Security & Privacy
Challenges in Cloud
Computing
CONTENT
• Research Gap
• Research Questions
• Conceptual Framework
• Operationalization Table
• Research Methodology
• Significance of the Research
RESEARCH GAP
•Existing research has only covered the technical,
Performance and trust Challenges in Cloud Computing
and therefore, this study have expanded the
Challenges to Security and Privacy Issues in Cloud
Computing.
RESEARCH QUESTION
• What are the Security and Privacy challenges in Cloud Computing ?
• How to affect Security and Privacy challenges on cloud computing ?
CONCEPTUAL FRAMEWORK
H1
H2
Cloud Computing
Security
challenges
Privacy
challenges
OPERATIONALIZATION TABLE
Concept/ Construct Dimension Indicators Sources
Cloud Computing
• Cloud Computing Users
Enrolment • Number of users involve
to Cloud computing
• [Balding08] Craig
Balding, "ITG2008
World Cloud
Computing Summit",
2008
• [Reese09] George
Reese, "Cloud
Application
Architectures",April
2009, O'Reilly Media
• Cloud computing
Challenges
• Types of Challenges
• Parties, who involve in
cloud computing
• Category of parties
RESEARCH METHODOLOGY
• Population : Cloud Service Providers in Sri Lanka
• Sample : Main Cloud Service Provider in Sri Lanka
(DataCore Lanka (Pvt) Ltd)
• Instrument : Secondary Data
Significance of the Research
• This study will useful to different users and developers in IT Industry in Sri
Lanka.
• This study can be used by Cloud Computing developers in order to improve
or to expand their services.
• Academic peoples can use this research to base on their future researches.
• Cloud Computing services provider can use this study to identify challenges
in cloud computing, also users can use this study to educate themselves how
to protect that challenges.
ThankYou !

Security & privacy challenges in cloud computing

  • 1.
  • 2.
    CONTENT • Research Gap •Research Questions • Conceptual Framework • Operationalization Table • Research Methodology • Significance of the Research
  • 3.
    RESEARCH GAP •Existing researchhas only covered the technical, Performance and trust Challenges in Cloud Computing and therefore, this study have expanded the Challenges to Security and Privacy Issues in Cloud Computing.
  • 4.
    RESEARCH QUESTION • Whatare the Security and Privacy challenges in Cloud Computing ? • How to affect Security and Privacy challenges on cloud computing ?
  • 5.
  • 6.
    OPERATIONALIZATION TABLE Concept/ ConstructDimension Indicators Sources Cloud Computing • Cloud Computing Users Enrolment • Number of users involve to Cloud computing • [Balding08] Craig Balding, "ITG2008 World Cloud Computing Summit", 2008 • [Reese09] George Reese, "Cloud Application Architectures",April 2009, O'Reilly Media • Cloud computing Challenges • Types of Challenges • Parties, who involve in cloud computing • Category of parties
  • 7.
    RESEARCH METHODOLOGY • Population: Cloud Service Providers in Sri Lanka • Sample : Main Cloud Service Provider in Sri Lanka (DataCore Lanka (Pvt) Ltd) • Instrument : Secondary Data
  • 8.
    Significance of theResearch • This study will useful to different users and developers in IT Industry in Sri Lanka. • This study can be used by Cloud Computing developers in order to improve or to expand their services. • Academic peoples can use this research to base on their future researches. • Cloud Computing services provider can use this study to identify challenges in cloud computing, also users can use this study to educate themselves how to protect that challenges.
  • 9.