Chat with us, powered by LiveChat Proposal Reflection Assignment Write a 2-3 page reflection to comment on the similarity report ge | Max paper
  

  

Proposal Reflection Assignment

Write a 2-3 page reflection to comment on the similarity report generated by Turnitin. What does this report say about the originality of your work as it exists now? What do you need to do to improve on the current condition of the work? What support do you need and what would you do to get the needed support? (Please be detailed and specific). 

20

Data Security in Cloud Services

Submitted by

Sameerkumar Prajapat

A Dissertation Presented in Partial Fulfillment

of the Requirements for the Degree

Doctor of Education/Philosophy in Leadership

with a specialization in _____________

Judson University

Elgin, Illinois

Date (of the committee or Dean’s signature)

Abstract

The main goal of this research paper is exploring the current state of data security system in the cloud service industry. The dissertation will also analyze the ability of the current systems to combat the ever-evolving threats in the industry. To understand the same, the dissertation will collect data from literary sources that focus on cloud security systems. The main research methodology for the dissertation will be a thematic analysis. The dissertation will analyze the data collected through a comprehensive thematic analysis that will group the data into three main categories: the current data security threats, the current security framework & the future data security threats. This knowledge will be used to understand the current state of data security, the future threats that are expected and the avenues of evolution that are necessary to combat the same. The research team will use purposive sampling to ensure that the research is conducted on relevant literary sources. The data sourcing, extraction and indexing processes will be handled in a professional manner to eliminate bias and preferences. The dissertation wishes to arrive at a valid and reliable result that provides a complete overview of the current cloud data security domain. In addition to the thematic analysis, the research study also provides a brief overview of the current literature about the topic through an insightful literature review. The research study also provides a brief overview of the limitations and ethical considerations that might affect the dissertation process. Comment by Author: Proposal. It’s not a dissertation until you do your study

Table of Contents

Chapter 1: Introduction
3

Background
3

Problem Statement and Significance
4

Theoretical Framework 5

Researcher’s Positionality
8

Purpose
9

Research Question(s)
9

Significance
10

Definition of Terms
10

Summary

11

Chapter 3: Introduction
11

Statement of the Problem
12

Research Question(s)
12

Research Methodology
13

Research Design
13

Study Population & Sample Selection
14

Data Collection Methods
15

Data Collection Procedures
16

Data Analysis & Procedures
16

Validity & Reliability
17

Ethical Consideration
18

Limitations
1 8

Summary
19

Chapter 1: Introduction

Background

Cloud services have gained a lot of popularity in the current technological era. With the rapid increase in digital adoption, even small and medium organizations are looking to improve their organizational efficiency and increase their revenue through cloud-based services. Rather than a physical on-site server, cloud services are services that are made available via a remote cloud computing system (Zhe et al., 2017). In today’s business environment cloud service providers can be seen as third-party suppliers who help organizations run critical services through their remote cloud servers. This makes cloud services less costly to operate and maintain in the longer run, and it is also one of the main reasons that organizations are moving towards cloud-based organizational frameworks. Cloud services also provide several other benefits to both the organizations and the consumers. Therefore, it has gained wide recognition among organizations as a desirable addition to the current IT infrastructure (Zhe et al., 2017). Comment by Author: Nice!

It is important to understand that cloud services also have several disadvantages, and these disadvantages limit the widespread use of cloud services and the growth of cloud services within organizations. One of the major problems with cloud services is that it is not secure. As mentioned earlier, cloud services are not run from a cloud computing server that is not on-site. Therefore, there are several data security risks associated with cloud services. A typical cloud provider does not hold the necessary access keys (Zhe et al., 2017). If an organization does not have a strong user identity, an attacker would be able to compromise the entire organization. Moreover, there is a very high risk that employees and non-technical workers may be left behind when a cloud service is shut down. Therefore, if a cloud service is being disrupted during time of business, security is compromised for many organizations (Zhe et al., 2017). Comment by Author: It is or is not on site? You mentioned that it is not run from a cloud computing server, then said that it is not on-site…I am confused.

With the increasing demand for digitization, we can clearly see that cloud services will play a major part in society. Therefore, it is critical to ensure that the data security risks associated with cloud services need to be addressed and mitigated efficiently. We can see several cloud service providers work towards improving their security practices through user audits and peer reviews as well as by addressing data breach mitigation techniques and strategies (Shaikh & Modak, 2017). However, most of them could be considered as stop-gap measures and not permanent solutions. Since technology is constantly evolving, the nature of threats for the field is also constantly changing. Therefore, it is important to completely understand the security risks and look for ways to enable a sustainable data security solution for cloud services (Shaikh & Modak, 2017). Comment by Author: cite

Problem Statement and Significance

The COVID-19 pandemic in 2019 has accelerated the digital transformation of organizations in several sectors. This rapid increase in digitization and the popularity of the cloud computing systems have led to a situation where most organizations are looking at creating a cloud-based operational framework. This combination makes the organizations more susceptible to data security risks (Kumar et al., 2018). The responsibility of mitigating these risks and keeping the organizations safe falls on the hands of the third-party cloud suppliers. Therefore, these data security risks do not just impact the end organizations but also the third-party cloud suppliers. With the increase in the number of cloud service users, they will find it hard to manage cloud systems and mitigate risks immediately. It is also important to note that the data security risks that threaten cloud services are of a varied nature. This creates a major problem for cloud service providers (Kumar et al., 2018). Comment by Author: good way to make it relevant

An evaluation of current and future threats against cloud services is not only a challenge for cloud providers but for companies within the industry as well. This dissertation will look to explore the current data security risks and analyze the security systems that third-party cloud suppliers have in place to comprehensively understand the current cloud service environment. This will help create sustainable solutions to combat the data security risks and issues (Kumar et al., 2018). With this understanding, cloud service providers will be able to reduce the financial risks and help with data security issues, protect their customers and help solve the data security issues of their cloud-based data services. Another important goal of the dissertation is to gain knowledge about the new data security threats that are emerging in the cloud service sector. This will be a significant problem in the coming years as the cloud services industry continues to evolve with the increased complexity of the data management business model. Therefore, the dissertation will be focused on understanding and evaluating both the current and emerging threats that threaten the data security of cloud services (Kumar et al., 2018). To ensure that the dissertation is focused, the same will be centred upon answering three important research questions that are mentioned below. Comment by Author: proposal Comment by Author: do you have evidence of this? Comment by Author: proposal

R1: What are the current data security issues and risks that threaten cloud service providers? Comment by Author: good…but be more specific…in which context?

R2: What are the predicted future trends for the data security issues?

R3: How can current cloud data security be made more efficient to facilitate tighter data security? Comment by Author: Again, in which context?

Theoretical Framework

The term cloud services refer to services that are provided through remote cloud servers that are set up by third-party service providers. Cloud services have started to gain prominence because of their ability to increase organizational efficiency at minimal costs. Many cloud services are designed around remote storage, which reduces infrastructure and administration costs (Udendhran, 2017). The cloud market provides a number of potential cloud services including file sharing and data management/analysis. These cloud services are highly beneficial for organizations from all sectors because they can scale without the burden of huge costs. Cloud services also enables organizations to study, manage and analyze large sets of data without having their own servers or data centers. Data centers are expensive as they have higher operational and service costs when compared to cloud computing systems (Udendhran, 2017).

