SlideShare a Scribd company logo
1 of 3
Download to read offline
Cloud Computing Security: Issues & challenges in data location
Due to technological advancement in web 2.0 technology, the dramatic changes have been occurred on
traditional BI (business intelligence) functionality. However scholars and technologist continuously
looking solution in the recent invented cloud computing environment where on demand self-service
(on air computing resources), Broad network access (utilization of computing resources), Resource
pooling (virtualization of computing resources) , Rapid elasticity ( computing resource provisioning )
can be discharged with minimal management effort as well as service provider interaction [1].
Cloud Computing is new paradigm where resources are accessible with the help of cloud at any time
and from any place across the globe by using internet without worrying about technical/ Physical
management . Another cloud computing is famous with the ‘utility computing’ where IT services can
be access on demand. Google App is the best example of cloud computing where we are share and
store our data via internet cloud service through browser technology and it can be accessed from any
location [3].
IT analyst and industry specialist predict that 80% IT services is being shifted towards cloud
computing & it’s sourcing. After that innovation it is confirmed that Cloud computing are not a fake
reality and its adoption and acceptance in global industry will be accelerate continuously. Moreover,
the cloud computing concept has change the idea about how IT service providers deliver IT services,
how IT departments & enterprise source IT within the enterprises provide values to their business [2].
Cloud computing has raised many security issues including securing data, recovery of data and its
utilization on the secured way. Therefore due to this hindrance, consumers have serious concerns on
cloud computing services about availability of their data when required [3].
Cloud computing has gained many advantages for its adoption but many other disadvantages takes
serious security thinking in cloud computing. Loss of physical control of data into cloud is a big
disadvantage for security point of view because many service providers are unable to guarantee the
location of user’s data on the specific server in a specified location. With this regard, the big chances
of losing data or stolen due to server occurrence from outside the country premises where getting more
chances of losing data and out of control from the hand of users.
Research Problem:
When the users use the cloud services and going to host their data in the cloud server, they don’t know
where their data will be hosted and who can be protected this data. [4]. as according to [5] stated
that physical security is completely lost after replacement of cloud computing where all computing
resources shared in a cloud and no one knows about where their resources run on the cloud.
Another Arthur explained about Cloud computing security when we use cloud we likely don’t know
exactly where our data hosted and which country represented to this data for storage. We first make
sure from providers if they are committed to storing and processing data in specific jurisdiction, they
make a contractual commitment & agreement to obey the local privacy policies and requirement on
the behalf of their customers.
Aim and Objective:
In this research our first aim is to develop a model and mechanism to control over data resources
which has stored in cloud servers and implement data manipulation technique to protect data from
different country servers to unauthorized access of sensitive information.
Research Methodology:
Research can be defined as ”the way of thinking, examining critically the various aspects of day to day
professional work, understanding and formulating guiding principles that govern a particular
procedure and developing and testing new theories for the enhancement of practice” Kumar (2005,
p.2). Research methodology is necessary in order to execute the research in a proper way. Research
methodology is a kind of tool which is provides help when the research is being carried out and
research design has come in shape and form.
As according to (7) stated “Action research is an iterative process involving researchers and
practitioners acting together on a particular cycle of activities, including problem diagnosis, action
intervention and reflective learning”. Action research has combine theory and practice (involve
practitioners and researchers) through change and reflection in an immediate problematic situation
within mutually acceptable ethical framework. Another definition of action research explains that
researcher use theory with practitioners in complex real life problems, and gets feedback from the
performed experiences. After that modification in theory on the basis of verified results
accomplished from feedbacks.
I will be examine the study in Qualitative Action research strategy method where I as researcher
investigate the customer and end user data in cloud server and whom controlled this data on a
secured manner. Action research strategy is a best strategy for our case because I as a researcher
directly involved along with the practitioner (data storage cloud vendors) and investigate whom
responsible to controlled data resources which are running on the backward of cloud servers.
Research Question:
1. How users made control over data when they are trying to stored and manipulate in the cloud
server?
2. How they ensure data manipulation technique during transformation of data from one server
to another server in a proper jurisdiction way? (Either save or avoid from data loss, leakage,
alteration, modification and fabrication).
Justification:
According to the global survey conducted by IBM suggested that greater than 60 % organizations will
set the plans to settled down all business work load over cloud computing within next five years for
gain business and competitive advantages, shifting all resources into cloud region is a big challenge
for SME (small medium enterprise) from across all the over the world. Meanwhile cloud computing
security is a big challenge [6].
Due to technological advancement in ICT, all computing resources shifting toward over cloud
facilities and dreamt in a future “computing as a utility”. Due to this factor, all sensitive information
will be shared in Cloud servers where nobody knows where informations stored or saved and whom
(domain /country) controlled this data securely. We need to instigate the models/frameworks/ data
manipulation techniques to investigate the factors to protect data from country server boundaries
unauthorized access.
Expected Outcome:
After this research investigation, we will identify that cloud computing as a utility would be beneficial
for organization who can share the sensitive data over internet through cloud technology and whom
controlled the all information that is saved in cloud server from different region of world.
Reference:
[1]Dillon , .T, wu , .C, Chang, .E (2010), cloud computing : Issues and challenges. 24th
IEEE, advanced
information networking and application.
[2](2010), the cloud Enabled Enterprise: Developing a blue print and addressing key challenges.
[3] Shaikh, F., B., Haider, s., (2011), security threads in cloud computing. 6th
IEEE, Internet technology
and secured transaction.
[4] Jain,P. , Rane, D., Patidar,.D, A Survey and Analysis of Cloud Model-Based Security for Computing
Secure Cloud Bursting and Aggregation in Renal Environment.
[5] Popovic, K., Hocenski, Z., cloud computing security issues and challenges, Institute of automate
and process computing.
[6]Khan, .S, Zhang, B., khan, F., chen, S., (2011), business intelligence in the cloud: A Case of Pakistan
IEEE.
[7] Avison, D., Lau, F., Myers, M., Nielsen, .P,X (1999). Action Research.

