SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
Cloud Computing- Proposal (Autosaved)
1. Cloud Computing Security: Issues & challenges in data location
Due to technological advancement in web 2.0 technology, the dramatic changes have been occurred on
traditional BI (business intelligence) functionality. However scholars and technologist continuously
looking solution in the recent invented cloud computing environment where on demand self-service
(on air computing resources), Broad network access (utilization of computing resources), Resource
pooling (virtualization of computing resources) , Rapid elasticity ( computing resource provisioning )
can be discharged with minimal management effort as well as service provider interaction [1].
Cloud Computing is new paradigm where resources are accessible with the help of cloud at any time
and from any place across the globe by using internet without worrying about technical/ Physical
management . Another cloud computing is famous with the ‘utility computing’ where IT services can
be access on demand. Google App is the best example of cloud computing where we are share and
store our data via internet cloud service through browser technology and it can be accessed from any
location [3].
IT analyst and industry specialist predict that 80% IT services is being shifted towards cloud
computing & it’s sourcing. After that innovation it is confirmed that Cloud computing are not a fake
reality and its adoption and acceptance in global industry will be accelerate continuously. Moreover,
the cloud computing concept has change the idea about how IT service providers deliver IT services,
how IT departments & enterprise source IT within the enterprises provide values to their business [2].
Cloud computing has raised many security issues including securing data, recovery of data and its
utilization on the secured way. Therefore due to this hindrance, consumers have serious concerns on
cloud computing services about availability of their data when required [3].
Cloud computing has gained many advantages for its adoption but many other disadvantages takes
serious security thinking in cloud computing. Loss of physical control of data into cloud is a big
disadvantage for security point of view because many service providers are unable to guarantee the
location of user’s data on the specific server in a specified location. With this regard, the big chances
of losing data or stolen due to server occurrence from outside the country premises where getting more
chances of losing data and out of control from the hand of users.
Research Problem:
When the users use the cloud services and going to host their data in the cloud server, they don’t know
where their data will be hosted and who can be protected this data. [4]. as according to [5] stated
that physical security is completely lost after replacement of cloud computing where all computing
resources shared in a cloud and no one knows about where their resources run on the cloud.
Another Arthur explained about Cloud computing security when we use cloud we likely don’t know
exactly where our data hosted and which country represented to this data for storage. We first make
sure from providers if they are committed to storing and processing data in specific jurisdiction, they
make a contractual commitment & agreement to obey the local privacy policies and requirement on
the behalf of their customers.
Aim and Objective:
In this research our first aim is to develop a model and mechanism to control over data resources
which has stored in cloud servers and implement data manipulation technique to protect data from
different country servers to unauthorized access of sensitive information.
2. Research Methodology:
Research can be defined as ”the way of thinking, examining critically the various aspects of day to day
professional work, understanding and formulating guiding principles that govern a particular
procedure and developing and testing new theories for the enhancement of practice” Kumar (2005,
p.2). Research methodology is necessary in order to execute the research in a proper way. Research
methodology is a kind of tool which is provides help when the research is being carried out and
research design has come in shape and form.
As according to (7) stated “Action research is an iterative process involving researchers and
practitioners acting together on a particular cycle of activities, including problem diagnosis, action
intervention and reflective learning”. Action research has combine theory and practice (involve
practitioners and researchers) through change and reflection in an immediate problematic situation
within mutually acceptable ethical framework. Another definition of action research explains that
researcher use theory with practitioners in complex real life problems, and gets feedback from the
performed experiences. After that modification in theory on the basis of verified results
accomplished from feedbacks.
I will be examine the study in Qualitative Action research strategy method where I as researcher
investigate the customer and end user data in cloud server and whom controlled this data on a
secured manner. Action research strategy is a best strategy for our case because I as a researcher
directly involved along with the practitioner (data storage cloud vendors) and investigate whom
responsible to controlled data resources which are running on the backward of cloud servers.
Research Question:
1. How users made control over data when they are trying to stored and manipulate in the cloud
server?
2. How they ensure data manipulation technique during transformation of data from one server
to another server in a proper jurisdiction way? (Either save or avoid from data loss, leakage,
alteration, modification and fabrication).
Justification:
According to the global survey conducted by IBM suggested that greater than 60 % organizations will
set the plans to settled down all business work load over cloud computing within next five years for
gain business and competitive advantages, shifting all resources into cloud region is a big challenge
for SME (small medium enterprise) from across all the over the world. Meanwhile cloud computing
security is a big challenge [6].
Due to technological advancement in ICT, all computing resources shifting toward over cloud
facilities and dreamt in a future “computing as a utility”. Due to this factor, all sensitive information
will be shared in Cloud servers where nobody knows where informations stored or saved and whom
(domain /country) controlled this data securely. We need to instigate the models/frameworks/ data
manipulation techniques to investigate the factors to protect data from country server boundaries
unauthorized access.
Expected Outcome:
3. After this research investigation, we will identify that cloud computing as a utility would be beneficial
for organization who can share the sensitive data over internet through cloud technology and whom
controlled the all information that is saved in cloud server from different region of world.
Reference:
[1]Dillon , .T, wu , .C, Chang, .E (2010), cloud computing : Issues and challenges. 24th
IEEE, advanced
information networking and application.
[2](2010), the cloud Enabled Enterprise: Developing a blue print and addressing key challenges.
[3] Shaikh, F., B., Haider, s., (2011), security threads in cloud computing. 6th
IEEE, Internet technology
and secured transaction.
[4] Jain,P. , Rane, D., Patidar,.D, A Survey and Analysis of Cloud Model-Based Security for Computing
Secure Cloud Bursting and Aggregation in Renal Environment.
[5] Popovic, K., Hocenski, Z., cloud computing security issues and challenges, Institute of automate
and process computing.
[6]Khan, .S, Zhang, B., khan, F., chen, S., (2011), business intelligence in the cloud: A Case of Pakistan
IEEE.
[7] Avison, D., Lau, F., Myers, M., Nielsen, .P,X (1999). Action Research.