H16032-Assignment#1-Outline
docx
keyboard_arrow_up
School
NUCES - Lahore *
*We aren’t endorsed by this school
Course
401
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by CountPolarBearMaster939
Introduction:
Cloud computing has turned into a fundamental piece of current
businesses, offering a great many advantages, including scalability,
flexibility, and cost savings.
The healthcare industry faces various security and ethical issues in
its utilization of cloud computing technologies, including data
breaches, consistence challenges, and worries about privacy and
assent.
Security challenges:
Data breaches:
The monetary administrations industry is an ideal
objective for cyberattacks, as it stores a lot of delicate patient data.
System weaknesses:
Cloud computing systems can be helpless
against an assortment of security dangers, for example, malware,
phishing assaults, and refusal of-administration assaults[Ryan, M.D.
(2013)].
Gap in research:
There is a developing collection of research on cloud computing
security and ethical issues. Be that as it may, there is as yet a
requirement for more research in various regions. For instance, more
research is required on how businesses can best deal with the
security risks related with cloud computing.
Background of the research:
Cloud computing has arisen as a groundbreaking innovation as of
late, reshaping different ventures and situating itself as the eventual
fate of computing. Notwithstanding, as this innovation is somewhat
new, it delivers a novel arrangement of security and ethical
challenges that should be tended to. One explicit area of concern is
cloud computing security, which is of vital significance to businesses
utilizing this innovation.
Justification for the proposal Research:
The cloud computing offers various benefits for businesses, yet it
additionally presents significant obstructions and challenges. Among
the preeminent impediments to reception, security remains as a
fundamental concern, followed intently by consistence, privacy, and
lawful issues [Ryan, M.D. (2013)].
Research Question:
What are the best ways for businesses to deal with the security
risks related with cloud computing?
How could businesses agree with the administrative scene for
cloud computing?
Preliminary literature review:
In 2013, Miao Zhou investigated a scope of strategies pointed
toward supporting data respectability and security with regards to
cloud computing[(Zhou, n.d,2013)
]. These strategies enveloped:
Inventive Tree-Based Key Administration Plan:
cloud-put away data.
Cloud Privacy-Improving Data Reevaluating:
Cloud Privacy-Safeguarded Admittance Control:
Furthermore,Mishra in 2014 [
Mishra, Aastha (2014)
] presented a
high level mystery shared key administration system intended to
improve the security and effectiveness of cloud systems. The
essential objective was to lay out a solid decentralized lightweight
key administration approach. This strategy guaranteed the security
and privacy of client data through secret sharing techniques and key
reproduction across various cloud suppliers.
Referenicing:
Ryan, M.D. (2013). Cloud computing security: The scientific
challenge, and a survey of solutions.
Journal of Systems and
Software
, 86(9), pp.2263–2268.
doi:https://doi.org/10.1016/j.jss.2012.12.025.
Goyal, P 2010, ‘Enterprise Usability of Cloud Computing
Environments: Issues and Challenges’.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Mishra, A 2014,
Data Security in Cloud Computing Based on
Advanced Secret Sharing Key Management Scheme
,
ethesis.nitrkl.ac.in, viewed 21 September 2023,
<http://ethesis.nitrkl.ac.in/5845/>.
Goyal, P 2010, ‘Enterprise Usability of Cloud Computing
Environments: Issues and Challenges’.
Zhou, M. (2013). Data security and integrity in cloud
computing.
University of Wollongong Thesis Collection 1954-2016
.
[online] Available at: https://ro.uow.edu.au/theses/3990/.
Zhou, M. (2013). Data security and integrity in cloud
computing.
University of Wollongong Thesis Collection 1954-2016
.
[online] Available at: https://ro.uow.edu.au/theses/3990/.