model that makes use of modern encryption algorithms. They emphasise the importance of thorough encryption solutions for protecting data in the cloud. Data security and privacy in cloud computing is a growing concern, thus Alabbadi et al. (2019) have undertaken a thorough assessment of the topic, looking at different encryption methods and how they might be applied to ensure data safety in the cloud (Hudic et al., 2017). These studies deepen our familiarity with encryption techniques and stress the importance of constant improvements in data protection to keep up with the ever- evolving threat landscape. The goal of this study is to advance the study of cloud computing security by answering the problems that have been posed. Due to its shared infrastructure and dispersed data, cloud computing poses unique security issues, calling for the development of effective security solutions. This study's innovative and timely contributions come from its comprehensive examination of cloud computing security and its proposed use of cutting-edge solutions (El Bazi et al., 2023). Researching this topic today will allow the team to use cutting-edge 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Project Proposal Template for Empirical Research Projects Elke Duncker methods to protect sensitive information in cloud storage (Takahashi et al., 2010). The results of this study add to the existing body of knowledge in cloud computing security, which should increase the safety and reliability of cloud-based infrastructures. 3. Research Methods To answer the study's research questions and accomplish its goals, the researchers will use a mixed-methods strategy based on online research and data analysis (Thriveni et al., 2015). In order to gather information about the state of cloud computing security, an online survey will be created to ask questions about topics including new cyber threats and vulnerabilities, the shortcomings of conventional authentication and access control systems, and cutting-edge encryption and data protection strategies for information stored in the cloud. To ensure a representative sample, the survey will be sent to experts in the subject as well as the general public (Hudic et al., 2017). Both open-ended and closed-ended questions will be used to collect numerical and qualitative information. Excel's built-in statistical capabilities will be used to compile descriptive statistics and test hypotheses if desired (Takahashi et al., 2010). The selected research approach has the advantages of being scalable, easily accessible, and analytically rigorous (Chang et al., 2015). It is congruent with the research topics, facilitating in-depth exploration and providing insight into the evolution of cloud computing security (Lehto et al., 2015). 4. Proposed Work 4.1. Intended contribution of the work 7
Project Proposal Template for Empirical Research Projects Elke Duncker This study aims to make a novel addition to the study of cybersecurity in the cloud computing sphere. This project intends to fill the existing research gap and offer novel insights and solutions by addressing the specific research questions related to emerging cyber threats and vulnerabilities in cloud computing, limitations of current authentication and access control mechanisms, and innovative encryption and data protection techniques (Lehto et al., 2015). The value of this work resides in the solutions it proposes to protect data in transit and storage in the cloud from unauthorised access, modification, or deletion (Takahashi et al., 2010). The results and suggestions from this study should help further our understanding of cloud computing security in the domains of computer science and IT. 4.2. Benefits of the proposed work Potential beneficiaries of the proposed research initiative to improve cloud computing's cybersecurity include a wide range of interested parties. The danger of data breaches and unauthorised access can be mitigated for companies and organisations using cloud services with the help of enhanced security measures. By adopting these safety procedures, cloud service providers can improve the quality of their services. The findings of this study can also help policymakers and regulators develop best practises for keeping data safe in the cloud. 4.3. Procedures and activities of the proposed work The planned work will be carried out via a sequence of procedures and activities designed to accomplish the overarching goals. Evaluations, suggestions, and project reports are only some of the tangible consequences that will result from these endeavours (Lehto et al., 2015). Results from surveys and other research methods will be analysed to confirm or refute hypotheses, guaranteeing that desired outcomes are in line with aims. The achievement of key milestones will be marked by the timely delivery of the accompanying deliverables. Below is a table detailing the project's broad goals, key actions, and major checkpoints. 8
Project Proposal Template for Empirical Research Projects Elke Duncker Objectives Activities Milestones Objective 1: To Find new vulnerabilities and security dangers in the cloud and figure out how to fix them. Literature review, threat analysis, vulnerability assessment The literature review is complete, and the major risks and vulnerabilities have been identified (Chang et al., 2015). Objective 2: To make cloud computing more secure, authentication and authorization procedures should be strengthened. Analysis of current mechanisms, development of new mechanisms, and their eventual application Report assessing current mechanisms, and the introduction of enhanced ones Objective 3: Investigate cutting-edge strategies for encryption and data protection to safeguard your cloud-based information. Research on encryption techniques, prototype development and testing (Lehto et al., 2015). Research findings on encryption techniques, functioning prototype 4.4. Design Suggestions Research results will inform design recommendations for bolstering cloud computing's security. Improved authentication, access control, encryption, and data security methods are the primary goals of these design recommendations (Chang et al., 2015). Written descriptions, use cases, and recommendations for the user interface design will all be included. The proposed designs would function as a sort of low-fidelity prototype, recommending appropriate security features that can be easily implemented in cloud computing settings. 