Free Samples
Various Security Challenges In Cloud Forensic
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
Various Security Challenges In Cloud Forensic
0 Download10 Pages / 2,358 Words
Discuss about the Various Security Challenges in Cloud Forensic.
Answer:
Objective
The objective of the assignment is to analyze data and information with proper design process. This assignment have reviewed various journals, articles as data is collected with the help of secondary method data collection. Data and information related to cloud security is collected from various online journals, books and articles from various sources. All the journals are published after 2012.
Data Collection
Before initiating experimental analysis and results, data collection is an important step to follow in the research. Therefore, data is collected from various secondary sources including journals, books, articles and government databases. Following sections will help in identifying various sources pf data collection related to cloud security. We have used various organization as case studies to collect data and information regarding cloud attacks and security challenges. All data and information are put into a table for creating records in a proper manner.
Data Sources
Before initiating experiment analysis, problems and challenges regarding cloud security need to be identified by data collection. Therefore, data sources are important part of the research. Following are the data sources from where data is collected related to the cloud security:
Online Journals
Articles
Books
Private Companies
Collection of data
A data table is prepared for recording data and information regarding the cloud security. The type of data, format and fee are stored in the table.
Data Source Name
Source Organization
Data Description
Data File Format
URL
Charge fee
Target data source
Data 1
Gartner Inc
Privacy attacks
https://www.iaeng.org/publication/WCE2013/WCE2013_pp1287-1291.pdf
Free
No
Data 2
RazorFish Inc
Social Engineering attacks
https://www.lume.ufrgs.br/bitstream/handle/10183/99410/000921541.pdf;sequence=1
Free
Yes
Data 3
AWS
Account Hijacking
https://pdfs.semanticscholar.org/presentation/0d5e/1817f3c55a53fa1e748da2fa23f71c5f33d2.pdf
$1000
Yes
Data 4
Apple
Traffic flooding
https://file.scirp.org/pdf/IJCNS_2014122416030507.pdf
$1000
Yes
Data 5
Alpha Mobile
Malware Injection
https://ijcsit.com/docs/Volume%206/vol6issue02/ijcsit2015060250.pdf
Free
No
Data Storage
After creating and finishing table, next step is collecting data and put them in another table. This table contains raw data related to the cloud security.
Data Source name
Date of Collection
Saved File Location
Saved File name
Saved File Format
No. of Data Records
Data 1
15/8/2017
//raw data/
1817f3c55a53fa1e748da2fa23f71c5f33d2.pdf
2000
Data 2
20/8/2017
//raw data/
000921541.pdf
1000
Data 3
13/3/2018
//raw data/
IJCNS_2014122416030507.pdf
738
Data 4
23/5/2018
//raw data/
ijcsit2015060250.pdf
896
Data 5
5/10/2018
//raw data/
WCE2013_pp1287-1291.pdf
478
Design and Implementation
The next task is to design and implement. Tasks divided into sub-tasks. In 1.2.1 we did pre-computing. 1.2.2 is based on Feature selection or dimension reduction. 1.2.3 is design phase. 1.2.4 is implementation.
Data pre-computing
Data pre-computing is important part in the data collection method as all data sources are not eligible for used in the study. Various filters are applied in this case for selecting appropriate data and information related to cloud security.
Feature selection or dimension reduction
After pre-computing, the next step is related to selection of features from results and decrease the number of random data. A new table is created to store new filtered data related to the cloud security.
Date
Data Source Name
Purpose of Preprocessi ng
Preprocessi ng Method
No. Original Data Records
No. Result Data Records
No. Original Features
No. Result Features
New Data File Name
20/8/2017
Data 2
Clean missing data
Data filtering
1000
1000
8
8
1817f3c55a53fa1e748da2fa23f71c5f33d2.pdf
13/3/2018
Data 3
Avoid duplicity
Data reduction
738
738
4
4
000921541.pdf
23/5/2018
Data 4
Feature selected
Data integration
896
896
7
7
IJCNS_2014122416030507.pdf
Experiment designing
Detailed design steps
Experiments are based on the methodology selected in the research. Secondary research methodology is selected in the research. The research has followed a qualitative research method. Thematic analysis is selected for analyzing data and information collected for the research. Themes are created for analyzing data and information.
Implementation
The further step is implementation. After designing, the next part is to implement themes related to the cloud security. Themes are created based on cloud security.
