Solution Code :1AABJ
This assignment falls underStatistics and Business Research Methods - Cloud Computing which was successfully solved by the assignment writing experts atMy Assignment Services AUunder assignment help service.
Security issues in cloud computing
The assignment file was solved by professional Cloud Computing experts and academic professionals at My Assignment Services AU. The solution file, as per the marking rubric, is of high quality and 100% original (as reported by Plagiarism). The assignment help was delivered to the student within the 2-3 days to submission.
Looking for a new solution for this exact same question? Our assignment help professionals can help you with that. With a clientele based in top Australian universities, My Assignment Services AU’s assignment writing service is aiding thousands of students to achieve good scores in their academics. OurStatistics and Business Research Methods-Cloud Computingassignment experts are proficient with following the marking rubric and adhering to the referencing style guidelines.
IntroductionCloud computing, also known as Internet computing is normally used to provide combined services such as software, information and shared resources services by using the network. It might be of any one of the type, namely public, community, hybrid or private. Brynjolfsson, Hofmann and Jordan (2010) clearly stated that, cloud computing works mainly through internet resources which has the capability to provide virtualization, reliable source information, Application programming interface and security performance related details to the client or customers. In earlier stages, the application used for these services are reliably slow in their process and are very expensive and too complex to understand and fix the issues which suits to the competitive business world. This leads to lots of problems to the institutions to perform their business applications, particularly, the SME’s are highly affected by these old traditional method. In 2012, IBM introduced a new model, named, ‘Cloud Computing’ which provides better solutions and services to all varieties of business peoples and it provides wider services to individuals too.
Since the cloud computing mainly deals with network, it can handle both hardware and software systems in the databank which in turn provides both applications and services through the internet sources. The service provides will charge for their services as pay per usage. Cloud computing offers three main services, namely,
Remote Hosting,
Remote Infrastructure Provision, and
Remote Data Storage
Cloud computing was classified into three segments, namely, connectivity, storage and application oriented segments. The services of cloud computing is classified as Software as a service (SaaS), Infrastructure as a service (IaaS) and the third and most important service is Platform as a service (PaaS). Durkee (2010) clearly states that, by the invention of new technologies, the cost incurred for business development is considerably reduced along with delivery time and content storage
Literature view
According to Rajani Sharma (2014), Cloud computing seems to be have rapid growth in the IT sector and tends to increase rapidly and it become population within a short period of time. Now days, all business sectors tend to use cloud computing as their basic step for their organization growth and also determine the exact area of threat related to cloud computing.
Just like other new inventions, cloud computing is also affected by security threats and data privacy threats which needs to be addressed at the earliest on real-time. The most common security issues found in cloud computing is loss of data, data theft, privacy concern, and frequent interruption of data in the transmission process. Therefore, more security systems should be implemented to address these threats. These threats should be addressed at the earliest by implementing appropriate security techniques which lead to prevent any kind of security threats and thus prevents the data and devices affected permanently in cloud.
This research helps to gain more information about the security issues that impact the growth of cloud computing and various steps that needs to be taken to address these issues.
Research question/ research hypothesis
This research intends to answer the following questions
Object of research
Research design
According to Baskerville and Wood-Harper (1996) a research design is normally used to describe the work flow or work structure of the study, such as, data collection strategy, methods and procedures of analyzing the data. It is just like a blue price of the researcher work structure
Data collection method
In research design, the two most common research approach used is qualitative research and quantitative research. Qualitative research is defined as a multi method research in which both it takes into account of both interpretive and naturalistic approach (Burman, 1997). On the hand, Quantitative research is a kind of descriptive statistics form in which the researcher gather the information related to behavior of consumer over the market condition (Bryman, 1984).
This study is a qualitative study, as the researcher is keen interested in gathering of information either through interview, respondents personal experience, and detailed information about the objective of the study. The target population is 120 respondents by providing open ended questionnaires at the place of their work
Data analysis
Age structure of the respondent:
Respondents age vary from 16 years to 50 years. About 68.4% respondents are in the age group of 18 to 34 years
Gender:
Nearly four – fifth of the respondent participated in this study are male respondents. That is, 83.3% of the respondents are male respondents and 16.7% of them were females
Respondents Work Experience
Nearly 32.5% of the respondents participated in this study are Junior Employees and 39.2% of the respondents participated in this study are senior employees
Chi – Square test for Independence:
Test – 1
Test – 2
Nearly 34.4% of the respondents who said that their organization has been offering cloud related services for over 10 years feel that they must keep very high confidentiality over public related for future cloud computing solutions to be free from security related threats. 44.4% of the respondents who said that their organization has been offering cloud related services between 6 years to 10 years feel that tight security checks for critical and high valued data should be initialized for future cloud computing solutions to be free from security related threats (Chi – Square test statistic = 22.244, p – value = 0.035 < 0.05)
Test – 3
Nearly 88.7% of the respondents who are very satisfied with the overall security of cloud computing based services feel that they must keep very high confidentiality over public related for future cloud computing solutions to be free from security related threats. 82.1% of the respondents who said that the overall security of cloud computing based services has improved a lot feel that tight security checks for critical and high valued data should be initialized for future cloud computing solutions to be free from security related threats (Chi – Square test statistic = 323.272, p – value = 0.000 < 0.05)
Mann Whitney U test
Test – 4
The respondents who feel that off late security related issues have decreased in cloud computing based services think that overall security of cloud computing based services be improved to a good extent (Z test statistic = - 3.136, p – value = 0.002 < 0.05)
Results
This Statistics and Business Research Methods-Cloud Computing assignment sample was powered by the assignment writing experts of My Assignment Services AU. You can free download thisStatistics and Business Research Methods-Cloud Computing assessment answer for reference. This solved Computer Scienceassignmentis only for reference purpose and not to be submitted to your university. For a fresh solution to this question, fill the form here and get our professional assignment help.
Trending now
The Student Corner
Subscribe to get updates, offers and assignment tips right in your inbox.
Popular Solutions
Popular Solutions
Request Callback
Doing your Assignment with our resources is simple, take Expert assistance to ensure HD Grades. Here you Go....