Data Security in Cloud Services

Submitted by
Sameerkumar Prajapat

A Dissertation Presented in Partial Fulfillment
of the Requirements for the Degree
Doctor of Education/Philosophy in Leadership
with a specialization in _____________

Judson University
Elgin, Illinois
Date (of the committee or Dean’s signature)

Abstract

The main goal of this research paper is exploring the current state of data security system in the cloud service industry. The dissertation will also analyze the ability of the current systems to combat the ever-evolving threats in the industry. To understand the same, the dissertation will collect data from literary sources that focus on cloud security systems. The main research methodology for the dissertation will be a thematic analysis. The dissertation will analyze the data collected through a comprehensive thematic analysis that will group the data into three main categories: the current data security threats, the current security framework & the future data security threats. This knowledge will be used to understand the current state of data security, the future threats that are expected and the avenues of evolution that are necessary to combat the same. The research team will use purposive sampling to ensure that the research is conducted on relevant literary sources. The data sourcing, extraction and indexing processes will be handled in a professional manner to eliminate bias and preferences. The dissertation wishes to arrive at a valid and reliable result that provides a complete overview of the current cloud data security domain. In addition to the thematic analysis, the research study also provides a brief overview of the current literature about the topic through an insightful literature review. The research study also provides a brief overview of the limitations and ethical considerations that might affect the dissertation process.
Table of Contents
Chapter 1: Introduction 3
Background 3
Problem Statement and Significance 4
Theoretical Framework 5
Researcher’s Positionality 8
Purpose 9
Research Question(s) 9
Significance 10
Definition of Terms 10
Homework help – Summary 11
Chapter 3: Introduction 11
Statement of the Problem 12
Research Question(s) 12
Research Methodology 13
Research Design 13
Study Population & Sample Selection 14
Data Collection Methods 15
Data Collection Procedures 16
Data Analysis & Procedures 16
Validity & Reliability 17
Ethical Consideration 18
Limitations 1 8
Homework help – Summary 19

Chapter 1: Introduction

Background
Cloud services have gained a lot of popularity in the current technological era. With the rapid increase in digital adoption, even small and medium organizations are looking to improve their organizational efficiency and increase their revenue through cloud-based services. Rather than a physical on-site server, cloud services are services that are made available via a remote cloud computing system (Zhe et al., 2017). In today’s business environment cloud service providers can be seen as third-party suppliers who help organizations run critical services through their remote cloud servers. This makes cloud services less costly to operate and maintain in the longer run, and it is also one of the main reasons that organizations are moving towards cloud-based organizational frameworks. Cloud services also provide several other benefits to both the organizations and the consumers. Therefore, it has gained wide recognition among organizations as a desirable addition to the current IT infrastructure (Zhe et al., 2017).
It is important to understand that cloud services also have several disadvantages, and these disadvantages limit the widespread use of cloud services and the growth of cloud services within organizations. One of the major problems with cloud services is that it is not secure. As mentioned earlier, cloud services are not run from a cloud computing server that is not on-site. Therefore, there are several data security risks associated with cloud services. A typical cloud provider does not hold the necessary access keys (Zhe et al., 2017). If an organization does not have a strong user identity, an attacker would be able to compromise the entire organization. Moreover, there is a very high risk that employees and non-technical workers may be left behind when a cloud service is shut down. Therefore, if a cloud service is being disrupted during time of business, security is compromised for many organizations (Zhe et al., 2017).
With the increasing demand for digitization, we can clearly see that cloud services will play a major part in society. Therefore, it is critical to ensure that the data security risks associated with cloud services need to be addressed and mitigated efficiently. We can see several cloud service providers work towards improving their security practices through user audits and peer reviews as well as by addressing data breach mitigation techniques and strategies (Shaikh & Modak, 2017). However, most of them could be considered as stop-gap measures and not permanent solutions. Since technology is constantly evolving, the nature of threats for the field is also constantly changing. Therefore, it is important to completely understand the security risks and look for ways to enable a sustainable data security solution for cloud services (Shaikh & Modak, 2017).