With the help of cloud services, organizations can manage complex business operations including business logic, risk management, data recovery, and transaction management. We can also clearly see that there are new technological advancements and innovations that are helping the cloud computing field grow at a rapid pace (Udendhran, 2017). While this is beneficial for organizations, this rapid growth also increases data security risks. Data security is an important part of both enterprise and corporate security. Data security at an organizational level can be mitigated and eliminated with the help of strong encryption technologies or secure protocols. However, these systems have little effect when it comes to cloud data security as the threats are highly varied in nature (Udendhran, 2017).

Cloud data security has been a cause for concern for many years and there have been several developments in this regard. Cloud service providers have created various measures to ensure the security of the data. Data protection systems are also deployed and maintained within the cloud and the organizational end by a number of technologies (Udendhran, 2017). For instance, companies have made it mandatory for IT staff to download and use encryption software before passing on key data to users. It is also important to understand what role machine learning can play in corporate cloud storage platforms. Since the data security threats are constantly evolving, many cloud service providers have incorporated AI-based systems like machine learning to help manage the security risks through threat analysis. These strategies have helped cloud service systems operate efficiently and mitigate data security threats to a level. This is further evidenced by several research papers on the topic (Udendhran, 2017).

However, many literary papers that have explored the concept have shown that the service providers are reacting to the threats rather than proactively creating security systems. While this has worked till now, the reactive data security systems might not be able to keep data secure in the current business environment where most of the companies have started to use digital and cloud-based systems (Giri & Shakya, 2019). With the increase in the number of customers, cloud service providers might find it difficult to manage their data privacy policies and security measures efficiently. Therefore, it is important to thoroughly analyze the current data security threats to create standardized systems that can provide sustainable security results. It is also important to use the analysis to predict future data security threats that might increase the cost and complexity of data protection and monitoring solutions (Giri & Shakya, 2019).

This dissertation will analyze the cloud data security threats to know what data security threats are growing the most and propose solutions for the service providers to help them address these threats and protect the data better. The dissertation will also show how cloud service providers could develop the needed technologies to deal with the security issues that they might face in the future (Giri & Shakya, 2019). The research paper will also look to propose data security risk models that could help cloud service providers understand emerging threats in the cloud service sector. This will help them provide better protection against new data security threats and render faster resolutions to mitigate new data security threats. The dissertation will primarily collect data from literary papers on data security risks/threats and cloud-based systems (Giri & Shakya, 2019). Comment by Author: proposal Comment by Author: proposal Comment by Author: proposal

The dissertation will look to collect data from academic libraries to better understand the cloud data security framework. The dissertation will use document analysis on the literary reviews to gain new insights into the cloud data security framework. The data collected through the document analysis will be further explored through thematic analysis. This thematic analysis will be focused on three main categories: the current data security threats, the current security framework & the future data security threats. Future threats are predicted using evidences present in the literary papers. In addition to exploring the current cloud data security frameworks, the thematic analysis will help predict new threats and the same can be used as a guideline for creating new data security systems. The researchers will also use textual analysis to help determine where new and emerging threats could come from, and the best security strategy for dealing with these issues/risks (Akhil et al., 2017). Comment by Author: proposal Comment by Author: proposal

The focus here is to help improve the current data security systems present in the cloud service sector. This thematic analysis will also help researchers and professionals in the field of cloud data security. To ensure that the research is up to date, this thematic analysis will look at the most recent literary works in the field of data protection (Akhil et al., 2017). It will then focus on predicting and analyzing which elements of these works hold up the current cloud data security framework. This will include, for example, the current security frameworks and the current data protection solutions within that framework. The latter two features will help us to understand how the current cloud data security framework is failing as compared to the current threats (Akhil et al., 2017). Comment by Author: nice Comment by Author: so this isn’t really a theoretical framework section as you haven’t told me the specific lens in which you plan to look at this work. If you say you’re going to look at the security frameworks, then that’s what you needed to discuss here.

Researcher’s Positionality

Cloud computing systems have become a major part of the society that we live in, and hence it is important to understand the benefits and challenges that are present in the same. While researching the topic of cloud computing and its related services, it was clear that data security has become a major concern for most of the service providers (Akhil et al., 2017). Even with the development of various technologies and systems to combat security risks and issues, there are still concerns regarding the security of the cloud data. This prompted the researcher to explore the topic in detail. The researcher was also fascinated by the fact that most of the organizations are moving to digital and cloud-based systems due to the pandemic. Therefore, the impact of a data security breach has become higher in the current society. Thus, the researcher felt that there needs to be an exploration on the future security risks and issues that could threaten cloud service providers (Akhil et al., 2017).

Purpose

The main goal of the dissertation is to explore the efficiency of the current cloud data security systems and understanding whether they will be able to handle issues that could arise in the future. Based on the analysis, the dissertation will also provide suggestions and alternatives to improve cloud data security (Kumar et al., 2018). Comment by Author: proposal

Research Question(s)

Cloud data security is not an isolated issue that will affect only select organizations. Since most of the organizations in the society is moving towards a digital-only operation, any data security risk will affect a wide range of companies. This is detrimental for the whole society. Therefore, there needs to be extensive research on the data security systems of service providers rendering cloud computing services (Kumar et al., 2018). In this dissertation, the main focus is understanding the current cloud data security scenario and improving the same with the help of extensive research into the field. To ensure that the dissertation is focused, the same will be centred upon answering three important research questions that are mentioned below.

R1: What are the current data security issues and risks that threaten cloud service providers? Comment by Author: look back at the suggestions I made

R2: What are the predicted future trends for the data security issues?

R3: How can current cloud data security be made more efficient to facilitate tighter data security?

Significance

As mentioned earlier, a data hack in cloud services would cause major disruptions in the current society. Data needs to be secured efficiently to ensure that organizations can operate efficiently because of the rapid increase of digitization where most of the companies are moving towards a cloud-based infrastructure. With the increasing data flow, the security and privacy are of utmost importance. It is considered important to ensure the security of data and the privacy of users from any attack (Zhe et al., 2017). Therefore, it is important to create a data security system that is capable of handling both current and future data security issues. This dissertation aims to render significant contribution to the field by analyzing the data security issues to find emerging data hacking and security related trends. The research into the domain is significant to improve the data security frameworks of cloud service providers and enhance them to mitigate future risks in the domain efficiently (Zhe et al., 2017).

Definition of Terms Comment by Author: maybe i-cloud itself needs to be defined?

i. Machine Learning – Machine Learning is a type of Artificial Intelligence that uses systems to learn from data, identify patterns and learn to make decisions with limited human intervention (Zhe et al., 2017).

ii. Cloud Computing – Cloud computing is a type of computer system resource that uses on-demand data storage and computing power (Zhe et al., 2017).


