ITC 571 Annotated Bibliography Oz Assignments

ITC 571 Annotated Bibliography Oz Assignments

ITC 571 Annotated Bibliography Oz Assignments

Introduction

Cloud computing refers to the utilization of networks which are connected to remote servers where the data is stored on theonline platform. This technology is helpful in themanagement of data through a universal network instead of using local networks. It is an emerging computing paradigm where it provides on demand services relating to data access through the use of cloud computing networks. There are several benefits associated with the use of cloud computing such as it fulfils on demand requirements, less maintenance, provides distributed storage of services. Apart from the benefits of cloud computing, there are certain disadvantages which are involved with theuse of cloud computing. This involves maintenance of internal database management  in cloud computing because there are many data security issues involved with the use of cloud computing systems. Hence this literature review is relating to the identification of security issues associated with the use of cloud computing. Further,this literature review is about discovering about the tools and technologies which are beneficial in protecting the cloud computing data. This literature review is helpful in strengthening the compliance of cloud computing with a view to reducing the risk of data security in cloud computing.

2. Literature Review on Internal Data security auditing to strengthen compliance in cloud computing

2.1 Field of this research

This field of research is relating to focusing on the methods and processes which are helpful in maintaining internal data security in cloud computing. This literature review is to be conducted through implementing literature review where the main focus ofthis literature reviewis on data security methods by previous authors. This literature review is to be organised through various information gathering techniqueswhich include acollection of information on the basis of available literature. The main field of this literature review is to cover various aspects which are relating to cloud computing. This literature review is covering various issues which are related to data security in cloud computing and further this literature review is focusing on the measures which impact internal data security in cloud computing. This literature review will be organized through acollection of various literature relating to cloud computing data security issues and solutions.

2.2 Reviews

2.2.1 Data driven usage control in cloud computing

Research

Application of cloud technologies results as increasing the issues with data security and compliance requirements. Cloud computing systems involve thetransparent distribution of data which does not limit the data control in cloud computing. This directly results in causing threats to data security in cloud computing(Wuchner, et. al., 2013)

Contribution of this work

This literature review is helpful in resolving the purpose of the study relating to maintaining internal data security in cloud computing(Wuchner, et. al., 2013).

Limitations

There are limitations in the approaches which are used for cloud computing relating to involving data drive usage control such as it is required to establish updated policies and standards for limiting the data driven usage control in cloud computing(Wuchner, et. al., 2013).

Relevance

This solution is beneficial in evaluating the flow of data access in cloud computing at regular intervals so effective control can be established by data usage in cloud computing. This solution is helpful in restricting data access in cloud computing systems(Wuchner, et. al., 2013).

2.2.2 Data security issues and solutions in cloud computing

Issues

Further,in the words of Shariati & Ahmadzadegan (2015), there are various challenges which are involved with theuse of cloud computing such as therisk of data leakage, data availability, compliance issues, and data recovery issues. Cloud computing has resulted in increasing the feasibility and convenience of cloud computing users through providing access facilities to them. In this concern apart from increasing the feasibility and convenience, there are several data security issues associated with the use of cloud computing data such as data loss, data leakage, malicious insiders, loss of control, invalid storage of data and other such data protection issues. All these issues cause risk to data security in cloud computing.

Solutions

There must be theimplementation of effective principles which are beneficial in providing compliance standards in relation to data security issues in cloud computing. It is essential to maintain cloud computing in an appropriate manner so that it is able to store data on remote servers. Hence for maintaining data security in cloud computing, there must be theimplementation of effective security principles which are resulting as protecting the data which is stored in thecloud.

2.2.3 Data security issues and solutions in cloud computing

Issues

Further according to Arjun & Vinay (2016), cloud computing is a paradigm which focuses on providing data access facilities all the time. It provides on demand data access facilities on a nominal charge. This literature review is relating to theidentification of data security issues involved with cloud computing. There are three types of data security issues in cloud computing which are data confidentiality issues, data integrity issues, and data availability issues. These issues are causing athreat to internal data security in cloud computing. Cloud contains all the data which is relating to an organization hence it also contains the sensitive information which is related to the strategies of such organization. This information is required to be kept confidential but if such information is stored in thecloud and further if such data is accessed by any unintended user in cloud computing then this could reflect to leaking the sensitive information of organizations to unauthorized users.