4.5. Evaluation of the project Evaluation of the project will be conducted in two parts: 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Project Proposal Template for Empirical Research Projects Elke Duncker 1. Evaluation of the design suggestions: - Expert evaluation: A panel of cybersecurity and cloud computing professionals will examine and assess the proposed designs. Their knowledge and opinion on the efficiency and viability of the proposed designs would be invaluable (Chang et al., 2015). 2. Process evaluation: - Documentation: Research notes, data analysis reports, design documentation, and project progress reports will all be generated while the project is carried out (Lehto et al., 2015).. - Criteria for evaluation: Criteria such as clarity, completeness, compatibility with research aims, and adherence to best practises in cybersecurity will be used to assess the material (Lehto et al., 2015). Evaluation Plan: 1. Expert Evaluation of Design Suggestions: - Duration: 2 weeks - Tasks: - Choose evaluators and include them in the process - Give professional advice on design and supply relevant materials -Get opinions and advice from professionals. Incorporate design recommendations based on analysis of expert feedback 2. Process Evaluation of Documentation: - Duration: Throughout the project duration - Tasks: - Documentation quality and completeness should be reviewed frequently. - Check that the paper trail is in sync with the aims of the study (Takahashi et al., 2010). 10
Project Proposal Template for Empirical Research Projects Elke Duncker Assess the completeness and clarity of the documentation by using established criteria. - Modify and enhance as required in light of evaluation findings 4.6. Resources needed There is a wide range of specialty applications, such as cloud-based platforms, cybersecurity tools, and data analysis programmes. Specialised hardware and software for testing purposes. Research participants: the accessibility of willing individuals or organisations (Lehto et al., 2015). Access to relevant print media (books, periodicals, etc.). Expert researchers or business associates in the field of cloud computing security. Human subjects research requires approval from an ethics committee and adherence to standard ethical practises (Lehto et al., 2015). Spend sufficient time and energy on preparation, data collection, analysis, and report writing. 4.7. Access to participants and clients Careful preparation and execution are required for gaining access to study participants and clients. The following techniques may be employed: In order to recruit participants, you must explain the situation, the significance of the research, and the benefits that participants will receive. Make it easy for people to participate when they can and offer incentives (where applicable) (Selvaraj et al., 2022). Create trust by encouraging two-way dialogue, protecting the anonymity of your participants, and emphasising the beneficial outcomes of their contribution (Mshangi et al., 2017). Try to answer their questions and calm their concerns as you lead them through the research process. 11
Project Proposal Template for Empirical Research Projects Elke Duncker When an access failure occurs, a backup plan can be put into action. This could include things like recruiting more participants, refining the scope of the research, or experimenting with other methods of data collection (Sun., 2022). If the research can't find the people it needs to study or the people it needs to work with, it has a better chance of continuing if a backup plan is in place (Carreras et al., 2020). Establishing early access to client organisations is crucial for a successful project. In order to win over influential members of your organisation, you should get to know them, explain how the study will benefit the business, and address any reservations they may have about the project before proceeding (Selvaraj et al., 2022). Using these strategies increases the likelihood of finding enthusiastic participants and reliable paying clients for the study. 4.8. Ethical Aspects Since real people will be involved, questions of ethics become quite important. Since this study's data collection strategy is quite simple and will include employing an anonymous questionnaire, it will be submitted for ethical review using the MORE (Methodology, Opportunities, Research Ethics) form. This stage is crucial, but getting accepted can take anywhere from four hours to a day and several attempts (Mshangi et al., 2017). In addition to obtaining ethical approval, we will also obtain participants' informed consent to guarantee their will and familiarity with the study's aims and procedures (Takahashi et al., 2010). Participants will have the opportunity to ask follow-up questions and receive clarification during a debriefing session (Sun et al., 2018). To protect research participants and maintain the study's credibility, researchers must adhere to strict ethical guidelines. 5. Work plan and schedule The work plan and schedule for the project "Enhancing Cybersecurity in Cloud Computing: A Multi-Layered Approach" is crucial for effective project management. By utilizing the GanttProject software, a detailed Gantt chart will be created to outline the 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Project Proposal Template for Empirical Research Projects Elke Duncker planned activities, their durations, and interdependencies. It is essential to assess whether the allocated time is sufficient to accomplish all the required tasks. The schedule will provide a clear overview of the project's timeline, ensuring that the project remains feasible and manageable. Please refer to the separate file containing the Gantt chart for a visual representation of the project schedule. 