Summary

Cloud computing system have started to gain extensive recognition because of the various benefits that it provides organizations from several sectors. Cloud services have become a critical tool for organizational growth and have helped several organizations improve their digital frameworks significantly. However, there are still several issues that hinder the implementation and development of cloud services. One of the main issues that cloud service providers face is data security. Data security is a major concern for cloud service providers and organizations using cloud-based frameworks because the cloud data is located in third-party servers. Even though several cloud service providers are using security systems to enhance data security, the efficiency of the current systems in stopping any future security issues and risks is debatable. This dissertation aims to explore the current data security threats faced by cloud service providers, and analyze the efficiency of the current data security systems. The dissertation will also predict future data security trends with the help of literary sources and propose changes that can be made to the current digital security frameworks based on the same. Comment by Author: proposal Comment by Author: proposal


Chapter 3: Methodology

Introduction

In this methodology section, the researcher will provide an overview of the research methodology and framework used in the dissertation. The dissertation is focused on understanding the data security standards of current cloud networks and check their ability to handle the ever-evolving threats faced by cloud service providers. The dissertation will also render alternative suggestions for deficiencies in the current cloud security strategies (Kritikos et al., 2017). To study the efficiency of cloud data security, the dissertation will identify peer-reviewed literary sources for thematic document analysis. In addition to the research methodology, the section will also explore the data collection methodologies and the validity and ethical consideration for the research. Comment by Author: proposal Comment by Author: proposal Comment by Author: proposal Comment by Author: nice

Statement of the Problem

This dissertation will focus on exploring both the current data security risks and the future data risks/issues that threaten the current cloud security frameworks. The main goal is to provide a comprehensive understanding of the current cloud service environment and create sustainable solutions to combat data security risks that threaten the field and help reduce the financial and operational risks of companies in the field. The research focus will also include the exploration of future cloud data security frameworks to keep up with the increased complexity of the data management business model. Comment by Author: proposal

Research Question(s)

The cloud data security dissertation will focus on answering four core research questions that pertain to the field. They are

R1: What are the current data security issues and risks that threaten cloud service providers?

R2: What are the predicted future trends for the data security issues?

How can current cloud data security be made more efficient to facilitate tighter data security?

Research Methodology

The dissertation uses qualitative research methodology, especially qualitative thematic analysis, toanalysis, to dissect the cloud data security environment and analyze the risks surrounding the same. The thematic analysis is a research methodology that is focused on analyzing qualitative data that is collated from a set of texts, especially literary documents and interview transcripts (Kritikos et al., 2017). The thematic analysis will be conducted on a set of peer-reviewed literary sources that are focused on the title. The methodology involves the identification and analysis of informative sections from the selected sources. With the aid of thematic analysis, researchers are able to identify common topics, ideologies, and patterns that highlight the data security efficiency of current cloud computing and service systems. Thematic analysis also helps researchers identify the major data/information security risks that will affect the cloud environment. The research study will use thematic analysis as a method to identify the current data security issues and learn the efficacy of current cloud data security systems. The focus of the thematic analysis is identifying and analyzing textual samples based on three major themes, namely current data security threats; cloud security frameworks; and future threats and capabilities. Through this methodology, this research study will be able to provide fact-based inferences that can lead to better results. (Kritikos et al., 2017). Comment by Author: proposal Comment by Author: ok that’s the approach…but what is the research design? Case study? Phenomenology? Narrative inquiry? Comment by Author: Are you saying that this study is basically a secondary data analysis?

Research Design

The approach to cloud data security research will be focused on thematic analysis of literary documents. The core research framework will be a thematic analysis of peer-reviewed literary sources sourced from authentic public websites. Through identification and synthesis of these sources, it will be easier to identify a significant subset of the topics and ideologies that have impacted the cloud computing security landscape and how these themes will impact cloud security systems (Vaismoradi & Snelgrove, 2019). These core topics will then be analyzed in relation to data security requirements, how they relate to the cloud and service infrastructure, and which data security tools will be helpful. To select the most relevant literary sources, various research instrumentation such as social networking applications, website crawling tools, document-tracking tools, and mobile data analysis tools will be used. The analysis of the literary sources will help analyze this relevant information and identify specific security trends. The design of the research methodology will include multiple steps, and each step requires careful selection and validation of the data sources that will be utilized for the document analysis (Vaismoradi & Snelgrove, 2019). Comment by Author: This is your analysis of the data…it is not your research design, however. It does look like you are doing either secondary data analysis or documentary analysis, however

Study Population & Sample Selection

This dissertation will analyze the dissertation will analyze the efficacy of data security measures in the current cloud computing environment. Therefore, the dissertation concerns all the sectors that are dependent on cloud computing and cloud service systems. The dissertation mainly concerns cloud service providers, who are the most vulnerable to cyber security concerns in the current cloud computing environment (Vaismoradi & Snelgrove, 2019). In addition, this study will be beneficial: Comment by Author: proposal Comment by Author: How? Through the analysis of text only? If so, why? Why not interview or survey people? Comment by Author: proposal Comment by Author: how and why?

1) Business and Government organizations

2) Data Scientists, Data Analysts, Data Entry Managers, IT Directors, Engineers, System Scroving Managers, CXOs and Designers (the “Public”)

3) Enterprise Service Providers, Contractors and Other IT (Technical) Support Service Providers

4) IT Contractors

5) Big Data Analytics/Analytics Tools / Analysis Services

6) Data Storage Service Providers

7) Data Mining Service Providers

8) Digital Content Management Systems

The research methodology and sample selection will be developed from all aspects of research, and they will be executed with utmost sincerity. All the research material (including original source files) was acquired through research institutes and/or commercial libraries. The literary documents for the study will be acquired from relevant and reliable sources. Purposive sampling, a sampling method where researchers can select sources based on their judgement, will be used for selecting literary documents. With purposive sampling, documents with the most relevant subject matter, information sources and/or platforms will be sought. In addition, various categories of sources will be included. The document selection will be then performed over a three-week period, during which several samples were collected from various sites. Comment by Author: What does this mean? Comment by Author: The study has not occurred yet…..

Data Collection Methods

The dissertation primarily uses purposive document selection for selecting the relevant literary sources. The sequential document selection will be used in connection with purposive sampling to determine which topics will be the most relevant to the research question at hand. Comment by Author: proposal Comment by Author: nice! Why does it use that?

R1: What are the current data security issues and risks that threaten cloud service providers?

R2: What are the predicted future trends for the data security issues?

How can current cloud data security be made more efficient to facilitate tighter data security?

For this purpose, the subjects are identified through the information available in the most recent academic publications from the same subjects in the field of cloud data security. The selection of relevant documents and the study’s goals, strategies, and results will be performed by means of the data extraction, indexing and/or comparison processes (Bunkar & Rai, 2017). These processes will be conducted by the researcher physically. Comment by Author: Who are the subjects and how are they selected? I thought your data was going to be the texts only?

Data extraction – The selected documents will be analyzed for data related to the themes of cloud data security and data security issues.

Data Indexing – The relevant data will be grouped into themes.

Data Comparison – The data will be analyzed for identifying the most prominent issue, the current data security framework and the avenues for improvement. With the aid of purposive sampling methodology, literary sources with specific characteristics including topic relevance, data security exploration …



Insight Consulting, LLC

October Deliverable:

Summary of Student Revisions and Recommendations

Version 1.0

October 29, 2021

Presented by:

Dr. Brittny James

October Deliverable

Summary of Student Revisions and Recommendations

General Comments:

Of the five student papers reviewed, all clearly need more detailed revisions, including returning to the literature and properly citing claims made throughout the document, more thought into conceptualizing their ideas, developing attainable research questions for a dissertation study, and developing a detailed methodology section with clear steps for how the dissertation will be completed (i.e., data collection, sample description where applicable, data analysis tools). The table below will detail the summation of comments from Dr. Gyimah-Concepcion with the explanation of such needs to the program of study, and recommendations for how to address each revision need should you choose to continue with the written dissertation as the measure of success for students to graduate. Comments below were consistent for all students. Given these recommendations would require intensive time and human capacity, additional conversation can ensure on how to move forward without impacting the graduation of these students and ensuring a meaningful matriculation through the Doctor of Education in Computer Science program with a practice-based format instead of the traditional written dissertation.

