SlideShare a Scribd company logo
Data Security in Cloud Computing
Prof
University
Comment by CA: Is this what you are eluding to?
Exploring the management of trust in data security in a cloud
computing environment.
Data Security in Cloud Computing
Description
Data security in cloud computing consists of policies and
procedures that help protect cloud systems, infrastructure, and
data. With cloud users, there is not enough trust management
that has been put in place to promote maximum cloud growth
(Ghazizadeh & Cusack, 2018). These research results are the
area of data security in cloud computing to find more insights
that can help keep data more secure while in the cloud.
Information Gap
There is the information gap of the lack of enough cloud
computing management to increase users' trust in all the
operations partaken. Due to this, there is the presented problem
of data security which is costly to the organizations.
Comment by CA: Is this the topic? Comment by CA: What
do you mean?
Models/Theories Developed in the Area
From the research identified, the model that has been used for
analysis is the trust model. The trust model is the security
strength evaluator to the cloud services and the applications
(Ghazizadeh & Cusack, 2018). Ghazizadeh and Cusack (2018)
state that the model helps set up security at the identity cloud
services as it finds the inadequacies and enhances the cloud's
infrastructure to ensure maximum security.
One of the cited problems from the body of knowledge is cloud
computing's management system concerning their trust in data
collection and synthesis. To Exploring more on the management
system problem, both the trust model and the evaluation theory
are used to identify trust in the cloud, which is essential for
data security. Through this, proper recommendations concerning
data security in the cloud will be made. Comment by CA:
Topic?
Research Type
Both qualitative and quantitative research methods will be
used. Qualitative research will be used as it is fundamental to
measure the quality of data security rather than its quantity
(Senyo et al., 2018). Besides, it is essential in describing things
as the numerical expressions are hard to define such things.
Quantitative research will help explore the facts, percentages,
and measures when exploring data security in the cloud (Senyo
et al., 2018). With the two methods mixed, both the why and
what questions will be answered.
Research Target Group Comment by CA: This is very broad.
Where will you get your data?
The possible population used for data collection is the
small and medium enterprises (SMEs) in the United States that
have stored their information in the cloud. They were seen to be
the most effective population as they deal with a large amount
of data which is the cloud, that requires security as they are
faced with trust management issues.
References
Ghazizadeh, E., & Cusack, B. (2018). Evaluation Theory for
Characteristics of Cloud Identity Trust Framework. Cloud
Computing-Technology and Practices, 933-939.
Senyo, P. K., Addae, E., & Boateng, R. (2018). Cloud
computing research: A review of research themes, frameworks,
methods, and future research directions. International Journal of
Information Management, 38(1), 128-139.

More Related Content

What's hot

Elastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shopElastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shop
Elasticsearch
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Netskope
 
October 2020 meetup
October 2020 meetupOctober 2020 meetup
October 2020 meetup
Daliya Spasova
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud Infrastructure
The TNS Group
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016David Rubal, CISSP
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
IJNSA Journal
 
(ISC)² CyberSecureGov Presentation May 11 2017
(ISC)² CyberSecureGov Presentation May 11 2017(ISC)² CyberSecureGov Presentation May 11 2017
(ISC)² CyberSecureGov Presentation May 11 2017
David Rubal, CISSP
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelines
Elasticsearch
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
Mphasis
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
Asim Jahan
 
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempoPoner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Elasticsearch
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
Editor IJCATR
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
Export Promotion Bureau
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
Tom Kirby
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Puneet Kukreja
 
Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic Security
Elasticsearch
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
Elasticsearch
 
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
Netskope
 

What's hot (20)

Elastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shopElastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shop
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
October 2020 meetup
October 2020 meetupOctober 2020 meetup
October 2020 meetup
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud Infrastructure
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
(ISC)² CyberSecureGov Presentation May 11 2017
(ISC)² CyberSecureGov Presentation May 11 2017(ISC)² CyberSecureGov Presentation May 11 2017
(ISC)² CyberSecureGov Presentation May 11 2017
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelines
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempoPoner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
Poner en funcionamiento con alertas, dashboards customizados y líneas de tiempo
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic Security
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
The Razor's Edge: Enabling Cloud While Mitigating the Risk of a Cloud Data Br...
 