6. Discussion and Conclusion Several key aspects are discussed in further detail in Section 4 of the plan. To begin, admitting that cloud computing has security flaws demonstrates an awareness of the problem (Sun., 2022). Furthermore, the proposed multi-layered strategy is comprehensive and methodical in its treatment of these problems. Finally, the project's modest but significant impact is recognised by the value it is expected to add to the academic world. The practical significance of the project's findings is further emphasised by the research- based design suggestions provided (Mshangi et al., 2017). In Section 5, a Gantt chart summarises the tasks and their projected durations, as well as the overall plan and timetable. The Gantt chart is an effective means of visualising the project timeline and monitoring its progress. The project holds potential for practitioners due to its completeness, its multi-layered methodology, and its application to the challenge of cloud computing security. However, getting ethical approval and finding participants may be challenging. This research should be funded because it has the potential to address a pressing issue in cloud computing and strengthen online safety (Naz et al., 2019). Its comprehensive multilayered strategy sets it apart in major ways from other initiatives of its kind. It makes important contributions to academia and has practical use for practitioners (Carreras et al., 2020). We can complete the job within budget and on time, and our report 13
Project Proposal Template for Empirical Research Projects Elke Duncker will be comprehensive. The project is a fantastic idea because of its creativity, practicality, and feasibility. The results and debate offered here lend credence to carrying through with this study. It offers a fresh and comprehensive approach to the security challenges of cloud computing (Sun., 2022). This work represents a significant step forward because of its significance, originality, and applicability. Leaving enough time for the project's execution and completion guarantees its success. Smart preparation and the potential for unexpected findings add even more weight to the endeavour (Takahashi et al., 2010). 14
Project Proposal Template for Empirical Research Projects Elke Duncker 7. Bibliography Carreras Guzman, N.H., Wied, M., Kozine, I. and Lundteigen, M.A., 2020. Conceptualizing the key features of cyber‐physical systems in a multi‐layered representation for safety and security analysis. Systems Engineering , 23 (2), pp.189-210. Chang, V. and Ramachandran, M., 2015. Towards achieving data security with the cloud computing adoption framework. IEEE Transactions on services computing , 9 (1), pp.138- 151. Chinthamu, N., Sunkari, V., Sharma, N., Iyer, R., Jethi, G. and Sundari, M.R., SECURE AND HIGH-PERFORMANCE CLOUD-BASED ARCHITECTURE FOR SMALL- SCALE INDUSTRIES. El Bazi, N., Mabrouki, M., Laayati, O., Ouhabi, N., El Hadraoui, H., Hammouch, F.E. and Chebak, A., 2023. Generic Multi-Layered Digital-Twin-Framework-Enabled Asset Lifecycle Management for the Sustainable Mining Industry. Sustainability , 15 (4), p.3470. Gitte, M.S., CLOUD COMPUTING ADOPTION FRAMEWORK FOR DATA SECURITY IN CLOUD SHARE. Hudic, A., 2017. Security assurance assessment for multi-layered and multi-tenant hybrid clouds (Doctoral dissertation, Wien). Lehto, M. and Neittaanmäki, P. eds., 2015. Cyber security: Analytics, technology and automation (Vol. 78, p. 258). London, UK: Springer. Mshangi, M., Nfuka, E.N. and Sanga, C., 2017. An innovative soft design science methodology for improving development of a secure information system in Tanzania using multi-layered approach. Naz, N.S., Abbas, S., Khan, M.A., Abid, B., Tariq, N. and Khan, M.F., 2019. Efficient load balancing in cloud computing using multi-layered mamdani fuzzy inference expert system. International Journal of Advanced Computer Science and Applications , 10 (3). 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Project Proposal Template for Empirical Research Projects Elke Duncker Rafiee, M. and Mohammadi, M., Designing a multi-layered security algorithms for network intrusion detection systems on virtual machines in the cloud computing. Selvaraj, N.P., Paulraj, S., Ramadass, P., Kaluri, R., Shorfuzzaman, M., Alsufyani, A. and Uddin, M., 2022. Exposure of botnets in cloud environment by expending trust model with CANFES classification approach. Electronics , 11 (15), p.2350. Shabbir, M., Shabbir, A., Iwendi, C., Javed, A.R., Rizwan, M., Herencsar, N. and Lin, J.C.W., 2021. Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access , 9 , pp.8820-8834. Sun, J., Zeng, Y., Shi, G., Li, W. and Li, Z., 2018, March. The Research for Virtualization Network Security on Cloud Computing. In 2018 2nd International Conference on Artificial Intelligence: Technologies and Applications (ICAITA 2018) (pp. 145-148). Atlantis Press. Takahashi, T., Kadobayashi, Y. and Fujiwara, H., 2010, September. Ontological approach toward cybersecurity in cloud computing. In Proceedings of the 3rd international conference on Security of information and networks (pp. 100-109). Thriveni, T.K. and Prashant, C.S.R., 2015. Dynamic cloud security through multi-layered cloud infrastructure protection to deal with overlapping trust boundaries in the cloud. Wijaya, G. and Surantha, N., Multi-layered Security Design and Evaluation for Cloud- based Web Application: Case Study of Human Resource Management System. 16
Project Proposal Template for Empirical Research Projects Elke Duncker 8. Appendixes 4/24/2023 5/14/2023 6/3 /20 23 6/2 3/2 02 3 7/13/2023 8/2 /20 23 8/22/2023 9/1 1/2 02 3 10/1/2 02 3 10/21/2023 11/10/ 20 23 Start date 17