Problem Statement and Significance
The COVID-19 pandemic in 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers has accelerated the digital transformation of organizations in several sectors. This rapid increase in digitization and the popularity of the cloud computing systems have led to a situation where most organizations are looking at creating a cloud-based operational framework. This combination makes the organizations more susceptible to data security risks (Kumar et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). The responsibility of mitigating these risks and keeping the organizations safe falls on the hands of the third-party cloud suppliers. Therefore, these data security risks do not just impact the end organizations but also the third-party cloud suppliers. With the increase in the number of cloud service users, they will find it hard to manage cloud systems and mitigate risks immediately. It is also important to note that the data security risks that threaten cloud services are of a varied nature. This creates a major problem for cloud service providers (Kumar et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online).
An evaluation of current and future threats against cloud services is not only a challenge for cloud providers but for companies within the industry as well. This dissertation will look to explore the current data security risks and analyze the security systems that third-party cloud suppliers have in place to comprehensively understand the current cloud service environment. This will help create sustainable solutions to combat the data security risks and issues (Kumar et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). With this understanding, cloud service providers will be able to reduce the financial risks and help with data security issues, protect their customers and help solve the data security issues of their cloud-based data services. Another important goal of the dissertation is to gain knowledge about the new data security threats that are emerging in the cloud service sector. This will be a significant problem in the coming years as the cloud services industry continues to evolve with the increased complexity of the data management business model. Therefore, the dissertation will be focused on understanding and evaluating both the current and emerging threats that threaten the data security of cloud services (Kumar et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). To ensure that the dissertation is focused, the same will be centred upon answering three important research questions that are mentioned below.
R1: What are the current data security issues and risks that threaten cloud service providers?
R2: What are the predicted future trends for the data security issues?
R3: How can current cloud data security be made more efficient to facilitate tighter data security?

Theoretical Framework
The term cloud services refer to services that are provided through remote cloud servers that are set up by third-party service providers. Cloud services have started to gain prominence because of their ability to increase organizational efficiency at minimal costs. Many cloud services are designed around remote storage, which reduces infrastructure and administration costs (Udendhran, 2017). The cloud market provides a number of potential cloud services including file sharing and data management/analysis. These cloud services are highly beneficial for organizations from all sectors because they can scale without the burden of huge costs. Cloud services also enables organizations to study, manage and analyze large sets of data without having their own servers or data centers. Data centers are expensive as they have higher operational and service costs when compared to cloud computing systems (Udendhran, 2017).
With the help of cloud services, organizations can manage complex business operations including business logic, risk management, data recovery, and transaction management. We can also clearly see that there are new technological advancements and innovations that are helping the cloud computing field grow at a rapid pace (Udendhran, 2017). While this is beneficial for organizations, this rapid growth also increases data security risks. Data security is an important part of both enterprise and corporate security. Data security at an organizational level can be mitigated and eliminated with the help of strong encryption technologies or secure protocols. However, these systems have little effect when it comes to cloud data security as the threats are highly varied in nature (Udendhran, 2017).
Cloud data security has been a cause for concern for many years and there have been several developments in this regard. Cloud service providers have created various measures to ensure the security of the data. Data protection systems are also deployed and maintained within the cloud and the organizational end by a number of technologies (Udendhran, 2017). For instance, companies have made it mandatory for IT staff to download and use encryption software before passing on key data to users. It is also important to understand what role machine learning can play in corporate cloud storage platforms. Since the data security threats are constantly evolving, many cloud service providers have incorporated AI-based systems like machine learning to help manage the security risks through threat analysis. These strategies have helped cloud service systems operate efficiently and mitigate data security threats to a level. This is further evidenced by several research papers on the topic (Udendhran, 2017).
However, many literary papers that have explored the concept have shown that the service providers are reacting to the threats rather than proactively creating security systems. While this has worked till now, the reactive data security systems might not be able to keep data secure in the current business environment where most of the companies have started to use digital and cloud-based systems (Giri & Shakya, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). With the increase in the number of customers, cloud service providers might find it difficult to manage their data privacy policies and security measures efficiently. Therefore, it is important to thoroughly analyze the current data security threats to create standardized systems that can provide sustainable security results. It is also important to use the analysis to predict future data security threats that might increase the cost and complexity of data protection and monitoring solutions (Giri & Shakya, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers).
This dissertation will analyze the cloud data security threats to know what data security threats are growing the most and propose solutions for the service providers to help them address these threats and protect the data better. The dissertation will also show how cloud service providers could develop the needed technologies to deal with the security issues that they might face in the future (Giri & Shakya, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). The research paper will also look to propose data security risk models that could help cloud service providers understand emerging threats in the cloud service sector. This will help them provide better protection against new data security threats and render faster resolutions to mitigate new data security threats. The dissertation will primarily collect data from literary papers on data security risks/threats and cloud-based systems (Giri & Shakya, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers).
The dissertation will look to collect data from academic libraries to better understand the cloud data security framework. The dissertation will use document analysis on the literary reviews to gain new insights into the cloud data security framework. The data collected through the document analysis will be further explored through thematic analysis. This thematic analysis will be focused on three main categories: the current data security threats, the current security framework & the future data security threats. Future threats are predicted using evidences present in the literary papers. In addition to exploring the current cloud data security frameworks, the thematic analysis will help predict new threats and the same can be used as a guideline for creating new data security systems. The researchers will also use textual analysis to help determine where new and emerging threats could come from, and the best security strategy for dealing with these issues/risks (Akhil et al., 2017).
The focus here is to help improve the current data security systems present in the cloud service sector. This thematic analysis will also help researchers and professionals in the field of cloud data security. To ensure that the research is up to date, this thematic analysis will look at the most recent literary works in the field of data protection (Akhil et al., 2017). It will then focus on predicting and analyzing which elements of these works hold up the current cloud data security framework. This will include, for example, the current security frameworks and the current data protection solutions within that framework. The latter two features will help us to understand how the current cloud data security framework is failing as compared to the current threats (Akhil et al., 2017).