Table 1. Explanation of revisions needed for the DSC program student submissions of Chapters 1-3

Revisions Needed

Explanation

Recommendations

1. Conceptualization of study design needed

There is a general lack of clarity about the concept of the study, meaning no students were able to articulate a clear purpose and rationale for their proposed studies, nor is it evident the type of study that is proposed (e.g., phenomenology, case study, observation, etc.). Once research methods are clarified, then there can be a clear explanation of data collection procedures and measures, as appropriate. This is also either unclear or not described in the documents.

This would take detailed discussions with students to understand their goals for each study and assistance articulating these studies’ purposes. Essentially, either the students’ committee members or an outside research assistant should be employed to carry out this task. It is evident that the students do not understand the research process; therefore, a project-based format is recommended such that they can still employ their obvious technical expertise to a predetermined problem.

2. Missing citations

APA 7 needs to be employed for in-text citations. This will take time and resources for students to return to the literature, find the claims made, and correctly cite them. It is not clear based on these submissions whether students are committing plagiarism purposely or if there is a lack of understanding about how and when to appropriately cite information. Citations are inconsistent between and within students’ documents. This comment is also applicable to the document formatting in general, and references.

If students can relocate studies or links to information in these documents, the recommendation is to hire an APA 7 expert to edit these documents; however, this would cost approximately 60 hours of work, and students would then be disconnected from the process. To fully engage students, a guided writing process would be best, but if this is not an intention for future cohorts, this recommendation is a waste of time and resources.

3. Proposal language not used (should be in future tense)

Language in these documents is written as if the studies have already been either approved or completed. Given these are proposals, proper tense should be future (will or would). Current language might mean that language has been improperly obtained from another study or document (refer to revision #2).

Revise documents to reflect future tense and ensure that the proposal is original.

4. Content organization and clarity needed

Content is arbitrarily placed and often the wrong chapters/sections. This is also a function of the students’ lack of understanding of APA 7 format (refer to revision #2).

Given previous recommendations, once a clear understanding of the proposals is developed, these sections can be created in APA format, with templates/guidance for what should be included in each section (see recommendations #1 and #2).

5. Unclear/inconsistent definitions of terms

Definitions of terms are included in Chapter 1, but throughout the documents, either different terms are used or other definitions are applied.

Revision of documents to include consistent language throughout.

6. Lack of explanation of appropriate theoretical frameworks

It is unclear if theoretical frameworks were advised to be part of these proposals, as explanations of theory are largely absent from these documents.

If theory is not a requirement, it should be reconsidered and included. This very necessary revision might require a refresher course on the available popular theories used in computer science literature.

7. Lacking understanding of ethical considerations

These sections are either missing or incorrectly written.

Given the lack of clarity about research and data collection, additional problems will likely arise during the data collection and analysis phases that could create ethical dilemmas for the program. To avoid, students could be tasked with revising the current documents to fit a literature review format to identify gaps in the available literature. Upon identification of research and practical needs, students

1

12

Data Security in Cloud Services

Submitted by

Sameerkumar Prajapat

A Dissertation Presented in Partial Fulfillment

of the Requirements for the Degree

Doctor of Education/Philosophy in Leadership

with a specialization in _____________

Judson University

Elgin, Illinois

Date (of the committee or Dean’s signature)

Abstract

The main goal of this research paper is exploring the current state of data security system in the cloud service industry. The dissertation will also analyze the ability of the current systems to combat the ever-evolving threats in the industry. To understand the same, the dissertation will collect data from literary sources that focus on cloud security systems. The main research methodology for the dissertation will be a thematic analysis. The dissertation will analyze the data collected through a comprehensive thematic analysis that will group the data into three main categories: the current data security threats, the current security framework & the future data security threats. This knowledge will be used to understand the current state of data security, the future threats that are expected and the avenues of evolution that are necessary to combat the same. The research team will use purposive sampling to ensure that the research is conducted on relevant literary sources. The data sourcing, extraction and indexing processes will be handled in a professional manner to eliminate bias and preferences. The dissertation wishes to arrive at a valid and reliable result that provides a complete overview of the current cloud data security domain. In addition to the thematic analysis, the research study also provides a brief overview of the current literature about the topic through an insightful literature review. The research study also provides a brief overview of the limitations and ethical considerations that might affect the dissertation process.

Table of Contents

Chapter 1: Introduction
3

Background
3

Problem Statement and Significance
4

Theoretical Framework 5

Researcher’s Positionality
8

Purpose
9

Research Question(s)
9

Significance
10

Definition of Terms
10

Summary

11

Chapter 3: Introduction
11

Statement of the Problem
12

Research Question(s)
12

Research Methodology
13

Research Design
13

Study Population & Sample Selection
14

Data Collection Methods
15

Data Collection Procedures
16

Data Analysis & Procedures
16

Validity & Reliability
17

Ethical Consideration
18

Limitations
1 8

Summary
19

Chapter 1: Introduction

Background

Cloud services have gained a lot of popularity in the current technological era. With the rapid increase in digital adoption, even small and medium organizations are looking to improve their organizational efficiency and increase their revenue through cloud-based services. Rather than a physical on-site server, cloud services are services that are made available via a remote cloud computing system (Zhe et al., 2017). In today’s business environment cloud service providers can be seen as third-party suppliers who help organizations run critical services through their remote cloud servers. This makes cloud services less costly to operate and maintain in the longer run, and it is also one of the main reasons that organizations are moving towards cloud-based organizational frameworks. Cloud services also provide several other benefits to both the organizations and the consumers. Therefore, it has gained wide recognition among organizations as a desirable addition to the current IT infrastructure (Zhe et al., 2017).

It is important to understand that cloud services also have several disadvantages, and these disadvantages limit the widespread use of cloud services and the growth of cloud services within organizations. One of the major problems with cloud services is that it is not secure. As mentioned earlier, cloud services are not run from a cloud computing server that is not on-site. Therefore, there are several data security risks associated with cloud services. A typical cloud provider does not hold the necessary access keys (Zhe et al., 2017). If an organization does not have a strong user identity, an attacker would be able to compromise the entire organization. Moreover, there is a very high risk that employees and non-technical workers may be left behind when a cloud service is shut down. Therefore, if a cloud service is being disrupted during time of business, security is compromised for many organizations (Zhe et al., 2017).

With the increasing demand for digitization, we can clearly see that cloud services will play a major part in society. Therefore, it is critical to ensure that the data security risks associated with cloud services need to be addressed and mitigated efficiently. We can see several cloud service providers work towards improving their security practices through user audits and peer reviews as well as by addressing data breach mitigation techniques and strategies (Shaikh & Modak, 2017). However, most of them could be considered as stop-gap measures and not permanent solutions. Since technology is constantly evolving, the nature of threats for the field is also constantly changing. Therefore, it is important to completely understand the security risks and look for ways to enable a sustainable data security solution for cloud services (Shaikh & Modak, 2017).

Problem Statement and Significance

The COVID-19 pandemic in 2019 has accelerated the digital transformation of organizations in several sectors. This rapid increase in digitization and the popularity of the cloud computing systems have led to a situation where most organizations are looking at creating a cloud-based operational framework. This combination makes the organizations more susceptible to data security risks (Kumar et al., 2018). The responsibility of mitigating these risks and keeping the organizations safe falls on the hands of the third-party cloud suppliers. Therefore, these data security risks do not just impact the end organizations but also the third-party cloud suppliers. With the increase in the number of cloud service users, they will find it hard to manage cloud systems and mitigate risks immediately. It is also important to note that the data security risks that threaten cloud services are of a varied nature. This creates a major problem for cloud service providers (Kumar et al., 2018).

