18 Jun WHAT ARE THE STRENGTHS AND WEAKNESSES OF THE CLOUD DATA ENCRYPTION TECHNIQUES?
The security, in particular confidentiality, of cloud-based applications is a key issue that is preventing the adoption of the cloud platform. The purpose of the present research is to review various data encryption techniques that can be used to ensure the confidentiality of users in the cloud. The review will focus on the efficacy of the existing data encryption techniques as well as their reliability in the cloud platform. As such, the strengths and weaknesses of each encryption technique will be examined with the aim of identifying way through which they can be utilized in the cloud. The ultimate goal is to provide guidelines about the best techniques to cloud users and cloud service providers.
Aims
The main aims of the research include:
To review the existing data encryption techniques that are applicable to cloud
To compare the strengths and weaknesses of the existing data encryption techniques as well as their efficacy in the cloud platform.
To provide guidelines regarding to cloud users and cloud service providers regarding the best ways of utilizing data encryption techniques in ensuring the confidentiality of cloud
Target Deliverables
The proposed research aim to produce two deliverables. The first outcome will be delivered after two weeks while the second outcome will be delivered at the end of the month. The details of the outcomes are provided below.
Encryption technique cloud confidentiality:
The results of the ASIF encryption Algorithm will be compared with the results of other studies to identify the best encryption technique for ensuring the confidentiality of the cloud users.
Preliminary Report
This report will contain the outcome of the literature review including the efficacy of the data encryption techniques as well as their strengths and weaknesses. An updated preliminary report will be presented after the synthesis of the literature to identify key encryption techniques as well as the results of their implementation.
Dissertation
The outcomes of project phases will be merged in a thesis that will be submitted at the end of the course.
Research Question
The main research question for the proposed study is: To what extinct can the data encryption techniques be used to ensure the confidentiality of cloud users?
The sub-questions are:
What are the main data encryption techniques that can be used to ensure the confidentiality of cloud users?
What are the strengths and weaknesses of the cloud data encryption techniques?
What is the most effective data encryption technique in relation to cloud computing?
By answering these questions, guidelines regarding the most effective data encryption techniques will be provided. The guidelines will be important for cloud service providers and users.
Significance of the project
The fact that the data owners transfer the security and privacy roles to the cloud service providers is a major concern for users (Kumari & Nath, 2014). In light of this concern, various studies have explored ways of ensuring the privacy and security of users of the cloud platform. From the studies, data encryption techniques have emerged as the most popular approaches. Although this techniques have proved to be effective in ensuring the security and privacy of users, the rate of the adoption of cloud computing is low due to the same security and privacy concerns.
Various studies have examined the data encryption techniques as well as other security and privacy techniques in cloud computing (Kaur & Verma, 2014). Other studies have also examined the strengths and weaknesses of the techniques in relation to the cloud
platform (Khatri & Kumar, 2015; Shabir, Iqbal, Mahmood & Ghafoor, 2016). However, none of the studies has compared the efficacy of the techniques to provide guidelines for cloud service providers and users. As such, the proposed research will fill this gap by comparing the efficacy of the data encryption techniques in cloud computing to provide standard guidelines that can be used by the service providers and users. The proposed study is vital in creating awareness regarding security and privacy in
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