Analysis
Results Estimation
Cloud computing are useful for SMEs in market. Autonomous endeavors are monetarily weak and cannot adopt expense of over the top applications and software. In this way, Cloud computing are maintaining budgetary arrangement. Cloud computing provides securing huge proportion of data over the web. This are a phenomenal methodology given by Cloud computing. Giant proportion of data sources are accessible over internet. Subsequently, organization and limit of data are a great issue for associations in the market (Taha et al. 2014). Subsequently, Cloud computing helps in keeping up data and information over internet. Of course, there are a couple of security challenges in the Cloud computing. Data security is critical security challenges in Cloud computing. Different data and information is secured in the cloud. Several challenges in security are recognized in the Cloud computing (Kaur and Kaur 2015).
The usage of cloud computing are helping in securing data an information of customers. In any case, there are a couple of advanced ambushes over the web. Diverse models are going up against unmistakable kind of security challenges in the cloud (Kulkarni and Khanai 2015). SaaS indicate is defying challenges in data and framework. Basic data of the affiliations are secured completed the Cloud computing databases. In this way, there is tremendous threats and risks of losing data over cloud. Advanced ambushes are undeniable over these progressing years (Casola, De Benedictis and Rak 2015). This can be an exceptional hazard for the Cloud computing. Cloud expert centers are helping in tying down data and information of associations over their servers. Software engineers and programmers are concentrating on this databases over the web (Sharma et al. 2017). Control and organization of data is a sharp perils for affiliations.
SMEs are benefited by use of cloud services in market. Private companies are small and are not able to bear costly software. Along these lines, cloud computing helps in maintaining business plan of companies. This are an awesome methodology given by cloud computing. Tremendous measure of information sources are available over the web (Jyothi and Bhavani 2017). Along these lines, storage and management of data is an incredible risk for companies in the market. Accordingly, cloud storage are helping in storing information and data over the web.
The utilization of cloud computing are helping in putting away information and data of clients. However, there are a few digital attacks over the web. Different models are confronting diverse sort of security challenges in cloud. SaaS demonstrate is confronting challenges in information and system (Khan and Al-Yasiri 2016). Critical information of associations are put away over cloud computing databases. In this manner, there are immense dangers and risk of losing information and data over cloud. Cloud-attacks are unmistakable over ongoing years (Tari 2014). Cloud specialist organizations are helping in anchoring information and data of organizations over their servers. However, programmers and interlopers are focusing on this databases over the web. Control and administration of information is a sharp dangers for associations. Cloud security is an important aspect for companies in the market.
The utilization of a few approaches and standards are documented in ceasing these cloud attacks. Subsequently, data innovation are assuming an incredible job in keeping up hazard over the cloud computing. In cloud computing, information should be exchanged starting with one system then onto the next system much of the time (Kaiya et al. 2016). Consequently, Data flow issues are occurring in cloud computing. The utilization of methodology are helping in recognizing digital attacks in system. A few system attacks including DOS, DDOS and SQL infusion are major attacks in cloud computing system (Modic et al. 2016). Information protection and privacy challenges are happening in classified information and data amid sharing. The verification issue are occurring in the cloud computing related to the information security. The respectability of information is an issue that is making protection need in the cloud computing. A large portion of the occasions because of need in confirmation and protection, unapproved clients are going into the system of the cloud computing.
Results Summary
The IT field are profited by utilization of the cloud computing. The challenges and difficulties in the cloud computing are discussed about in these reports. The past researches in cloud security are discussed about in area. An engaged methodology are utilized so as to examinations writing. The sum total of what online are actually identified with cloud computing security. Distinctive specialized parts of the cloud computing are discussed about in online (Chouhan and Singh 2016). These online have possessed the capacity to distinguish security issues in the cloud computing. Cloud computing is an ongoing idea in the IT field (De Carvalho et al. 2017). The utilization of cloud services in the business association are an extraordinary advantageous for advancement of organization in the market. These examination online contains different contextual investigations of the distinctive associations that are profited because of the cloud computing. Alongside these, the principle focal point of these online are challenges and difficulties in cloud computing identified with security approach.
Outline of the research
Objective
Data Collection
1.1 Data Sources
1.2 Collection of data
1.3 Data Storage
Design and Implementation
2.1 Data pre-computing
2.2 Feature selection or dimension reduction
2.3 Experiment designing
2.3.1 Detailed design steps
2.4 Implementation
Analysis
3.1 Results Estimation
3.2 Results Summary
References
Chauhan, P. and Bansal, P., 2017. Emphasizing on Various Security Challenges in Cloud Forensic Framework. Indian Journal of Science and Technology, 10(18).
Chen, X., Chen, C., Tao, Y. and Hu, J., 2015. A cloud security assessment system based on classifying and grading. IEEE Cloud Computing, 2(2), pp.58-67.