An evaluation of current and future threats against cloud services is not only a challenge for cloud providers but for companies within the industry as well. This dissertation will look to explore the current data security risks and analyze the security systems that third-party cloud suppliers have in place to comprehensively understand the current cloud service environment. This will help create sustainable solutions to combat the data security risks and issues (Kumar et al., 2018). With this understanding, cloud service providers will be able to reduce the financial risks and help with data security issues, protect their customers and help solve the data security issues of their cloud-based data services. Another important goal of the dissertation is to gain knowledge about the new data security threats that are emerging in the cloud service sector. This will be a significant problem in the coming years as the cloud services industry continues to evolve with the increased complexity of the data management business model. Therefore, the dissertation will be focused on understanding and evaluating both the current and emerging threats that threaten the data security of cloud services (Kumar et al., 2018). To ensure that the dissertation is focused, the same will be centred upon answering three important research questions that are mentioned below.

R1: What are the current data security issues and risks that threaten cloud service providers?

R2: What are the predicted future trends for the data security issues?

R3: How can current cloud data security be made more efficient to facilitate tighter data security?

Theoretical Framework

The term cloud services refer to services that are provided through remote cloud servers that are set up by third-party service providers. Cloud services have started to gain prominence because of their ability to increase organizational efficiency at minimal costs. Many cloud services are designed around remote storage, which reduces infrastructure and administration costs (Udendhran, 2017). The cloud market provides a number of potential cloud services including file sharing and data management/analysis. These cloud services are highly beneficial for organizations from all sectors because they can scale without the burden of huge costs. Cloud services also enables organizations to study, manage and analyze large sets of data without having their own servers or data centers. Data centers are expensive as they have higher operational and service costs when compared to cloud computing systems (Udendhran, 2017).

With the help of cloud services, organizations can manage complex business operations including business logic, risk management, data recovery, and transaction management. We can also clearly see that there are new technological advancements and innovations that are helping the cloud computing field grow at a rapid pace (Udendhran, 2017). While this is beneficial for organizations, this rapid growth also increases data security risks. Data security is an important part of both enterprise and corporate security. Data security at an organizational level can be mitigated and eliminated with the help of strong encryption technologies or secure protocols. However, these systems have little effect when it comes to cloud data security as the threats are highly varied in nature (Udendhran, 2017).

Cloud data security has been a cause for concern for many years and there have been several developments in this regard. Cloud service providers have created various measures to ensure the security of the data. Data protection systems are also deployed and maintained within the cloud and the organizational end by a number of technologies (Udendhran, 2017). For instance, companies have made it mandatory for IT staff to download and use encryption software before passing on key data to users. It is also important to understand what role machine learning can play in corporate cloud storage platforms. Since the data security threats are constantly evolving, many cloud service providers have incorporated AI-based systems like machine learning to help manage the security risks through threat analysis. These strategies have helped cloud service systems operate efficiently and mitigate data security threats to a level. This is further evidenced by several research papers on the topic (Udendhran, 2017).

However, many literary papers that have explored the concept have shown that the service providers are reacting to the threats rather than proactively creating security systems. While this has worked till now, the reactive data security systems might not be able to keep data secure in the current business environment where most of the companies have started to use digital and cloud-based systems (Giri & Shakya, 2019). With the increase in the number of customers, cloud service providers might find it difficult to manage their data privacy policies and security measures efficiently. Therefore, it is important to thoroughly analyze the current data security threats to create standardized systems that can provide sustainable security results. It is also important to use the analysis to predict future data security threats that might increase the cost and complexity of data protection and monitoring solutions (Giri & Shakya, 2019).

This dissertation will analyze the cloud data security threats to know what data security threats are growing the most and propose solutions for the service providers to help them address these threats and protect the data better. The dissertation will also show how cloud service providers could develop the needed technologies to deal with the security issues that they might face in the future (Giri & Shakya, 2019). The research paper will also look to propose data security risk models that could help cloud service providers understand emerging threats in the cloud service sector. This will help them provide better protection against new data security threats and render faster resolutions to mitigate new data security threats. The dissertation will primarily collect data from literary papers on data security risks/threats and cloud-based systems (Giri & Shakya, 2019).

The dissertation will look to collect data from academic libraries to better understand the cloud data security framework. The dissertation will use document analysis on the literary reviews to gain new insights into the cloud data security framework. The data collected through the document analysis will be further explored through thematic analysis. This thematic analysis will be focused on three main categories: the current data security threats, the current security framework & the future data security threats. Future threats are predicted using evidences present in the literary papers. In addition to exploring the current cloud data security frameworks, the thematic analysis will help predict new threats and the same can be used as a guideline for creating new data security systems. The researchers will also use textual analysis to help determine where new and emerging threats could come from, and the best security strategy for dealing with these issues/risks (Akhil et al., 2017).

The focus here is to help improve the current data security systems present in the cloud service sector. This thematic analysis will also help researchers and professionals in the field of cloud data security. To ensure that the research is up to date, this thematic analysis will look at the most recent literary works in the field of data protection (Akhil et al., 2017). It will then focus on predicting and analyzing which elements of these works hold up the current cloud data security framework. This will include, for example, the current security frameworks and the current data protection solutions within that framework. The latter two features will help us to understand how the current cloud data security framework is failing as compared to the current threats (Akhil et al., 2017).

Researcher’s Positionality

Cloud computing systems have become a major part of the society that we live in, and hence it is important to understand the benefits and challenges that are present in the same. While researching the topic of cloud computing and its related services, it was clear that data security has become a major concern for most of the service providers (Akhil et al., 2017). Even with the development of various technologies and systems to combat security risks and issues, there are still concerns regarding the security of the cloud data. This prompted the researcher to explore the topic in detail. The researcher was also fascinated by the fact that most of the organizations are moving to digital and cloud-based systems due to the pandemic. Therefore, the impact of a data security breach has become higher in the current society. Thus, the researcher felt that there needs to be an exploration on the future security risks and issues that could threaten cloud service providers (Akhil et al., 2017).

Purpose

The main goal of the dissertation is to explore the efficiency of the current cloud data security systems and understanding whether they will be able to handle issues that could arise in the future. Based on the analysis, the dissertation will also provide suggestions and alternatives to improve cloud data security (Kumar et al., 2018).

Research Question(s)

Cloud data security is not an isolated issue that will affect only select organizations. Since most of the organizations in the society is moving towards a digital-only operation, any data security risk will affect a wide range of companies. This is detrimental for the whole society. Therefore, there needs to be extensive research on the data security systems of service providers rendering cloud computing services (Kumar et al., 2018). In this dissertation, the main focus is understanding the current cloud data security scenario and improving the same with the help of extensive research into the field. To ensure that the dissertation is focused, the same will be centred upon answering three important research questions that are mentioned below.

R1: What are the current data security issues and risks that threaten cloud service providers?

R2: What are the predicted future trends for the data security issues?

R3: How can current cloud data security be made more efficient to facilitate tighter data security?

Significance

As mentioned earlier, a data hack in cloud services would cause major disruptions in the current society. Data needs to be secured efficiently to ensure that organizations can operate efficiently because of the rapid increase of digitization where most of the companies are moving towards a cloud-based infrastructure. With the increasing data flow, the security and privacy are of utmost importance. It is considered important to ensure the security of data and the privacy of users from any attack (Zhe et al., 2017). Therefore, it is important to create a data security system that is capable of handling both current and future data security issues. This dissertation aims to render significant contribution to the field by analyzing the data security issues to find emerging data hacking and security related trends. The research into the domain is significant to improve the data security frameworks of cloud service providers and enhance them to mitigate future risks in the domain efficiently (Zhe et al., 2017).