Solutions

For maintaining data security in cloud computing there must be effective security measures implemented in cloud computing so that the data which is maintained in thecloud must be protected from unintended users or from any other person who is not authorized to access such data. In this concern, encryption is the best measure that can be implemented within cloud computing for theprotection of cloud computing data. Encryption is helpful in ensuring the confidentiality of data as well as in maintaining the consistency of data in cloud computing. This literature review is valuable in resolving the main purpose of the research through application of encryption in cloud computing systems (Arjun & Vinay, 2016).

2.2.4 Cloud server provisioning environment in cloud computing

Research

Cloud security is an important part of service management process it also plays a major role in thegovernance of IT compliances which are required to be fulfilled while handling cloud based solutions. There are certain systems such as validation of configuration and security compliances which are helpful in preventing security risks and such other security vulnerabilities in cloud computing data (Chieu, et. al., 2012).

Contribution

This solution is helpful in resolving cloud computing security issues through creating a cloud server positioning environment. This system is beneficial in maintaining data security in thecloud through enabling aself-service environment for accepting cloud computing requests. This system is helpful in contributing its efforts towards boosting the data security and compliances in cloud computing through enabling the cloud users to make a request for accessing to cloud computing data (Chieu, et. al., 2012).

Limitations

This literature review involves consuming a lot of time in defining the criteria which are required to identifying secured requests (Chieu, et. al., 2012).

Relevance

Through this system, effective strategies will be implemented to accept only those requests where users are authorized to access cloud computing data. This system is helpful in maintaining internal data security through accepting only secured request where users are authorized to access cloud computing systems. This system is valuable in protecting the data in cloud computing systems and strengthens the cloud computing compliances (Chieu, et. al., 2012).

2.2.5 Cloud adoption methodology in cloud computing

Research

Cloud computing involves storing of data over a uniform platform where users are provided with the access facilities to such cloud computing data. It enables users to access to data anywhere and at any time hence cloud computing is resulting in increasing the feasibility of the cloud computing users through providing them access facilities as per their convenience (Pant and Parappa, 2013).

Contribution of this work

This literature review is beneficial in contributing its efforts towards maintaining data security in cloud computing (Pant and Parappa, 2013).

Limitations

In this concern, this increases the risk to data security in cloud computing as it allows all cloud computing users to access to cloud computing data. In this regard, it is required to restructure the requirements of information technology where required measures can be taken for relevant security standards in cloud computing (Pant and Parappa, 2013).

Relevance

This literature review is relating to evolving cloud adoption technology which includes restructuring the IT requirements of cloud computing. Through such model, it is beneficial in securing the data which is stored in cloud computing systems. Hence it can be seen that restricting the requirements of IT in relation to implementing secured standards in cloud computing is helpful in maintaining internal data security in cloud computing (Pant and Parappa, 2013).

2.2.6 Roles and responsibilities of stakeholders in cloud computing

Research

According to Kandira, et. al. (2013), Cloud computing security can be maintained through defining the roles and responsibilities of stakeholders towards maintaining the data security in cloud computing systems.

Contribution of this work

Through this model, the roles and responsibilities of stakeholders in cloud computing are required to be analysed. Further, they are required to assign their duties in relation to thefulfilment of compliance standards to protect the data in cloud computing systems (Kandira, et. al., 2013).

Limitations

This system involved reviewing the current roles and responsibilities of stakeholders and then identifying measures which are required to be implemented in cloud computing systems for data protection and security (Kandira, et. al., 2013).

Relevance

Hence this system is also beneficial in fulfilling the purpose related to protection of data security and compliance in cloud computing systems (Kandira, et. al., 2013).

