PhD TIM-Formulate A Cloud Security Problem Statement – Availability Ends
- Aljafer, H., Malik, Z., Alodib, M., & Rezqui, A. (2014). An experimental evaluation of data donfidentiality measures on the cloud. Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems (pp. 117-124). New York, NY: ACM.http://proxy1.ncu.edu/
login?url=http://search. ebscohost.com/login.aspx? direct=true&db=edb&AN= 101490036&site=eds-live - Shukhman, A., Polezhaev, P., Ushakov, Y., Legashev, L., Toarasov, V., & Bakhareva, N. (2015). Development of network security tools for enterprise software-defined networks. Proceedings of the 8th International Conference on Security of Information and Networks (pp. 224-228). New York, NY: ACM.
http://dx.doi.org.proxy1.ncu.
- Roy, A., Sarkar, S., Ganesan, R., & Goel, G. (2015). Secure the Cloud: From the Perspective of a Service-Oriented Organization. ACM Computing Surveys (CSUR), 47(3), Article 41, pp.1-30
http://dx.doi.org.proxy1.ncu.
- Noor, T. H., Sheng, Q. Z., Zeadally, S., & Yu, J. (2013). Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Surveys (CSUR), 46(1), Article 12, pp. 1-30.
http://dx.doi.org.proxy1.ncu.
Read and critically analyze the week’s assigned readings related to the challenges and issues that exist within the energy efficiency space. Select a technical challenge, issue, consideration, or other topic from this week’s readings—or from last week’s research—that is an open research question that requires additional research to address. Write a problem statement in which you address the items below.
- What is the problem that should be addressed with additional research (i.e., what is going wrong)? Support the existence of the problem with references to recent scholarly literature.
- What is the impact of the problem? That is, how are the victims (field of study, researchers, practitioners, industry, civilians, etc.) negatively affected by the problem,when is the problem evident, and where does the issue exist or become obvious? Provide an example of the problem in action or as experienced by those affected by it. Support the impact of the problem with references to recent scholarly literature.
- Why does the problem exist? Discuss the conceptual basis, the nature of the problem, and outline of the problem as defined by the literature. Support underlying cause of the problem with references to recent scholarly literature.
References: Support your paper with at least 10 total scholarly references.
Length: 5-7 pages not including title and reference pages
Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards
Solution Preview
Introduction
Cloud computing is one of the widely integrated technologies today based on its capacity to reduce costs associated with computing while enhancing scalability and flexibility of the computer processes (Roy et al. 2015). As such, cloud computing has grown from a promising technology to one that is highly adopted by the fast-growing sector in the IT industry. Considerably, cloud computing is an architectural movement that presents new ways to deploy and manage applications. Its significance is underlined by its capacity to support business-critical applications, an aspect that is behind its extensive integration in the business environment (Ahuja & Mani, 2013). Despite this, organizations have expressed concerns regarding the integration of this technology such as security concerns which is widely debated (Roy et al. 2015).
(1,763 words)