Chouhan, P. and Singh, R., 2016. Security attacks on cloud computing with possible solution. International Journal of Advanced Research in Computer Science and Software Engineering, 6(1).
Cook, A., Robinson, M., Ferrag, M.A., Maglaras, L.A., He, Y., Jones, K. and Janicke, H., 2018. Internet of Cloud: Security and Privacy Challenges. In Cloud Computing for Optimization: Foundations, Applications, and Challenges (pp. 271-301). Springer, Cham.
De Carvalho, C.A.B., de Castro Andrade, R.M., de Castro, M.F., Coutinho, E.F. and Agoulmine, N., 2017. State of the art and challenges of security SLA for cloud computing. Computers & Electrical Engineering, 59, pp.141-152.
Guo, C. and Zheng, X., 2015. The Research of Data Security Mechanism Based on Cloud Computing. International Journal of Security and Its Applications, 9(3), pp.363-370.
Joseph, A.O., Kathrine, J.W. and Vijayan, R., 2014. Cloud security mechanisms for data protection: a survey. International Journal of Multimedia and Ubiquitous Engineering, 9(9), pp.81-90.
Jyothi, C. and Bhavani, P., 2017. Study on Security Controversies and Techniques in Cloud Computing. International Journal of Research, 4(14), pp.5568-5572.
Kaur, M. and Singh, H., 2015. A review of cloud computing security challenges. International Journal of Advances in Engineering & Technology, 8(3), p.397.
Khan, N. and Al-Yasiri, A., 2016. Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Computer Science, 94, pp.485-490.
Khattak, H.A.K., Abbass, H., Naeem, A., Saleem, K. and Iqbal, W., 2015, October. Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure. In E-health Networking, Application & Services (HealthCom), 2015 17th International Conference on (pp. 61-67). IEEE.
Tari, Z., 2014. Security and Privacy in Cloud Computing. IEEE Cloud Computing, 1(1), pp.54-57.
Tirthani, N. and Ganesan, R., 2014. Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography. IACR Cryptology ePrint Archive, 2014, p.49.
Washizaki, H., Fukumoto, S., Yamamoto, M., Yoshizawa, M., Fukazawa, Y., Kato, T., Ogata, S., Kaiya, H., Fernandez, E.B., Kanuka, H. and Kondo, Y., 2016, June. A metamodel for security and privacy knowledge in cloud services. In 2016 IEEE World Congress on Services (SERVICES) (pp. 142-143). IEEE.
Yu, W., Yu, P., Wang, J., Wei, C., Gong, L., Li, W., Cui, B., Tadepalli, H.K. and Will, B., 2018, May. Protecting Your Own Private Key in Cloud: Security, Scalability and Performance. In 2018 IEEE Conference on Communications and Network Security (CNS) (pp. 1-2). IEEE.
Massonet, P., Luna, J., Pannetrat, A. and Trapero, R., 2015, March. Idea: Optimising multi-cloud deployments with security controls as constraints. In International Symposium on Engineering Secure Software and Systems (pp. 102-110). Springer, Cham.
Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. and Suri, N., 2016. Novel efficient techniques for real-time cloud security assessment. Computers & Security, 62, pp.1-18.
Raza, N., Rashid, I. and Awan, F.A., 2017. Security and management framework for an organization operating in cloud environment. Annals of Telecommunications, 72(5-6), pp.325-333.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.
Ryoo, J., Rizvi, S., Aiken, W. and Kissell, J., 2014. Cloud security auditing: challenges and emerging approaches. IEEE Security & Privacy, (1), pp.1-1.
Taha, A., Trapero, R., Luna, J. and Suri, N., 2014, September. AHP-based quantitative approach for assessing and comparing cloud security. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on (pp. 284-291). IEEE.
Kaur, R. and Kaur, J., 2015, March. Cloud computing security challenges and its solution: A review. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 1198-1200). IEEE.
Kulkarni, P. and Khanai, R., 2015, April. Addressing mobile Cloud Computing security challenges: A survey. In Communications and Signal Computing (ICCSP), 2015 International Conference on (pp. 1463-1467). IEEE.
Casola, V., De Benedictis, A. and Rak, M., 2015, August. Security monitoring in the cloud: an SLA-based approach. In Availability, Reliability and Security (ARES), 2015 10th International Conference on (pp. 749-755). IEEE.
Chandra, J.V., Challa, N. and Pasupuleti, S.K., 2016, March. Advanced persistent threat defense system using self-destructive mechanism for cloud security. In Engineering and Technology (ICETECH), 2016 IEEE International Conference on (pp. 7-11). IEEE.