Researcher’s Positionality
Cloud computing systems have become a major part of the society that we live in, and hence it is important to understand the benefits and challenges that are present in the same. While researching the topic of cloud computing and its related services, it was clear that data security has become a major concern for most of the service providers (Akhil et al., 2017). Even with the development of various technologies and systems to combat security risks and issues, there are still concerns regarding the security of the cloud data. This prompted the researcher to explore the topic in detail. The researcher was also fascinated by the fact that most of the organizations are moving to digital and cloud-based systems due to the pandemic. Therefore, the impact of a data security breach has become higher in the current society. Thus, the researcher felt that there needs to be an exploration on the future security risks and issues that could threaten cloud service providers (Akhil et al., 2017).

Purpose
The main goal of the dissertation is to explore the efficiency of the current cloud data security systems and understanding whether they will be able to handle issues that could arise in the future. Based on the analysis, the dissertation will also provide suggestions and alternatives to improve cloud data security (Kumar et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online).

Research Question(s)
Cloud data security is not an isolated issue that will affect only select organizations. Since most of the organizations in the society is moving towards a digital-only operation, any data security risk will affect a wide range of companies. This is detrimental for the whole society. Therefore, there needs to be extensive research on the data security systems of service providers rendering cloud computing services (Kumar et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). In this dissertation, the main focus is understanding the current cloud data security scenario and improving the same with the help of extensive research into the field. To ensure that the dissertation is focused, the same will be centred upon answering three important research questions that are mentioned below.
R1: What are the current data security issues and risks that threaten cloud service providers?
R2: What are the predicted future trends for the data security issues?
R3: How can current cloud data security be made more efficient to facilitate tighter data security?
Significance
As mentioned earlier, a data hack in cloud services would cause major disruptions in the current society. Data needs to be secured efficiently to ensure that organizations can operate efficiently because of the rapid increase of digitization where most of the companies are moving towards a cloud-based infrastructure. With the increasing data flow, the security and privacy are of utmost importance. It is considered important to ensure the security of data and the privacy of users from any attack (Zhe et al., 2017). Therefore, it is important to create a data security system that is capable of handling both current and future data security issues. This dissertation aims to render significant contribution to the field by analyzing the data security issues to find emerging data hacking and security related trends. The research into the domain is significant to improve the data security frameworks of cloud service providers and enhance them to mitigate future risks in the domain efficiently (Zhe et al., 2017).

Definition of Terms
i. Machine Learning – Machine Learning is a type of Artificial Intelligence that uses systems to learn from data, identify patterns and learn to make decisions with limited human intervention (Zhe et al., 2017).
ii. Cloud Computing – Cloud computing is a type of computer system resource that uses on-demand data storage and computing power (Zhe et al., 2017).

