Project objective
With the rapid increase in the world of technology, the emphasis is given on managing the big data generated with the evolution in technology. The cloud computing technology is the solution for managing virtual storage unit for using the data efficiently. “The login credentials are used for accessing data from the cloud” (Kelkar, 2013). From the research it has been concluded that there are some issues and limitations with the implementation of cloud computing technology within the enterprise. The major issue is the limited availability of security protocols. The services provided by the cloud computing can be easily hacked by the hacker. In this paper we will look forward to research the gaps and issues which exist in the cloud computing technology and what are the recommended solutions to overcome those problems and implement the cloud computing technology successfully within the enterprise.
The objective of this paper is to evaluate ad focus on the gaps and issues which exist with the cloud computing technology. The focus will also be given on the recommended solution which the enterprise adopts for the implementation of cloud computing technology. The goal of this paper is to research the method which can increase the efficiency of the cloud computing technology and reduces the limitation of it.
The scope of the project is to research and analyse the flows and issues which exist with technology of cloud computing which is well-efficient in managing big data of the organization. It is capable of providing scalability and flexibility to the operation performed by the organization. The research program is organized for analysing the gaps which exist between the security protocols, server issue to provide stable internet connectivity, privacy and confidentiality of data. With the rapid increase in the availability of data, the dependency on the cloud computing is also increasing at the faster rte. The proposal should be designed which is capable of removing and minimizing the limitation of the cloud computing so that the enterprise can effectively use the program of cloud computing technology to organise their big data effectively for retrieval on the demand of user.
The evidences of the literature review helps in analysing that there are two sides of cloud computing technology, one is positive and other is negative. “The cloud computing technology can be efficiently used in the organization when the proposal is designed to overcome the negative issues which are associated with the cloud computing technology” (Vouk, 2014). The top executives and the business owners are getting attracted towards the new technology of cloud computing because it is effectively manages the big data of the organization, provides the resources on the demand of user, the replicated copies of the data is available on the virtual machine to resolve the issues of conflict which generally exist between the employees for accessing resources and data, and many more. After the implementation of the cloud computing technology, the business get cope with the negative aspect of the cloud computing technology such as theft of identity, data management, security protocols, hacking of data, server issues for providing stable connectivity between the devices, and others. The security of the cloud can be enhanced by using some recommended technologies. The problem of Data stealing can be resolved by using the strong credentials for the login session. “The solution for resolving the malware attacks is providing the mechanism of authorization and authentication to access the services from the web cloud” (Enisa, 2014). The wrapping of attacks helps in preventing the communication between webserver and web browser. The STAMP bit is used for managing the communication between the two. The denial of service attack can be prevented by using the technique of firewall protection, digital signature, and filter based mechanism. The use of artificial intelligence helps in aligning the activities of cloud computing technology. The step should be taken forward to implement strong security mechanism for the cloud in the organization.
Project scope
Primary question of the research:
What are the flaws and gaps in the cloud computing technologies and what are the possible solutions to overcome those problems?
Secondary questions:
What are the possible use cases which are best suitable in critical situation of cloud computing technology?
What are the key areas to recommend the cloud computing technologies to implement in the enterprise?
What are the primary locations of the data centre?
What is the layout of the data centre planning for the effective utilization of resources?
What is the recommended scheduling of the data centre?
Which is the best suitable platform for the cloud implementation?
Which is the best technique used for intrusion detection and prevention methods?
The research work is associated with two types of research approach which are named as deductive and inductive approach. “The focus of the deductive approach is to resolve the research question on the basis of evidences collect on literature review on cloud computing whereas on the other hand inductive approach focuses on collecting the opinions of the research professionals, top executives, and expertise by arranging interviews and questionnaire with them” (Kumar, 2015). The analysis of the literature review helps in finding the gaps in the cloud computing scenario and through inductive approach we are able to get knowledge about what problem the enterprise faced with the inefficiency of the cloud computing technology. These approaches helps in designing the research proposal for the efficient and effective of cloud computing in the curriculum of the enterprise.
The qualitative and quantitative are the two methodologies which are used for collecting the data by using the research approaches. The face to face arrangement of interview with the top executives of the company helps in collecting the qualitative data on flaws which are associated with the cloud computing technology. The arrangement of questionnaire helps in presenting the opinion at large scale by using the propaganda of objective research questions. The analysis report of qualitative and quantitative approach helps in giving the details of gaps and flows associated with the cloud computing and what can be the recommended solution to face the problem efficiently and effectively.