Definition of Terms

i. Machine Learning – Machine Learning is a type of Artificial Intelligence that uses systems to learn from data, identify patterns and learn to make decisions with limited human intervention (Zhe et al., 2017).

ii. Cloud Computing – Cloud computing is a type of computer system resource that uses on-demand data storage and computing power (Zhe et al., 2017).


Summary

Cloud computing system have started to gain extensive recognition because of the various benefits that it provides organizations from several sectors. Cloud services have become a critical tool for organizational growth and have helped several organizations improve their digital frameworks significantly. However, there are still several issues that hinder the implementation and development of cloud services. One of the main issues that cloud service providers face is data security. Data security is a major concern for cloud service providers and organizations using cloud-based frameworks because the cloud data is located in third-party servers. Even though several cloud service providers are using security systems to enhance data security, the efficiency of the current systems in stopping any future security issues and risks is debatable. This dissertation aims to explore the current data security threats faced by cloud service providers, and analyze the efficiency of the current data security systems. The dissertation will also predict future data security trends with the help of literary sources and propose changes that can be made to the current digital security frameworks based on the same.

Chapter 2: Literature Review

This literature review chapter will focus on identifying the current data security procedures in the cloud services field. The data security threats and issues surrounding the cloud services field is evolving in nature and hence, there is a need for identifying the efficacy of current cloud data security systems and any need for evolution (Kaushik & Gandhi, 2019). Through this literature review, the study will look into literature that surrounds the technical aspects of the cloud data security systems, their data security threats, vulnerabilities and challenges, and the implications and lessons learnt from these findings for the field of data security.

This section will take into account the key terms cloud, data security, data privacy, cybersecurity and confidentiality, vulnerability, data breach, integrity and availability. The objectives of this review are to identify the current technical issues and challenges surrounding the field of data security in cloud services and to review the available literature on cloud services security (Namasudra, 2019). As the technical literature cannot cover all the challenges surrounding data security in the cloud service, we consider this to be a significant limitation of this review.

Since cloud services is a field that is constantly evolving in nature, the need for security in this field is also evolving. One would expect that in any emerging field that is constantly evolving, a significant body of literature is available on these matters. This is however not the case with cloud services. The technical challenges in the field of data security are increasing, and this causes the need for security methods that are constantly evolving. The challenge in identifying a critical review of this field is that the field is evolving in nature and the available literature is relatively small (Arora et al., 2018). This therefore necessitates a more targeted approach to this literature review, and the objective is to identify the major issues within the cloud services field. It is therefore expected that, with time, the field of data security within the cloud services will increase, and therefore a more global approach is taken to this review to identify the major issues in the field.

Theoretical Foundation

It is important to ensure that the literature review helps identify the general beliefs and assumptions in the field of cloud data security, and also help form a theoretical foundation for the proposed study. The literature review will focus on understanding concepts like the cloud data security efficiency, the rate of evolution of data security threats/issues, and the impact of cloud data security on various industries. The literature review will also identify factors that determine the efficacy of data security within the cloud (Surbiryala & Rong, 2017). In addition, some of the basic assumptions that surround cloud data security like data mobility and data storage will be studied, and this will help ensure that the review is not limited in its scope and serves the purpose of answering the research question appropriately.

One of the most important assumptions in the field of cloud data security is that cloud data security models should be transparent. It is important to ensure that a clear understanding of the concept of cloud data security is present, and this is a very important factor in ensuring that the research question in this field is adequately answered. Another key factor that will determine the validity of the review is that the review must take a cross-section of literature. It is important to ensure that the review does not focus on a single research study but takes a more general perspective (Ransome, 2017). In this context, the review of the research literature will form a foundation of the proposed research and will be an important component of the study. In addition, it is also very important that the literature review does not get influenced by a biased selection or evaluation criteria, and this is a major issue in the area of data security in the cloud.

The literature review will also identify common theories and studies that attempt to provide a solution to the problems surrounding cloud data security, and this will provide context for the research question. These theories and studies will provide a better understanding of the current state of the art of the field and will also lead to the development of more comprehensive approaches that can be used to solve data security challenges (Arora et al., 2018). The analysis of the theories and studies that are identified will provide critical insights that will help to form a more refined research question, and these insights will also form a basis for the future research directions. It is also important to consider the research methodologies that have been used in the development of the theory and the identification of important concepts in the field.

Review of Literature

Cloud services is a field that has gained significant popularity in the current era because of the wide deployment of cloud services and the convenience that it provides. The major concern with cloud services is the loss of data. Data loss may take place through hacking, device failure, or malicious activities. Data loss can lead to significant economic losses as well as to privacy loss and personal security. This threat can potentially be much more severe in the context of the cloud because of the ease with which data can be lost. Data security is one of the major problems with the deployment of cloud services (Ransome, 2017). Various studies have attempted to address this challenge, and we aim to provide a comprehensive review of the literature that has been conducted in this context.

Data Security

The majority of literature that study the current cloud data security environment have focused on the issue of data loss and the different solutions that are being deployed in this context. Numerous factors, which include security threats, service providers, and the nature of the cloud platform that is being used, influence the development of data security strategies. Experts in the field state that the nature of the issues and threats that are prevalent in the cloud data security environment will affect the future development of this domain (Arora et al., 2018). Therefore, there is a need to understand the current state of affairs and identify the most appropriate ways to cope with data security threats. Some research work has focused on the deployment of a security framework for data in the cloud. The majority of existing literature is focused on the deployment of service security and system security solutions.

It is also important to note that current research studies have adopted an empirical approach to the study of the security of cloud services. These studies have adopted a variety of different perspectives and used various methods in order to study this domain. The majority of these studies have adopted a performance-based perspective, while a few have focused on the deployment of security solutions. Other approaches, which include developing a security classification system that utilizes a service oriented architecture, have also been adopted. A service based approach is the most common one that is adopted. There are also studies that adopt a hybrid approach in their research. Moreover, other researchers have adopted a qualitative approach to the study of this domain.

Through the analysis of various literary sources concerning the topic of cloud data security, it is clear that the current cloud security systems are threatened by various issues and risks including but not limited to malware, unauthorized access, and privacy issues (Kaushik & Gandhi, 2019). This can be attributed to the increasing demand for access to cloud services and services hosted on cloud data security systems. The threats to data security are mainly due to the ease of access to large amounts of data, which is available through various devices such as smart mobile devices, desktops, laptops, and other portable devices. In this section, we discuss some of the vulnerabilities, risks, and threats that occur due to the increasing adoption of cloud services. In particular, the current focus of this section is on cloud data security and its threats.

Growth of Cloud Services

In recent years, the use of the cloud to host various applications and services has been increasing, especially with the advent of cloud-based content management. The rapid growth of cloud services has led to the increasing adoption of the cloud-based model. The cloud-based services offer a wide variety of functionality and resources to customers in the form of utility and subscription-based services. These services provide customers with applications such as database storage, email and web hosting, and storage of various media files. Due to its convenience and ease of use, many cloud-based services are being used to store and host confidential and sensitive data and intellectual property that include databases, multimedia content, large media files, and other formats.