Homework help – Summary
Cloud computing system have started to gain extensive recognition because of the various benefits that it provides organizations from several sectors. Cloud services have become a critical tool for organizational growth and have helped several organizations improve their digital frameworks significantly. However, there are still several issues that hinder the implementation and development of cloud services. One of the main issues that cloud service providers face is data security. Data security is a major concern for cloud service providers and organizations using cloud-based frameworks because the cloud data is located in third-party servers. Even though several cloud service providers are using security systems to enhance data security, the efficiency of the current systems in stopping any future security issues and risks is debatable. This dissertation aims to explore the current data security threats faced by cloud service providers, and analyze the efficiency of the current data security systems. The dissertation will also predict future data security trends with the help of literary sources and propose changes that can be made to the current digital security frameworks based on the same.

Chapter 3: Methodology

Introduction
In this methodology section, the researcher will provide an overview of the research methodology and framework used in the dissertation. The dissertation is focused on understanding the data security standards of current cloud networks and check their ability to handle the ever-evolving threats faced by cloud service providers. The dissertation will also render alternative suggestions for deficiencies in the current cloud security strategies (Kritikos et al., 2017). To study the efficiency of cloud data security, the dissertation will identify peer-reviewed literary sources for thematic document analysis. In addition to the research methodology, the section will also explore the data collection methodologies and the validity and ethical consideration for the research.

Statement of the Problem
This dissertation will focus on exploring both the current data security risks and the future data risks/issues that threaten the current cloud security frameworks. The main goal is to provide a comprehensive understanding of the current cloud service environment and create sustainable solutions to combat data security risks that threaten the field and help reduce the financial and operational risks of companies in the field. The research focus will also include the exploration of future cloud data security frameworks to keep up with the increased complexity of the data management business model.
Research Question(s)
The cloud data security dissertation will focus on answering four core research questions that pertain to the field. They are
R1: What are the current data security issues and risks that threaten cloud service providers?
R2: What are the predicted future trends for the data security issues?
How can current cloud data security be made more efficient to facilitate tighter data security?
Research Methodology
The dissertation uses qualitative research methodology, especially qualitative thematic analysis, to dissect the cloud data security environment and analyze the risks surrounding the same. The thematic analysis is a research methodology that is focused on analyzing qualitative data that is collated from a set of texts, especially literary documents and interview transcripts (Kritikos et al., 2017). The thematic analysis will be conducted on a set of peer-reviewed literary sources that are focused on the title. The methodology involves the identification and analysis of informative sections from the selected sources. With the aid of thematic analysis, researchers are able to identify common topics, ideologies, and patterns that highlight the data security efficiency of current cloud computing and service systems. Thematic analysis also helps researchers identify the major data/information security risks that will affect the cloud environment. The research study will use thematic analysis as a method to identify the current data security issues and learn the efficacy of current cloud data security systems. The focus of the thematic analysis is identifying and analyzing textual samples based on three major themes, namely current data security threats; cloud security frameworks; and future threats and capabilities. Through this methodology, this research study will be able to provide fact-based inferences that can lead to better results. (Kritikos et al., 2017).

Research Design
The approach to cloud data security research will be focused on thematic analysis of literary documents. The core research framework will be a thematic analysis of peer-reviewed literary sources sourced from authentic public websites. Through identification and synthesis of these sources, it will be easier to identify a significant subset of the topics and ideologies that have impacted the cloud computing security landscape and how these themes will impact cloud security systems (Vaismoradi & Snelgrove, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). These core topics will then be analyzed in relation to data security requirements, how they relate to the cloud and service infrastructure, and which data security tools will be helpful. To select the most relevant literary sources, various research instrumentation such as social networking applications, website crawling tools, document-tracking tools, and mobile data analysis tools will be used. The analysis of the literary sources will help analyze this relevant information and identify specific security trends. The design of the research methodology will include multiple steps, and each step requires careful selection and validation of the data sources that will be utilized for the document analysis (Vaismoradi & Snelgrove, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers).

