H16032-Assignment#1-Outline

docx

School

NUCES - Lahore *

*We aren’t endorsed by this school

Course

401

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by CountPolarBearMaster939

Report
Introduction: Cloud computing has turned into a fundamental piece of current businesses, offering a great many advantages, including scalability, flexibility, and cost savings. The healthcare industry faces various security and ethical issues in its utilization of cloud computing technologies, including data breaches, consistence challenges, and worries about privacy and assent. Security challenges: Data breaches: The monetary administrations industry is an ideal objective for cyberattacks, as it stores a lot of delicate patient data. System weaknesses: Cloud computing systems can be helpless against an assortment of security dangers, for example, malware, phishing assaults, and refusal of-administration assaults[Ryan, M.D. (2013)].
Gap in research: There is a developing collection of research on cloud computing security and ethical issues. Be that as it may, there is as yet a requirement for more research in various regions. For instance, more research is required on how businesses can best deal with the security risks related with cloud computing. Background of the research: Cloud computing has arisen as a groundbreaking innovation as of late, reshaping different ventures and situating itself as the eventual fate of computing. Notwithstanding, as this innovation is somewhat new, it delivers a novel arrangement of security and ethical challenges that should be tended to. One explicit area of concern is cloud computing security, which is of vital significance to businesses utilizing this innovation. Justification for the proposal Research: The cloud computing offers various benefits for businesses, yet it additionally presents significant obstructions and challenges. Among the preeminent impediments to reception, security remains as a fundamental concern, followed intently by consistence, privacy, and lawful issues [Ryan, M.D. (2013)]. Research Question: What are the best ways for businesses to deal with the security risks related with cloud computing?
How could businesses agree with the administrative scene for cloud computing? Preliminary literature review: In 2013, Miao Zhou investigated a scope of strategies pointed toward supporting data respectability and security with regards to cloud computing[(Zhou, n.d,2013) ]. These strategies enveloped: Inventive Tree-Based Key Administration Plan: cloud-put away data. Cloud Privacy-Improving Data Reevaluating: Cloud Privacy-Safeguarded Admittance Control: Furthermore,Mishra in 2014 [ Mishra, Aastha (2014) ] presented a high level mystery shared key administration system intended to improve the security and effectiveness of cloud systems. The essential objective was to lay out a solid decentralized lightweight key administration approach. This strategy guaranteed the security and privacy of client data through secret sharing techniques and key reproduction across various cloud suppliers. Referenicing: Ryan, M.D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software , 86(9), pp.2263–2268. doi:https://doi.org/10.1016/j.jss.2012.12.025. Goyal, P 2010, ‘Enterprise Usability of Cloud Computing Environments: Issues and Challenges’.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Mishra, A 2014, Data Security in Cloud Computing Based on Advanced Secret Sharing Key Management Scheme , ethesis.nitrkl.ac.in, viewed 21 September 2023, <http://ethesis.nitrkl.ac.in/5845/>. Goyal, P 2010, ‘Enterprise Usability of Cloud Computing Environments: Issues and Challenges’. Zhou, M. (2013). Data security and integrity in cloud computing. University of Wollongong Thesis Collection 1954-2016 . [online] Available at: https://ro.uow.edu.au/theses/3990/. Zhou, M. (2013). Data security and integrity in cloud computing. University of Wollongong Thesis Collection 1954-2016 . [online] Available at: https://ro.uow.edu.au/theses/3990/.