Steps in Qualitative and quantitative research methodology:
Steps involved in the research methodology |
Quantitative Approach |
Qualitative Approach |
Identification of the research objective |
Description and explanation of the cloud computing technology |
Exploration and understanding of the cloud computing technology |
Evidences collected from the literature review |
It is the major role for identifying the research problem of predicting the gaps in the cloud computing technology |
It is the minor role for predicting the flaws in the cloud computing technology |
Specification of the purpose |
“The purpose of identifying the flaws in cloud computing and its recommended solution are characterised as specific, narrow, measurable, and observable” (Xue, 2016) |
“The purpose of identifying the flaws in cloud computing and its recommended solution are characterised as general, broad and based on the experience of the participants” (Iyoop, 2016) |
Data collection strategies |
“The arrangement of questionnaire helps in presenting the opinion at large scale by using the propaganda of objective research questions” (Sriram, 2014) “It makes use of predetermined instrument and collect numeric data from large extent of individual at a time” (Jeffery, 2015) |
The face to face arrangement of interview with the top executives of the company helps in collecting the qualitative data on flaws which are associated with the cloud computing technology. “It makes use of emerging protocols and limited number of individuals” (Perkins, 2012) |
Interpretation and analysis of data |
It is based on statistical analysis of the cloud computing technology |
It is based on the text analysis of the cloud computing technology. |
Data quality Determination |
The valid and reliable data is collected |
The findings of the analysis depend on the nature of the researcher. |
The limitation of the research can be the effective analysis of the qualitative and quantitative data collected from applying the research methodologies. The valid research questions are not organised by the researchers. The inaccuracy can be seen in the research questions of the questionnaire.
Recruitment process |
||
Activities |
Starting Date |
Finishing Date |
Prepare the proposal for identifying and filing the gaps of the cloud computing technology |
26-June-2017 |
14-jul-2017 |
Analysis and preparation of the literature review on issues and solution for the cloud computing technology |
15-jul-2017 |
26-july-2017 |
Presentation of literature review report |
27-jul-2017 |
31-jul-2017 |
Preparation of Pilot questionnaire for the enterprise |
01-Aug-2017 |
04-Aug-2017 |
Preparation of the final questionnaire |
05-Aug-2017 |
08-Aug-2017 |
Analysis report of the questionnaire |
10-Aug-2017 |
17-Aug-2017 |
Preparation of the first draft |
18-Aug-2017 |
21-Aug-2017 |
Preparation of the final draft |
22-Aug-2017 |
29-Aug-2017 |
Presentation of the analysis report |
30-Aug-2017 |
31-Aug-2017 |
Presentation of the final research proposal |
01-Sep-2017 |
05-Sep-2017 |
Conclusion:
The research program has been conducted to research and analyse the flaws and issues which exist with the technology of cloud computing which is well-efficient in managing big data of the organization. The security of the cloud can be enhanced by using some recommended technologies such as use of artificial intelligence, firewall protection, digital signature technologies, and others. The analysis report of qualitative and quantitative approach helps in giving the details of gaps and flows associated with the cloud computing.
References:
Enisa, H. (2014). Benefits, risks, and recommendation for information security. 1st ed. [ebook] Available at: https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed 01 June, 2017].
Iyoop, I. (2016). Cloud computing operation research. 1st ed. [ebook] Available at: https://www.columbia.edu/~ad3217/publications/cloudOR.pdf [Accessed 01 June, 2017].
Jeffery, K. (2015). Advances in cloud: Research in future cloud computing. 1st ed. [ebook] Available at: https://cordis.europa.eu/fp7/ict/ssai/docs/future-cc-2may-finalreport-experts.pdf [Accessed 01 June, 2017].
Kelkar, S. (2013). A research paper on a study on the scope of cloud computing in management education. 1st ed. [ebook] Available at: https://apps.aima.in/ejournal_new/articlesPDF/Uday-Salunkhe.pdf [Accessed 01 June, 2017].
Kumar, S. (2015). Cloud computing research issues, challenges, architecture, platforms, and application: A survey. 1st ed. [ebook] Available at: https://www.ijfcc.org/papers/95-F0048.pdf [Accessed 01 June, 2017].
Nazir, M. (2012). Cloud computing: Overview and current research challenges. 1st ed. [ebook] Available at: https://www.iosrjournals.org/iosr-jce/papers/Vol8-Issue1/C0811422.pdf?id=358 [Accessed 01 June, 2017].
Perkins, W. (2012). Research in the workplace (1st ed.). Available at: https://www.kcl.ac.uk/innovation/research/support/ethics/storeddocs/4TrainingAdvice/4Researchintheworkplace/ResearchintheWorkplaceguidance.pdf [Accessed 01 June, 2017]
Sriram, I. (2014). Research agenda in cloud technologies. 1st ed. [ebook] Available at: https://pdfs.semanticscholar.org/ad75/754b4d8e04f904ed15e74fe4b46772ae68de.pdf [Accessed 01 June, 2017].
Vouk, M. (2014). Cloud computing- issues research and implementation. 1st ed. [ebook] Available at: https://www.chinagrid.net/upload/2009-04/temp_09042910395537.pdf [Accessed 01 June, 2017].
Xue, C. (2016). Benefits and challenges of the adoption of cloud computing in business. 1st ed. [ebook] Available at: https://aircconline.com/ijccsa/V6N6/6616ijccsa01.pdf [Accessed 01 June, 2017].