Study Population & Sample Selection
This dissertation will analyze the dissertation will analyze the efficacy of data security measures in the current cloud computing environment. Therefore, the dissertation concerns all the sectors that are dependent on cloud computing and cloud service systems. The dissertation mainly concerns cloud service providers, who are the most vulnerable to cyber security concerns in the current cloud computing environment (Vaismoradi & Snelgrove, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). In addition, this study will be beneficial:
1) Business and Government organizations
2) Data Scientists, Data Analysts, Data Entry Managers, IT Directors, Engineers, System Scroving Managers, CXOs and Designers (the “Public”)
3) Enterprise Service Providers, Contractors and Other IT (Technical) Support Service Providers
4) IT Contractors
5) Big Data Analytics/Analytics Tools / Analysis Services
6) Data Storage Service Providers
7) Data Mining Service Providers
8) Digital Content Management Systems

The research methodology and sample selection will be developed from all aspects of research, and they will be executed with utmost sincerity. All the research material (including original source files) was acquired through research institutes and/or commercial libraries. The literary documents for the study will be acquired from relevant and reliable sources. Purposive sampling, a sampling method where researchers can select sources based on their judgement, will be used for selecting literary documents. With purposive sampling, documents with the most relevant subject matter, information sources and/or platforms will be sought. In addition, various categories of sources will be included. The document selection will be then performed over a three-week period, during which several samples were collected from various sites.

Data Collection Methods
The dissertation primarily uses purposive document selection for selecting the relevant literary sources. The sequential document selection will be used in connection with purposive sampling to determine which topics will be the most relevant to the research question at hand.
R1: What are the current data security issues and risks that threaten cloud service providers?
R2: What are the predicted future trends for the data security issues?
How can current cloud data security be made more efficient to facilitate tighter data security?

For this purpose, the subjects are identified through the information available in the most recent academic publications from the same subjects in the field of cloud data security. The selection of relevant documents and the study’s goals, strategies, and results will be performed by means of the data extraction, indexing and/or comparison processes (Bunkar & Rai, 2017). These processes will be conducted by the researcher physically.
Data extraction – The selected documents will be analyzed for data related to the themes of cloud data security and data security issues.
Data Indexing – The relevant data will be grouped into themes.
Data Comparison – The data will be analyzed for identifying the most prominent issue, the current data security framework and the avenues for improvement. With the aid of purposive sampling methodology, literary sources with specific characteristics including topic relevance, data security exploration and cloud storage, as well as the subject matter themselves, will be systematically selected from the available literature (Bunkar & Rai, 2017).
The complete step-by-step data collection procedure is explored in detail in this section.
i. Research and identification of literary source pools from reputed scholarly sources.
ii. Examination and judgement-based selection of literary documents using purposive sampling with specific criteria (topic/data relevance, depth of exploration, etc.)
iii. Factual information selection and collection using sequential data selection methodology.
iv. Data extraction, categorization & thematic matching using physical identification and interpretation (Bunkar & Rai, 2017).

Data Analysis & Procedures
Much like the previous section, this section will explore the data analysis procedures of this study. The core data analysis procedure used in the dissertation is thematic analysis that is based on categorizing themes to arrive at an informed and factual decision (Powell et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). The step-by-step exploration of the same is as follows. In the first step, the theme determination using topic and information necessity. The major themes are
a. Data Security Procedures
b. Current Cloud Computing Frameworks
c. Current Data Security Deficiencies
d. Future Data Security Threats/Issues
The identified literary sources will be studied for identification and inference of the relevant themes. The themes will then be categorized into factual and well-defined data sets for future research and analysis (Powell et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online).
The grouped themes will be analyzed for interrelated variables to understand the key research answers. With the help of the analysis, this study hopes to learn about the current state of the Cloud Security environment and the data security efficacy, deficiencies and limitations. The focus will also be on identifying future data security risks and the necessary innovations and adaptations required to combat the same.

Validity & Reliability
The dissertation seeks to arrive at a conclusion that the current data security procedures require constant monitoring and evolution to combat threats that are ever evolving. The lack of comprehensive cloud security frameworks that are capable of combating new threats regarding data security is also seen as a major concern (Powell et al., 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). The validity of the dissertation conclusion about the need for evolution was derived from factual interpretation of the current cloud security frameworks and the information sources that come with them. In addition to the Data that come with the framework, important factors like latest technologies that are being developed in that framework and in fact for the new data will be also explored in the dissertation. This will add further validity to the research conclusion.
The major research instruments that will be used in the research are sequential data analysis and thematic analysis on literary sources. The reliability of the research instruments will be verified to ensure that they are sound, and their involvement will be able to resolve some of the issues related to the research. The content of the research and the data that are provided for the research is unique to the field and is of high quality. The research on literary sources has a higher chance of providing the same results. This study hopes that the information collection procedure can be replicated and that there will be a higher chance of arriving at the same inference in the “second” round of validation. The main consideration for the validity of the research is the methodology of the research. For this reason, the research instrument has to be performed on a real dataset that is selected from peer-reviewed literary sources (Nowell et al., 2017).

