ITC 571 Project Research Proposal and Plan Proof Reading Services

ITC 571 Project Research Proposal and Plan Assignment help

ITC 571 Project Research Proposal and Plan Proof Reading Services

Introduction

Cloud computing is related to sharing of computer processing resources with the use of theinternet. Cloud computing enables data access facilities to all cloud computing users Hence cloud computing is an effective measure to reduce thetime and cost through providing data access facilities to its users anytime and anywhere. With the rapid increase in the use of cloud computing, the number of data security issues that are related to cloud computing is also increasing (Wilson, 2016). There are various kinds of risks that are related to data security which is involved in the use of cloud computing. In this concern, effective measures are required to be adopted for maintaining internal data security in cloud computing.

Problem statement           

There are various issues that are involved with safeguarding internal data security in cloud computing and for this current measures and techniques that are used for this are not efficient enough to strengthen data security. Security is a major concern which is related to data maintaining security in cloud computing and due to such security issues, it very risks to store data in cloud computing (Raisian, & Yahaya, 2016). Hence this study is to be conducted with a view to discovering various new technologies and solutions that are helpful in maintaining internal data security.

Significance of the study

This study is beneficial in theidentification of various techniques and such effective measures that can be implemented in cloud computing systems for maintaining data security. This study is useful in reducing the data security risks in cloud computing. This study will safeguard the interest of cloud computing users through providing them surety for maintenance of their data safely in cloud computing (Adamuthe, et. al., 2015). This study is significant in strengthening the compliance standards in cloud computing so that data security in cloud computing can be ensured. This study is beneficial in assessing the impact of data security on cloud computing users and finding measures for reducing the risk of users related to storing their data on cloud computing.

Aims and objective of the study

The main aim of this study is to identify the result of internal data security auditing over the cloud computing compliance on cloud computing users.

The main objectives of this study are

  • To identify data security issues that are associated with cloud computing.
  • To discover various compliance standards related to internal data security in cloud computing(Adamuthe, et. al., 2015).
  • To identify measures and solutions for maintaining internal data security in cloud computing.

Current stage of the research

Currently, this research is in its planning stage where research report will be implemented when once the research proposal gets accepted.

Research questions

Research questions for this research are

  1. Why is it mandatory to strengthen cloud computing compliance?
  2. What are the measures and solutions that can be adopted for maintaining internal data security in cloud computing? (Raisian, & Yahaya, 2016)
  3. What are the requirements of conducting internal data management auditing?
  4. What is the impact of maintenance of internal data security on cloud computing users?
  5. How is internal data security able to strengthen the compliances in cloud computing?

Factors affecting the research

There are several factors that will be affecting the research which is as follows.

Time involved: Research is to be completed within specified time and for this, a project plan and Gantt will be prepared. This will help in completing all the activities of the research on time. With the help of this, research can be completed timely.

Tools and techniques: According to Rajasekar&Manigandan (2015),there are certain tools and techniques that are required to complete this research hence all such tools that will be required for this research will be arranged before starting the research. This will not hinder the ongoing process of research.

Cost: Research is required to be completed within estimated cost so for this resources for the research will be acquired within estimated cost. This will be helpful in conducting a reasonable research (Johnston, 2014).

Sources of data collection:Conclusions of this research are depending upon the analysis of collected this hence data for this research needs to be collected through authenticating and reliable sources so it is able to fulfil the purpose of the research (Adamuthe, et. al., 2015).

Methodology

General design

This study is to be carried for with the purpose to safeguard the interest of cloud computing users. This study is helpful in understanding the importance of data security in cloud computing. This study is beneficial in theidentification of various latest technologies and innovations that are used by other organizations for effective data security in cloud computing. This research also involves thecollection of data through secondary sources (Adamuthe, et. al., 2015). As a part of this research, it is required to investigate about major data security issues as well as finding asolution for reducing such issues. Through this interest of cloud computing users can be safeguarded and they will be able to store their data in cloud computing without any risk.

Data collection methods and approaches

This research includes acollection of data relating to data security issues, their solutions and their measures for strengthening internal data security in cloud computing. For this research data will be collected through secondary sources including journals, articles, published official statistics, the internet and other such published resources (Castellan, 2010). For collection of secondary data there are certain factors that need to be considered such as data is to be collected from authenticating and reliable source, data that is collected must be able to fulfill the purpose of research and data for the research must be able to achieve adequate level of accuracy so that it could be used to solve the main objectives of the research.In the opinion of Driscoll (2011),data for this research will be conducted using qualitative as well as thequantitative approach of data collection as both these approaches are useful for fulfilling the main purpose of this research.

Methods of analysis of data

It shows that methods and modes through which data will be analyzed and presented in a meaningful form so that it is able to solve the purpose of the researchJohnston (2014). In this research data will be presented in the form of tables, charts, graphs and such other methods. This will be helpful in organizing and summarizing the data in a meaningful form so that it is able to fulfill the purpose of the research methods. Conclusions for the research will be drawn upon on the basis of analysis of collected data (Castellan, 2010).  

Project plan

Project plan for this research is as follows.

ITC 571 Research Proposal

Gantt chart for the above action plan is as follows (Rajasekar&Manigandan, 2015).

itc 571

Expected outcomes

The expected outcomes of this research are proposing new methods and measures that can be implemented for maintaining internal data security in cloud computing. The process for this research also focuses on various data security issues that are related to cloud computing so these corrective measures can be taken for resolving such issues accordingly (Wilson, 2016). Further, this research will also identify the importance of internal data security in cloud computing. This research will be helpful in implementing such tools and technologies in cloud computing which are helpful in safeguarding the interest of cloud computing users. This research will provide all such measures that will ensure thesecurity of data in cloud computing. The factors that are involved in this research mainly focuses on the benefits of data security and compliance standards in cloud computing (Adamuthe, et. al., 2015).

Ethical considerations

This research will be conducted all the ethical considerations that are related to it. The data that will be collected for this research will be collected from authenticating and reliable sources so that accurate data for the research can be collected. Best measures will be taken into account for maintaining confidentiality and privacy of data (Johnston, 2014). This study will be based on honesty and fulfillment of social responsibility and the reason for conducting this research is purely ethical. Relevant permissions for thecollection of data will be obtained and research will be conducted with bonafide purpose.

Hypothetical models for the research

Model 1

ITC 571 Assignment Help

Model 2

ITC 501

Model 3

ITC 571 assignment help

Model 4

ITC 571 Assignment Help

Above mentioned hypothetical models describes the relationship between the variables that are helpful in maintaining internal data and information security in cloud computing. These models represent the measures that are useful in strengthening compliance standards in cloud computing(Wilson, 2016).

References

ITC 571 Assignment Help

Appendices

Work evaluation table: 

Appendices