More Related Content

What's hot

A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & WhereMohammed Sajjad Ali
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...IJERA Editor
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4kongara
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 

What's hot (20)

A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
H046053944
H046053944H046053944
H046053944
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 

Viewers also liked

Managing elasticity across Multi-cloud providers
Managing elasticity across Multi-cloud providersManaging elasticity across Multi-cloud providers
Managing elasticity across Multi-cloud providersFawaz Fernand PARAISO
 
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Dell World
 
Architecting Multi-Cloud Environments
Architecting Multi-Cloud EnvironmentsArchitecting Multi-Cloud Environments
Architecting Multi-Cloud EnvironmentsRightScale
 
Cloud Migration Patterns: A Multi-Cloud Architectural Perspective
Cloud Migration Patterns: A Multi-Cloud Architectural PerspectiveCloud Migration Patterns: A Multi-Cloud Architectural Perspective
Cloud Migration Patterns: A Multi-Cloud Architectural PerspectivePooyan Jamshidi
 
Cloud computing abstract
Cloud computing abstractCloud computing abstract
Cloud computing abstractJagadeesh Kumar
 

Viewers also liked (6)

Managing elasticity across Multi-cloud providers
Managing elasticity across Multi-cloud providersManaging elasticity across Multi-cloud providers
Managing elasticity across Multi-cloud providers
 
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
 
Architecting Multi-Cloud Environments
Architecting Multi-Cloud EnvironmentsArchitecting Multi-Cloud Environments
Architecting Multi-Cloud Environments
 
Multi cloud PaaS
Multi cloud PaaSMulti cloud PaaS
Multi cloud PaaS
 
Cloud Migration Patterns: A Multi-Cloud Architectural Perspective
Cloud Migration Patterns: A Multi-Cloud Architectural PerspectiveCloud Migration Patterns: A Multi-Cloud Architectural Perspective
Cloud Migration Patterns: A Multi-Cloud Architectural Perspective
 
Cloud computing abstract
Cloud computing abstractCloud computing abstract
Cloud computing abstract
 

Similar to Cloud Computing- Proposal (Autosaved)

Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 

Similar to Cloud Computing- Proposal (Autosaved) (20)

Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Reseach paper-mla-sample
Reseach paper-mla-sampleReseach paper-mla-sample
Reseach paper-mla-sample
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
G033030035
G033030035G033030035
G033030035
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
B1802041217
B1802041217B1802041217
B1802041217
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
I42024349
I42024349I42024349
I42024349
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 

Cloud Computing- Proposal (Autosaved)