Ethical Considerations
The document analysis is a research methodology that needs strong ethical behavior from the researchers. The research instruments and methodology can be misused by the research team and the information needs to be monitored for falsification of the data and in the research with an appropriate policy. When it comes to the scientific research in academic areas, ethical behavior needs to be observed from the start (Vaismoradi & Snelgrove, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). It is not something that can be done easily, and one has to work through the scientific process in order to obtain the necessary understanding and the relevant ethical behavior from the researchers. Ethical issues based on data misuse and sampling bias are some of the main considerations for the dissertation team. Therefore, the team will monitor and review the document selection and thematic analysis procedures to make good ethical decisions.

Limitations
This research on cloud data systems will provide significant insights and the need for the evolution of data security tools and strategies. However, the research might limit in scope and scale. The research methodology focuses on thematically analyzing the cloud security system based on literary sources. Any future research needs to focus on analyzing threats and vulnerabilities that are based on recent real-life scenarios (Kritikos et al., 2017). This will provide a better understanding of new security threats in the future and also present a good approach to the researchers and professionals in the cloud data security field. The research is also centered around security threats that are highly popular in nature. This is because most generic and popular security threats are covered in literary sources. Therefore, the need for analysis of specific threats that are rare will also be an avenue for future research works. This will help data security service providers gain a better understanding of the field (Kritikos et al., 2017).

Homework help – Summary
The third chapter of the proposal will be completely focused on exploring the research methodology used. The dissertation will use qualitative document analysis and thematic analysis to thematically categorize information collected from peer-reviewed literary sources. The information will then be analyzed using factual interpretations and cross-relation analytics to render a comprehensive answer to the core research question(s). In addition to the research methodology, the chapter also explores the main data collection methodology of purposive sampling. The literary articles will be selected based on specific criteria and topical relevance. The data analysis methodology and step-by-step procedure was also provided to ensure enhanced understanding of the research. Furthermore, the chapter also provides proofs of validity and reliability for the research methodology and the instruments. The limitations of the research and the ethical considerations that were part of the dissertation was also explored to provide a comprehensive overview of the process. The research methodology hopes to arrive at the conclusion that data security systems need significant levels of evolution to combat future security threats and issues.

References
Akhil, K. M., Kumar, M. P., & Pushpa, B. R. (2017, June). Enhanced cloud data security using AES algorithm. In 2017 International Conference on Intelligent Computing and Control (I2C2) (pp. 1-5). IEEE.
Bunkar, R. K., & Rai, P. K. (2017). Study on security model in cloud computing. International Journal of Advanced Research in Computer Science, 8(7), 841.
Giri, S., & Shakya, S. (2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). Cloud computing and data security challenges: A Nepal case. International Journal of Engineering Trends and Technology, 67 (3), 146, 150.
Kritikos, K., Laurenzi, E., & Hinkelmann, K. (2017, September). Towards business-to-IT alignment in the cloud. In European Conference on Service-Oriented and Cloud Computing (pp. 35-52). Springer, Cham.
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697.
Nowell, L. S., Norris, J. M., White, D. E., & Moules, N. J. (2017). Thematic analysis: Striving to meet the trustworthiness criteria. International journal of qualitative methods, 16(1), 1609406917733847.
Powell, C., Miura, K., & Munetomo, M. (2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online, July). Optimal cloud resource selection method considering hard and soft constraints and multiple conflicting objectives. In 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 831-835). IEEE.
Shaikh, R. A., & Modak, M. M. (2017, August). Measuring Data Security for a Cloud Computing Service. In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (pp. 1-5). IEEE.
Udendhran, R. (2017, March). A hybrid approach to enhance data security in cloud storage. In Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing (pp. 1-6).
Vaismoradi, M., & Snelgrove, S. (2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers, September). Theme in qualitative content analysis and thematic analysis. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (Vol. 20, No. 3).
Zhe, D., Qinghong, W., Naizheng, S., & Yuhan, Z. (2017, May). Study on data security policy based on cloud storage. In 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids) (pp. 145-149). IEEE.

Published by
Research Helper
View all posts