2.3 First current best solution

The first best current solution in maintaining internal data security in cloud computing is to establish automatic security compliance check. This solution is helpful in automatically checking the identity of the users to access cloud computing data. Implementing automatic security compliance check involves identification of the set of requirements of an organization and further, it involves implementing the security measures on the basis of requirements of the organization. This system involved monitoring of such systems on acontinuous basis. This solution involves implementing an automatic security compliance check in cloud computing data so that it could prevent unauthorized access to cloud computing data. This system will work as ensuring the security of cloud through allowing authorized users to access to cloud computing data. This system is helpful in improving the convenience and maintaining the compliance standards in cloud computing. Through effective implementation of security standards in automatic security compliance check data security in cloud computing can be ensured and compliances in cloud computing can be strengthened. Automatic security compliance check is helpful in contributing towards maintaining data security in cloud computing. This solution is beneficial in conducting a security check on each and every user who accesses to cloud computing data and further this will prevent all type of unauthorized access to cloud computing systems. Various other security standards can also be established in automatic security compliance check for increasing the effectiveness and efficiency of cloud computing network security and compliances.

ITC 571 annotated bibliography

There are various limitations which are involved with the use of automatic security compliance check such as it requires formulation of aset of external requirements, lack of guidance for implementing standards, ensuring security and integrity of data in cloud computing. These limitations can be overcome through establishing effective standards and policies in cloud computing. Limitations of automatic security compliance check involve theformulation of aset of external requirements as thedevelopment of policies for automatic security compliance check depends upon the requirements of organizations. There is alack of guidance for implementing standards in automatic security compliance check as these standards vary on the basis of need of security policies of any organization.

Conclusion

Cloud computing is a business computing model which is helpful in fulfilling all type of data related requirements of an organization. It enables data access facilities through remote servers which allow all authorized users to access to cloud computing systems. Cloud computing is beneficial accessing to data anytime and anywhere. In relation to thepromotion of cloud computing services one of the major issues which are faced is data security in cloud computing. This literature review has been conducted with a view to identifying various types of data security issues associated with cloud computing. In this concern, data has been collected from various literature which is describing the types of data security issues in cloud computing. The main aim of this literature review is to strengthen the compliance and internal data security in cloud computing so that it is able to safeguard the stored information in cloud computing. This literature review has identified various measures that are useful in maintaining internal data security and auditing in cloud computing. This literature review is useful in focusing on various technologies which aim at thedevelopment of models and measures that can strengthen compliances in cloud computing. Further on the basis of all the measures a current best solution has been selected which is helpful in fulfilling the data security requirements in cloud computing.

References

1. Arjun, U., & Vinay, S. (2016). A short review on data security and privacy issues in cloud computing. In Current Trends in Advanced Computing (ICCTAC), IEEE.pp. 1-5.
2. Chieu, T. C., Singh, M., Tang, C., Viswanathan, M., & Gupta, A. (2012). Automation system for validation of configuration and security compliance in managed cloud services. IEEE. pp. 285-291.
3. Kandira, M., Mtsweni, J., & Padayachee, K. (2013). Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities. IEEE  pp. 653-658.
4. Pant, N. and Parappa, S., (2013). Seeding the cloud in a secured way: Cloud adoption and security compliance assessment methodologies. IEEE. pp. 305-308.
5. Shariati, S. M., & Ahmadzadegan, M. H. (2015). Challenges and security issues in cloud computing from two perspectives: Data and information security and privacy protection. In Knowledge-Based Engineering and Innovation (KBEI), IEEE. pp. 1078-1082.
7. Ullah, K. W., Ahmed, A. S., & Ylitalo, J. (2013). Towards building an automated security compliance tool for the cloud. IEEE. pp. 1587-1593.
8. Wuchner, T., Muller, S., & Fischer, R. (2013). Compliance-preserving cloud storage federation based on data-driven usage control. IEEE. Vol. 2, pp. 285-288.