Many researchers and experts are speculating that cloud services is in its growth phase and is poised to become a major driver of the digital economy in the future. With the increase in the adoption of cloud-based services, it is very likely that there will be a huge increase in the security and privacy issues. With this growth in cloud-based services, many companies are also adopting cloud services (Kaushik & Gandhi, 2019). For example, a research study shows that about 50% of the most important businesses in Europe are currently using cloud services. Furthermore, cloud-based services are expected to increase by nearly $300 billion in the US by 2016. In 2015, Google and Facebook spent more than $30 billion to build out and run data centers and server clusters. A report states that by 2015, about 43% of web traffic is expected to come from web services on the cloud. As the number of companies that have moved their data to the cloud is on the rise, so is the need for security.

Security Evolution

The growth trend of cloud services is a clear indicator for the need for increased security in the field. Since the threats …

Data Security in Cloud Services

Submitted by

Sameerkumar Prajapat

A Dissertation Presented in Partial Fulfillment

of the Requirements for the Degree

Doctor of Education/Philosophy in Leadership

with a specialization in _____________

Judson University

Elgin, Illinois

Date (of the committee or Dean’s signature)


Chapter 2: Literature Review

This literature review chapter will focus on identifying the current data security procedures in the cloud services field. The data security threats and issues surrounding the cloud services field is evolving in nature and hence, there is a need for identifying the efficacy of current cloud data security systems and any need for evolution (Kaushik & Gandhi, 2019). Through this literature review, the study will look into literature that surrounds the technical aspects of the cloud data security systems, their data security threats, vulnerabilities and challenges, and the implications and lessons learnt from these findings for the field of data security. Comment by Author: This chapter focuses on reviwing the relevant literature that idenify the current dtata…. Comment by Author: delete Comment by Author: are continually Comment by Author: delete
Except if by ‘in nature’ you mean in trees and vegetation etc. Comment by Author: This chapter therefore focuses on literaure Comment by Author: After you fix this section, I will suggest making ti the first sentence for this section. Delete that 1st sentence and substitute with this as this one is a clearer articulation of what thius section is about.

This section will take into account the key terms cloud, data security, data privacy, cybersecurity and confidentiality, vulnerability, data breach, integrity, and availability. The objectives of this review are to identify the current technical issues and challenges surrounding the field of data security in cloud services and to review the available literature on cloud services security (Namasudra, 2019). As the technical literature cannot cover all the challenges surrounding data security in the cloud service, we consider this to be a significant limitation of this review. Comment by Author: The following key terms:

Since cloud services is a field that is constantly evolving in nature, the need for security in this field is also evolving. One would expect that in any emerging field that is constantly evolving, a significant body of literature is available on these matters. This is however not the case with cloud services. The technical challenges in the field of data security are increasing, and this causes the need for security methods that are constantly evolving. The challenge in identifying a critical review of this field is that the field is evolving in nature and the available literature is relatively small (Arora et al., 2018). This therefore, therefore, necessitates a more targeted approach to this literature review, and the objective is to identify the major issues within the cloud services field. It is therefore expected that, with time, the field of data security within the cloud services will increase, and therefore a more global approach is taken to this review to identify the major issues in the field. Comment by Author: Substitute another phrase for this for the reason stated earlier

Theoretical Foundation

It is important to ensure that the literature review helps identify the general beliefs and assumptions in the field of cloud data security, and also help form a theoretical foundation for the proposed study. The literature review will focus on understanding concepts like the cloud data security efficiency, the rate of evolution of data security threats/issues, and the impact of cloud data security on various industries. The literature review will also identify factors that determine the efficacy of data security within the cloud (Surbiryala & Rong, 2017). In addition, some of the basic assumptions that surround cloud data security like data mobility and data storage will be studied, and this will help ensure that the review is not limited in its scope and serves the purpose of answering the research question appropriately. Comment by Author: Be sure that what you are promising to do here aligns with what you have promised ot do earlier on at the beginning fo the chapter.

One of the most important assumptions in the field of cloud data security is that cloud data security models should be transparent. It is important to ensure that a clear understanding of the concept of cloud data security is present, and this is a very important factor in ensuring that the research question in this field is adequately answered. Another key factor that will determine the validity of the review is that the review must take a cross-section of literature. It is important to ensure that the review does not focus on a single research study but takes a more general perspective (Ransome, 2017). In this context, the review of the research literature will form a foundation of the proposed research and will be an important component of the study. In addition, it is also very important that the literature review does not get influenced by a biased selection or evaluation criteria, and this is a major issue in the area of data security in the cloud. Comment by Author: Cite sources for the assumption Comment by Author: Elaborate more on this and sow how/why it affects the work you are doing in this chapter

The literature review will also identify common theories and studies that attempt to provide a solution to the problems surrounding cloud data security, and this will provide context for the research question. These theories and studies will provide a better understanding of the current state of the art of the field and will also lead to the development of more comprehensive approaches that can be used to solve data security challenges (Arora et al., 2018). The analysis of the theories and studies that are identified will provide critical insights that will help to form a more refined research question, and these insights will also form a basis for the future research directions. It is also important to consider the research methodologies that have been used in the development of the theory and the identification of important concepts in the field.

Review of Literature

Cloud services is a field that has gained significant popularity in the current era because of the wide deployment of cloud services and the convenience that it provides. The major concern with cloud services is the loss of data. Data loss may take place through hacking, device failure, or malicious activities. Data loss can lead to significant economic losses as well as to privacy loss and personal security. This threat can potentially be much more severe in the context of the cloud because of the ease with which data can be lost. Data security is one of the major problems with the deployment of cloud services (Ransome, 2017). Various studies have attempted to address this challenge, and we aim to provide a comprehensive review of the literature that has been conducted in this context. Comment by Author: …loss of data, which may take place through… Comment by Author: This

Data Security

The majority of literature that study studies the current cloud data security environment have focused on the issue of data loss and the different solutions that are being deployed in this context. Numerous factors, which include security threats, service providers, and the nature of the cloud platform that is being used, influence the development of data security strategies. Experts in the field state that the nature of the issues and threats that are prevalent in the cloud data security environment will affect the future development of this domain (Arora et al., 2018). Therefore, there is a need to understand the current state of affairs and identify the most appropriate ways to cope with data security threats. Some research work has focused on the deployment of a security framework for data in the cloud. The majority of existing literature is focused on the deployment of service security and system security solutions. Comment by Author: Provide exampls Comment by Author: ditto

It is also important to note that current research studies have adopted an empirical approach to the study of the security of cloud services. These studies have adopted a variety of different perspectives and used various methods in order to study this domain. The majority of these studies have adopted a performance-based perspective, while a few have focused on the deployment of security solutions. Other approaches, which include developing a security classification system that utilizes a service service-oriented architecture, have also been adopted. A service service-based approach is the most common one that is adopted. There are also studies thatSome studies adopt a hybrid approach in their research. Moreover, other researchers have adopted a qualitative approach to the study of this domain. Comment by Author: Since this portion is actually your lit review, you should no longer make vague references to “research” “stidues” etc, be specific, cite them. That si the eessence of this chapter.

Through the analysis of various literary sources concerning the topic of cloud data security, it is clear that the current cloud security systems are threatened by various issues and risks including but not limited to malware, unauthorized access, and privacy issues (Kaushik & Gandhi, 2019). This can be attributed to the increasing demand for access to cloud services and services hosted on cloud data security systems. The threats to data security are mainly due to the ease of access to large amounts of data, which is available through various devices such as smart mobile devices, desktops, laptops, and other portable devices. In this section, we discuss some of the vulnerabilities, risks, and threats that occur due to the increasing adoption of cloud services. In particular, the current focus of this section is on cloud data security and its threats.