Similar to Data security in cloud compu

MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
roushhsiu
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
jeanettehully
 
INS653X Project Management.docx
INS653X Project Management.docxINS653X Project Management.docx
INS653X Project Management.docx
write4
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
IRJET Journal
 
Br36413417
Br36413417Br36413417
Br36413417
IJERA Editor
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
sleeperharwell
 
Introduction Project Aims The aim of the project is.pdf
Introduction Project Aims The aim of the project is.pdfIntroduction Project Aims The aim of the project is.pdf
Introduction Project Aims The aim of the project is.pdf
bkbk37
 
ELEC6840A Final Year Project A.docx
ELEC6840A Final Year Project A.docxELEC6840A Final Year Project A.docx
ELEC6840A Final Year Project A.docx
4934bk
 
Big Data and Cloud Readiness
Big Data and Cloud ReadinessBig Data and Cloud Readiness
Big Data and Cloud Readiness
AIRCC Publishing Corporation
 
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESSBIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESS
ijcsit
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
IJECEIAES
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
zmark3
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
jeanettehully
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
VannaSchrader3
 
Research insights - state of network security
Research insights - state of network securityResearch insights - state of network security
Research insights - state of network security
Miguel Mello
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
IRJET Journal
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211

Similar to Data security in cloud compu (20)

MITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docxMITS Advanced Research TechniquesResearch ProposalCandidate.docx
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
 
INS653X Project Management.docx
INS653X Project Management.docxINS653X Project Management.docx
INS653X Project Management.docx
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
Br36413417
Br36413417Br36413417
Br36413417
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
Introduction Project Aims The aim of the project is.pdf
Introduction Project Aims The aim of the project is.pdfIntroduction Project Aims The aim of the project is.pdf
Introduction Project Aims The aim of the project is.pdf
 
ELEC6840A Final Year Project A.docx
ELEC6840A Final Year Project A.docxELEC6840A Final Year Project A.docx
ELEC6840A Final Year Project A.docx
 
Big Data and Cloud Readiness
Big Data and Cloud ReadinessBig Data and Cloud Readiness
Big Data and Cloud Readiness
 
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESSBIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESS
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
 
Research insights - state of network security
Research insights - state of network securityResearch insights - state of network security
Research insights - state of network security
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 

More from ANIL247048

Effective leadership and management in nursing nint
Effective leadership and management in nursing nintEffective leadership and management in nursing nint
Effective leadership and management in nursing nint
ANIL247048
 
Effective crisis communication chapter 1 the conceptual foundat
Effective crisis communication chapter 1 the conceptual foundatEffective crisis communication chapter 1 the conceptual foundat
Effective crisis communication chapter 1 the conceptual foundat
ANIL247048
 
Edu 280 activity plan rubric df unsatisfactory
Edu 280 activity plan rubric df unsatisfactoryEdu 280 activity plan rubric df unsatisfactory
Edu 280 activity plan rubric df unsatisfactory
ANIL247048
 
Econ 3310 – microeconomics spring 2021 – david quigley g
Econ 3310 – microeconomics spring 2021 – david quigley gEcon 3310 – microeconomics spring 2021 – david quigley g
Econ 3310 – microeconomics spring 2021 – david quigley g
ANIL247048
 
E commerce 2018 business. technology. society copyright ©
E commerce 2018 business. technology. society copyright ©E commerce 2018 business. technology. society copyright ©
E commerce 2018 business. technology. society copyright ©
ANIL247048
 
Eco 223 economic history of the western community chapter
Eco 223 economic history of the western community chapterEco 223 economic history of the western community chapter
Eco 223 economic history of the western community chapter
ANIL247048
 
Due date weekly percentage of course grade 20.undergra
Due date weekly percentage of course grade 20.undergraDue date weekly percentage of course grade 20.undergra
Due date weekly percentage of course grade 20.undergra
ANIL247048
 
Drug addicts presenting information drug addicts are humans su
Drug addicts presenting information drug addicts are humans suDrug addicts presenting information drug addicts are humans su
Drug addicts presenting information drug addicts are humans su
ANIL247048
 
Dmin 810 comparing and contrasting models paper assignment instru
Dmin 810 comparing and contrasting models paper assignment instruDmin 810 comparing and contrasting models paper assignment instru
Dmin 810 comparing and contrasting models paper assignment instru
ANIL247048
 