  • 1. Cloud Computing Security: Issues & challenges in data location Due to technological advancement in web 2.0 technology, the dramatic changes have been occurred on traditional BI (business intelligence) functionality. However scholars and technologist continuously looking solution in the recent invented cloud computing environment where on demand self-service (on air computing resources), Broad network access (utilization of computing resources), Resource pooling (virtualization of computing resources) , Rapid elasticity ( computing resource provisioning ) can be discharged with minimal management effort as well as service provider interaction [1]. Cloud Computing is new paradigm where resources are accessible with the help of cloud at any time and from any place across the globe by using internet without worrying about technical/ Physical management . Another cloud computing is famous with the ‘utility computing’ where IT services can be access on demand. Google App is the best example of cloud computing where we are share and store our data via internet cloud service through browser technology and it can be accessed from any location [3]. IT analyst and industry specialist predict that 80% IT services is being shifted towards cloud computing & it’s sourcing. After that innovation it is confirmed that Cloud computing are not a fake reality and its adoption and acceptance in global industry will be accelerate continuously. Moreover, the cloud computing concept has change the idea about how IT service providers deliver IT services, how IT departments & enterprise source IT within the enterprises provide values to their business [2]. Cloud computing has raised many security issues including securing data, recovery of data and its utilization on the secured way. Therefore due to this hindrance, consumers have serious concerns on cloud computing services about availability of their data when required [3]. Cloud computing has gained many advantages for its adoption but many other disadvantages takes serious security thinking in cloud computing. Loss of physical control of data into cloud is a big disadvantage for security point of view because many service providers are unable to guarantee the location of user’s data on the specific server in a specified location. With this regard, the big chances of losing data or stolen due to server occurrence from outside the country premises where getting more chances of losing data and out of control from the hand of users. Research Problem: When the users use the cloud services and going to host their data in the cloud server, they don’t know where their data will be hosted and who can be protected this data. [4]. as according to [5] stated that physical security is completely lost after replacement of cloud computing where all computing resources shared in a cloud and no one knows about where their resources run on the cloud. Another Arthur explained about Cloud computing security when we use cloud we likely don’t know exactly where our data hosted and which country represented to this data for storage. We first make sure from providers if they are committed to storing and processing data in specific jurisdiction, they make a contractual commitment & agreement to obey the local privacy policies and requirement on the behalf of their customers. Aim and Objective: In this research our first aim is to develop a model and mechanism to control over data resources which has stored in cloud servers and implement data manipulation technique to protect data from different country servers to unauthorized access of sensitive information.
  • 2. Research Methodology: Research can be defined as ”the way of thinking, examining critically the various aspects of day to day professional work, understanding and formulating guiding principles that govern a particular procedure and developing and testing new theories for the enhancement of practice” Kumar (2005, p.2). Research methodology is necessary in order to execute the research in a proper way. Research methodology is a kind of tool which is provides help when the research is being carried out and research design has come in shape and form. As according to (7) stated “Action research is an iterative process involving researchers and practitioners acting together on a particular cycle of activities, including problem diagnosis, action intervention and reflective learning”. Action research has combine theory and practice (involve practitioners and researchers) through change and reflection in an immediate problematic situation within mutually acceptable ethical framework. Another definition of action research explains that researcher use theory with practitioners in complex real life problems, and gets feedback from the performed experiences. After that modification in theory on the basis of verified results accomplished from feedbacks. I will be examine the study in Qualitative Action research strategy method where I as researcher investigate the customer and end user data in cloud server and whom controlled this data on a secured manner. Action research strategy is a best strategy for our case because I as a researcher directly involved along with the practitioner (data storage cloud vendors) and investigate whom responsible to controlled data resources which are running on the backward of cloud servers. Research Question: 1. How users made control over data when they are trying to stored and manipulate in the cloud server? 2. How they ensure data manipulation technique during transformation of data from one server to another server in a proper jurisdiction way? (Either save or avoid from data loss, leakage, alteration, modification and fabrication). Justification: According to the global survey conducted by IBM suggested that greater than 60 % organizations will set the plans to settled down all business work load over cloud computing within next five years for gain business and competitive advantages, shifting all resources into cloud region is a big challenge for SME (small medium enterprise) from across all the over the world. Meanwhile cloud computing security is a big challenge [6]. Due to technological advancement in ICT, all computing resources shifting toward over cloud facilities and dreamt in a future “computing as a utility”. Due to this factor, all sensitive information will be shared in Cloud servers where nobody knows where informations stored or saved and whom (domain /country) controlled this data securely. We need to instigate the models/frameworks/ data manipulation techniques to investigate the factors to protect data from country server boundaries unauthorized access. Expected Outcome:
  • 3. After this research investigation, we will identify that cloud computing as a utility would be beneficial for organization who can share the sensitive data over internet through cloud technology and whom controlled the all information that is saved in cloud server from different region of world. Reference: [1]Dillon , .T, wu , .C, Chang, .E (2010), cloud computing : Issues and challenges. 24th IEEE, advanced information networking and application. [2](2010), the cloud Enabled Enterprise: Developing a blue print and addressing key challenges. [3] Shaikh, F., B., Haider, s., (2011), security threads in cloud computing. 6th IEEE, Internet technology and secured transaction. [4] Jain,P. , Rane, D., Patidar,.D, A Survey and Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Renal Environment. [5] Popovic, K., Hocenski, Z., cloud computing security issues and challenges, Institute of automate and process computing. [6]Khan, .S, Zhang, B., khan, F., chen, S., (2011), business intelligence in the cloud: A Case of Pakistan IEEE. [7] Avison, D., Lau, F., Myers, M., Nielsen, .P,X (1999). Action Research.