Sharma, V.D., Agarwai, S., Moin, S.S. and Qadeer, M.A., 2017, November. Security in cloud computing. In 2017 7th International Conference on Communication Systems and Network Technologies (CSNT) (pp. 234-239). IEEE.
Spanaki, K., Gürgüç, Z., Mulligan, C. and Lupu, E., 2018. Organizational cloud security and control: a proactive approach. Information Technology & People.
Vacca, J.R. ed., 2016. Cloud computing security: foundations and challenges. CRC Press.
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 10 pages
PAY 6 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2019). Various Security Challenges In Cloud Forensic. Retrieved from https://myassignmenthelp.com/free-samples/various-security-challenges-in-cloud-forensic.
“Various Security Challenges In Cloud Forensic.” My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/various-security-challenges-in-cloud-forensic.
My Assignment Help (2019) Various Security Challenges In Cloud Forensic [Online]. Available from: https://myassignmenthelp.com/free-samples/various-security-challenges-in-cloud-forensic[Accessed 19 December 2021].
My Assignment Help. ‘Various Security Challenges In Cloud Forensic’ (My Assignment Help, 2019)
My Assignment Help. Various Security Challenges In Cloud Forensic [Internet]. My Assignment Help. 2019 [cited 19 December 2021]. Available from: https://myassignmenthelp.com/free-samples/various-security-challenges-in-cloud-forensic.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
MyAssignmenthelp.com is one of the cheap essay writing service that provides top quality essays. We provide essays on almost every topic on any subject or domain. We provide you with descriptive essay topics/, informative speech essay topics, persuasive speech topics for college students,reflective essay topics and many more along with well-crafted essays on each topic.Getting online essay help becomes a peace of cake with MyAssignmenthelp.com.We also provide tips from time to time to help you ace the art of essay writing. Once you have mastered with us how to write an essay fast, you can draft on your own. Connect with us today.
Latest Project Management Samples
div#loaddata .card img {max-width: 100%;
}
SBM 1201 Project Scope, Time And Cost Management
Download :
0 | Pages :
12
Course Code: SBM1201
University: Asia Pacific International College
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
This project plan deals with the development of a fuel-efficient HHO Generator. The HHO fuel cells may appear to provide high fuel efficiency to the users. Nevertheless, there are a few confinements and focuses to be seen, as given beneath. This is to clear up that there is NO 100% substitution of petroleum derivative by including HHO cell. HHO gas is otherwise called Brown Gas, yet this is to illuminate that HHO gas is n…
Read
More
Tags:
Australia Footscray Management organisational behviour University of New South Wales Masters in Business Administration
HS2061 Information Systems Project Management
Download :
0 | Pages :
9
Course Code: HS2061
University: Holmes Institute
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Case Overview:
The project owner of the Signed, sealed, delivered courier service is facing the problems of managing order of couriers in the synchronised manner. The project manager is incapable of managing central warehouse for the dispatching of products. The important information can be lost with the passage of time. The inventory management of the warehouse is the major concern for the owner of the company. He is looking forward …
Read
More
OPS 935 Project Management
Download :
0 | Pages :
11
Course Code: OPS935
University: University Of Wollongong
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
This essay explores the impacts of digital technologies on project management. It explores how adoption of digital technologies by companies for managing their project have affected their, project managers, human resource, business processes, timelines, deliverables, and practices of risk management, people management and quality management.
Impact of Digital technologies on Project Management Practices
Digital te…
Read
More
Tags:
Australia Saint Kilda Management International Management University of New South Wales Masters in Business Administration
ITC505 ICT Project Management
Download :
0 | Pages :
10
Course Code: ITC505
University: Charles Sturt University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers
Case Study- Social Media Research Center
Task-1: Project Charter
Project Objectives
The main objective of the project is to develop a web-based system within the organization “Social Media research Center”. It is analyzed that the Social Media research center wants to develop the web based system in order to connect people with the organization for promoting its research center. The web-based system that is developed conta…
Read
More
Tags:
Australia Alfredton Management IT Network Security University of New South Wales Masters in Business Administration
ITC505 ICT Project Management
Download :
0 | Pages :
7
Course Code: ITC505
University: Charles Sturt University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers
Part One- Project Name / Team / Description
Project Name:
RALS Solution
Team Name:
Consultants for RALS
Project Description:
RALS organizes show for the farmers and other related small business persons to display their latest technology equipment for betterment in the field of agriculture and crop production. The show has different types of stalls and other facilities for which many volunteers …
Read
More
Next