Growth of Cloud Services

In recent years, the use of the cloud to host various applications and services has been increasing, especially with the advent of cloud-based content management. The rapid growth of cloud services has led to the increasing adoption of the cloud-based model. The cCloud-based services offer a wide variety of functionality and resources to customers in the form of utility and subscription-based services. These services provide customers with applications such as database storage, email and web hosting, and storage of various media files. Due to its convenience and ease of use, many cloud-based services are being used to store and host confidential and sensitive data and intellectual property that include databases, multimedia content, large media files, and other formats.

Many researchers and experts are speculating that cloud services is in its growth phase and is poised to become a major driver of the digital economy in the future. With the increase in the adoption of cloud-based services, it is very likely that there willthere will likely be a huge increase in the security and privacy issues. With this growth in cloud-based services, many companies are also adopting cloud services (Kaushik & Gandhi, 2019). For example, a research study shows that about 50% of the most important businesses in Europe are currently using cloud services. Furthermore, cloud-based services are expected to increase by nearly $300 billion in the US by 2016. In 2015, Google and Facebook spent more than $30 billion to build out and run data centers and server clusters. A report states that by 2015, about 43% of web traffic is expected to come from web services on the cloud. As the number of companies that have moved their data to the cloud is on the rise, so is the need for security. Comment by Author: See earlier comment about this

Security Evolution

The growth trend of cloud services is a clear indicator for of the need for increased security in the field. Since the threats and issues are evolving, many organizations are looking for ways to prevent security breaches. Literature pertaining to the future of cloud data security states that there is a clear need for evolution because of the rapid advancement in cloud service security. The number of incidents is rapidly increasing, and in fact, it will continue to increase with the adoption of cloud services. Furthermore, organizations that operate in the cloud need to constantly invest in security and privacy enhancements (Namasudra, 2019). The data that companies store on the cloud servers is the most vulnerable and is always vulnerable to attack. A report highlights that the biggest security threat to companies using cloud-based services is malware attacks, followed by phishing attacks, and denial of service (DoS) attacks. This research study also states that the cloud attacks are increasing at a fast pace and can cripple a cloud service business. Comment by Author: cite Comment by Author: About/on Comment by Author: The?

Another important indicator for the data security evolution is the increasing number of data breaches. Organizations with sensitive information are increasingly vulnerable to security breaches. Furthermore, the number of security breaches continues to grow and they have become more damaging (Ransome, 2017). In fact, a report published by IBM highlights that the increase in the number of security breaches, the rising costs of remediation and data recovery, and the lack of qualified staff to identify and prevent security breaches are among the challenges. A report states that this is further complicated by the fact that cloud providers are also increasing their cloud security and customer service. Therefore, the cloud service providers will need to spend more time and resources to prevent security breaches from taking place and will also need to put more resources to address customer service issues in case of any security breaches. Comment by Author: cite Comment by Author: be specific, cite

However, some authors state that cloud security technology has progressed significantly in the last few years and is now being accepted by large enterprises. It is a fact that in the case of cloud security, the biggest problem remains cloud-based identity management (Surbiryala & Rong, 2017). Furthermore, this is a very important trend for the future as the growth in the cloud is expected to continue. The cloud is a great way to reduce the cost of computing and to get more benefits from the cloud. More and more customers are using the cloud to manage the infrastructure. However, the question is how enterprises will make their businesses and their data more secure and how they will be able to control the security and privacy. Comment by Author: cite

Gaps in Literature

One of the major gaps that is are notable from the literature review is that most of the cloud data security literature is based on cloud systems present in large organizations from developed countries such as the United States, Japan, China, and Australia. These systems are either based on a single domain or based on multiple domains. These large organizations have highly diverse business operations and data requirements, which cannot be met by single cloud systems. However, a single enterprise-scale cloud system may not provide complete data protection, as it does not consider the special requirements of the data protection and security for each business operation (Surbiryala & Rong, 2017). Furthermore, there is a need for understanding cloud data security from the perspective of developing countries such as India and Brazil that are known to have an exponential growth of the cloud usage. The current knowledge about cloud data security also does not consider mobile devices. In the future, most of the cloud data systems will be adopted by business users, who rely on mobile devices, such as smart phones and tablets, to communicate and work.

In addition, there is also a lack of research on the privacy and security of IoT devices, which is a hot issue for mobile operators, government agencies, and researchers. For example, we will be able to know a lot of details of our personal lives, such as where we live and where we work. This information can be obtained through mobile devices that allow their owners to exchange sensitive information with one another. Many organizations want to keep such information private for their business purposes (Ransome, 2017). On the other hand, there are several reasons for an organization to share such information, such as to keep the employees safe, to improve sales, and to reduce costs and improve customer service. However, there is a need to learn about the impact of cloud data security in mobiles and tablets. Therefore, this should also be considered in future research and education.

Conclusion

In conclusion, the literature review encapsulates the current cloud data security environment by highlighting the impact of cloud data security threats and issues, and also the corresponding vulnerabilities in the field of cloud data security. The cloud data security landscape is further explored in order to understand the impact of the increasing cloud usage. The literature review helps provide a basic understanding of the nature of threats and issues related to cloud data security, thus aiding in providing a foundational understanding of cloud data security (Surbiryala & Rong, 2017). The perspective of literature that explore the impact of the data security issues on cloud systems is explored in the literature review. This was important because as researchers, it is necessary to have an understanding of the threats and issues that impact the cloud systems and help design more secure solutions.

The knowledge about the cloud data security in mobile devices and mobile services is also an essential subject in this context. To ensure the data security in the cloud, it is important to understand the threats, identify the vulnerabilities, and secure the systems against the attacks. In addition, it is also important to focus on how to protect against the threats in the mobile devices and mobile services (Ransome, 2017). This paper also highlights the importance of the cloud data security in mobile devices and mobile services for the success of the businesses and its their employees. There is a need to continue with the current studies and extend the research with relevant content that is up-to-date. Comment by Author: chapter

The literature review also focused on identifying and analyzing literature on the evolving nature of data security issues in cloud computing and mobile devices. The literature review conducted in this paper reveals that there are increasing security risks associated with data storage, data leakage, and network security, among others. Furthermore, there is an increasing need to design more secure systems to protect against the existing threats in the current cloud computing and mobile computing and to identify new threats. Thus, there is a need for designing secure solutions in the cloud and mobile computing, and mobile devices. Comment by Author: This Comment by Author: focuses


References Comment by Author: Be sure that all the works cited in-text are included here also.

Arora, A. S., Raja, L., & Bahl, B. (2018, April). Data centric security approach: A way to achieve security & privacy in cloud computing. In Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT) (pp. 26-27).

Kaushik, S., & Gandhi, C. (2019). Ensure hierarchal identity based data security in cloud environment. International Journal of Cloud Applications and Computing (IJCAC), 9(4), 21-36.

Namasudra, S. (2019). An improved attribute‐based encryption technique towards the data security in cloud computing. Concurrency and Computation: Practice and Experience, 31(3), e4364.

Ransome, J. F. (2017). Cloud Computing: Implementation, Management, and Security. CRC Press.

Surbiryala, J., Li, C., & Rong, C. (2017, April). A framework for improving security in cloud computing. In 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA) (pp. 260-264). IEEE.

error: Content is protected !!