Dl002 assessment instructions assessment instructionsdl002
Dl002  assessment instructions assessment instructionsdl002Dl002  assessment instructions assessment instructionsdl002
Dl002 assessment instructions assessment instructionsdl002
ANIL247048
 
Directions for discussion for h.m. and his doctor listen to t
Directions for discussion for h.m. and his doctor listen to tDirections for discussion for h.m. and his doctor listen to t
Directions for discussion for h.m. and his doctor listen to t
ANIL247048
 
Directions for chapter 10 lesson 1 project researching the e
Directions for chapter 10 lesson 1 project researching the eDirections for chapter 10 lesson 1 project researching the e
Directions for chapter 10 lesson 1 project researching the e
ANIL247048
 
Directions for chapter 9 lesson 3 write a three paragraph
Directions for chapter 9 lesson 3 write a three paragraph Directions for chapter 9 lesson 3 write a three paragraph
Directions for chapter 9 lesson 3 write a three paragraph
ANIL247048
 
Digital media & society week 7 please respond in complet
Digital media & society week 7 please respond in completDigital media & society week 7 please respond in complet
Digital media & society week 7 please respond in complet
ANIL247048
 
Digital media & society cmst 301 project 4 final exam1. fo
Digital media & society cmst 301 project 4 final exam1. foDigital media & society cmst 301 project 4 final exam1. fo
Digital media & society cmst 301 project 4 final exam1. fo
ANIL247048
 
Descriptive statistics worksheet directions answer each qu
Descriptive statistics worksheet directions answer each quDescriptive statistics worksheet directions answer each qu
Descriptive statistics worksheet directions answer each qu
ANIL247048
 
Define problem identi
Define problem    identiDefine problem    identi
Define problem identi
ANIL247048
 
Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging
ANIL247048
 
Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging
ANIL247048
 
Data sheet activity ecology all content is copyright protected
Data sheet activity   ecology all content is copyright protectedData sheet activity   ecology all content is copyright protected
Data sheet activity ecology all content is copyright protected
ANIL247048
 

More from ANIL247048 (20)

Effective leadership and management in nursing nint
Effective leadership and management in nursing nintEffective leadership and management in nursing nint
Effective leadership and management in nursing nint
 
Effective crisis communication chapter 1 the conceptual foundat
Effective crisis communication chapter 1 the conceptual foundatEffective crisis communication chapter 1 the conceptual foundat
Effective crisis communication chapter 1 the conceptual foundat
 
Edu 280 activity plan rubric df unsatisfactory
Edu 280 activity plan rubric df unsatisfactoryEdu 280 activity plan rubric df unsatisfactory
Edu 280 activity plan rubric df unsatisfactory
 
Econ 3310 – microeconomics spring 2021 – david quigley g
Econ 3310 – microeconomics spring 2021 – david quigley gEcon 3310 – microeconomics spring 2021 – david quigley g
Econ 3310 – microeconomics spring 2021 – david quigley g
 
E commerce 2018 business. technology. society copyright ©
E commerce 2018 business. technology. society copyright ©E commerce 2018 business. technology. society copyright ©
E commerce 2018 business. technology. society copyright ©
 
Eco 223 economic history of the western community chapter
Eco 223 economic history of the western community chapterEco 223 economic history of the western community chapter
Eco 223 economic history of the western community chapter
 
Due date weekly percentage of course grade 20.undergra
Due date weekly percentage of course grade 20.undergraDue date weekly percentage of course grade 20.undergra
Due date weekly percentage of course grade 20.undergra
 
Drug addicts presenting information drug addicts are humans su
Drug addicts presenting information drug addicts are humans suDrug addicts presenting information drug addicts are humans su
Drug addicts presenting information drug addicts are humans su
 
Dmin 810 comparing and contrasting models paper assignment instru
Dmin 810 comparing and contrasting models paper assignment instruDmin 810 comparing and contrasting models paper assignment instru
Dmin 810 comparing and contrasting models paper assignment instru
 
Dl002 assessment instructions assessment instructionsdl002
Dl002  assessment instructions assessment instructionsdl002Dl002  assessment instructions assessment instructionsdl002
Dl002 assessment instructions assessment instructionsdl002
 
Directions for discussion for h.m. and his doctor listen to t
Directions for discussion for h.m. and his doctor listen to tDirections for discussion for h.m. and his doctor listen to t
Directions for discussion for h.m. and his doctor listen to t
 
Directions for chapter 10 lesson 1 project researching the e
Directions for chapter 10 lesson 1 project researching the eDirections for chapter 10 lesson 1 project researching the e
Directions for chapter 10 lesson 1 project researching the e
 
Directions for chapter 9 lesson 3 write a three paragraph
Directions for chapter 9 lesson 3 write a three paragraph Directions for chapter 9 lesson 3 write a three paragraph
Directions for chapter 9 lesson 3 write a three paragraph
 
Digital media & society week 7 please respond in complet
Digital media & society week 7 please respond in completDigital media & society week 7 please respond in complet
Digital media & society week 7 please respond in complet
 
Digital media & society cmst 301 project 4 final exam1. fo
Digital media & society cmst 301 project 4 final exam1. foDigital media & society cmst 301 project 4 final exam1. fo
Digital media & society cmst 301 project 4 final exam1. fo
 
Descriptive statistics worksheet directions answer each qu
Descriptive statistics worksheet directions answer each quDescriptive statistics worksheet directions answer each qu
Descriptive statistics worksheet directions answer each qu
 
Define problem identi
Define problem    identiDefine problem    identi
Define problem identi
 
Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging
 
Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging Data length of stayagesexprincipal payer total chgesrt chgeimaging
Data length of stayagesexprincipal payer total chgesrt chgeimaging
 
Data sheet activity ecology all content is copyright protected
Data sheet activity   ecology all content is copyright protectedData sheet activity   ecology all content is copyright protected
Data sheet activity ecology all content is copyright protected
 

Recently uploaded

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Data security in cloud compu

  • 1. Data Security in Cloud Computing Prof University Comment by CA: Is this what you are eluding to? Exploring the management of trust in data security in a cloud computing environment. Data Security in Cloud Computing Description Data security in cloud computing consists of policies and procedures that help protect cloud systems, infrastructure, and
  • 2. data. With cloud users, there is not enough trust management that has been put in place to promote maximum cloud growth (Ghazizadeh & Cusack, 2018). These research results are the area of data security in cloud computing to find more insights that can help keep data more secure while in the cloud. Information Gap There is the information gap of the lack of enough cloud computing management to increase users' trust in all the operations partaken. Due to this, there is the presented problem of data security which is costly to the organizations. Comment by CA: Is this the topic? Comment by CA: What do you mean? Models/Theories Developed in the Area From the research identified, the model that has been used for analysis is the trust model. The trust model is the security strength evaluator to the cloud services and the applications (Ghazizadeh & Cusack, 2018). Ghazizadeh and Cusack (2018) state that the model helps set up security at the identity cloud services as it finds the inadequacies and enhances the cloud's infrastructure to ensure maximum security. One of the cited problems from the body of knowledge is cloud computing's management system concerning their trust in data collection and synthesis. To Exploring more on the management system problem, both the trust model and the evaluation theory are used to identify trust in the cloud, which is essential for data security. Through this, proper recommendations concerning data security in the cloud will be made. Comment by CA: Topic? Research Type Both qualitative and quantitative research methods will be used. Qualitative research will be used as it is fundamental to measure the quality of data security rather than its quantity (Senyo et al., 2018). Besides, it is essential in describing things as the numerical expressions are hard to define such things. Quantitative research will help explore the facts, percentages,
  • 3. and measures when exploring data security in the cloud (Senyo et al., 2018). With the two methods mixed, both the why and what questions will be answered. Research Target Group Comment by CA: This is very broad. Where will you get your data? The possible population used for data collection is the small and medium enterprises (SMEs) in the United States that have stored their information in the cloud. They were seen to be the most effective population as they deal with a large amount of data which is the cloud, that requires security as they are faced with trust management issues. References Ghazizadeh, E., & Cusack, B. (2018). Evaluation Theory for Characteristics of Cloud Identity Trust Framework. Cloud Computing-Technology and Practices, 933-939. Senyo, P. K., Addae, E., & Boateng, R. (2018). Cloud computing research: A review of research themes, frameworks, methods, and future research directions. International Journal of Information Management, 38(1), 128-139.