R2: What are the predicted future trends for the data security issues?

1

 

Get Your Custom Essay Written From Scratch

We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.

Get Answer Over WhatsApp Order Paper Now

Just from $13/Page

Data Security in Cloud Services

 

 

Submitted by

Sameer Kumar Prajapat

 

 

 

 

A Dissertation Presented in Partial Fulfillment

of the Requirements for the Degree

Doctor of Education/Philosophy in Leadership

with a specialization in _____________

 

 

 

 

Judson University

Elgin, Illinois

Date (of the committee or Dean’s signature)

Abstract

 

The main goal of this research paper is to explore the current state of data security systems in the cloud service industry. The research proposal will also analyze the ability of the current systems to combat the ever-evolving threats in the industry. The dissertation will collect data from literary sources that focus on cloud security systems to learn more. The primary research methodology for the dissertation will be a thematic analysis. The proposal will analyze the data collected through a comprehensive thematic analysis that will group the data into three main categories: the current data security threats, the current security framework & the future data security threats. This knowledge will be used to understand the current state of data security, the expected future threats, and the avenues of evolution necessary to combat the same. The research team will use purposive sampling to ensure that the research is conducted on relevant literary sources. The data sourcing, extraction, and indexing processes will be handled professionally to eliminate bias and preferences. The proposal wishes to arrive at a valid and reliable result that provides a complete overview of the current cloud data security domain. In addition to the thematic analysis, the research study also provides a brief overview of the current literature about the topic through an insightful literature review. The research proposal also provides a brief overview of the limitations and ethical considerations that might affect the dissertation process.

Table of Contents

Chapter 1: Introduction 4

Background 4

Problem Statement and Significance 5

Theoretical Framework 6

Researcher’s Positionality 9

Purpose 10

Research Question(s) 10

Significance 11

Defin ition of Terms 11

Summary 12

Chapter 3: Introduction 13

Statement of the Problem 13

Research Question(s) 13

Research Methodology 14

Research Design 14

Study Population & Sample Selection 15

Data Collection Methods 16

Data Collection Procedures 16

Data Analysis & Procedures 17

Validity & Reliability 18

Ethical Consideration 19

Limitations 19

Summary 20

 

Chapter 1: Introduction

Background

Cloud services have gained a lot of popularity in the current technological era. With the rapid increase in digital adoption, even small and medium organizations are looking to improve their efficiency and revenue through cloud-based services. Rather than a physical on-site server, cloud services are made available via a remote cloud computing system (Zhe et al., 2017). In today’s business environment, cloud service providers can be seen as third-party suppliers who help organizations run critical services through their remote cloud servers. This makes cloud services less costly to operate and maintain in the longer run. It is also one of the main reasons organizations are moving towards cloud-based organizational frameworks. Cloud services also provide several other benefits to both the organizations and the consumers. Therefore, cloud services have gained wide recognition among organizations as a desirable addition to the present IT infrastructure (Zhe et al., 2017).

It is essential to understand that cloud services also have several disadvantages, and these disadvantages limit the widespread use of cloud services and the growth of cloud services within organizations. One of the major problems with cloud services is that it is not secure. As mentioned earlier, cloud services are not run from a cloud computing service that is on-site. Therefore, there are several data security risks associated with cloud services. A typical cloud provider does not hold the necessary access keys (Zhe et al., 2017). If an organization does not have a strong user identity, an attacker will compromise the entire organization. Moreover, there is a very high risk that employees and non-technical workers may be left behind when a cloud service is shut down. Therefore, if a cloud service is being disrupted, security is compromised for many organizations (Zhe et al., 2017).

With the increasing demand for digitization, we can see that cloud services will play a significant part in organizations (Shaikh & Modak, 2017). Therefore, it is critical to ensure that the data security risks associated with cloud services need to be addressed and mitigated efficiently. We can see several cloud service providers work towards improving their security practices through user audits and peer reviews and by addressing data breach mitigation techniques and strategies (Shaikh & Modak, 2017). However, most of them could be considered stop-gap measures and not permanent solutions. Since technology is constantly evolving, the nature of threats for the field is also constantly changing. Therefore, it is crucial to thoroughly understand the security risks and look for ways to enable a sustainable data security solution for cloud services (Shaikh & Modak, 2017).

Problem Statement and Significance

The rapid increase in digitization and the popularity of cloud computing systems have led to most organizations looking at creating a cloud-based operational framework. This combination makes the organizations more susceptible to data security risks (Kumar et al., 2018). The responsibility of mitigating these risks and keeping the organizations’ safe falls on the hands of the third-party cloud suppliers. Therefore, these data security risks impact the end organizations and the third-party cloud suppliers. With the increase in cloud service users, they will find it hard to manage cloud systems and mitigate risks immediately. It is also important to note that the data security risks that threaten cloud services vary. This creates a significant problem for cloud service providers (Kumar et al., 2018).

An evaluation of current and future threats against cloud services is a challenge for cloud providers and companies within the industry. This research proposal will explore the current data security risks and analyze the security systems that third-party cloud suppliers have in place to understand the current cloud service environment comprehensively. This will help create sustainable solutions to combat the data security risks and issues (Kumar et al., 2018). With this understanding, cloud service providers will be able to reduce the financial risks and help with data security issues, protect their customers and help solve the data security issues of their cloud-based data services. Another important goal of the dissertation is to learn about the new data security threats emerging in the cloud service sector. The challenge highlighted will be experienced as more organization moves their data to the cloud, demanding a better management model to counter it. Therefore, the research proposal will be focused on understanding and evaluating both the current and emerging threats that threaten the data security of cloud services (Kumar et al., 2018). To ensure that the dissertation is focused, the same will be centered upon answering three essential research questions mentioned below.

R1: What are the current data security issues and risks that threaten an organization’s cloud services?

R2: What are the predicted future trends for the data security issues in organizations?

R3: How can current cloud data security be made more efficient to facilitate tighter data security in organizations?

Theoretical Framework

Cloud services refer to services provided through remote cloud servers that third-party service providers set up. Cloud services have started to gain prominence because of their ability to increase organizational efficiency at minimal costs. Many cloud services are designed around remote storage, which reduces infrastructure and administration costs (Udendhran, 2017). The cloud market provides several potential cloud services, including file sharing and data management/analysis. These cloud services are highly beneficial for organizations from all sectors because they can scale without the burden of enormous costs. Cloud services also enable organizations to study, manage and analyze large data sets without having their servers or data centers. Data centers are expensive as they have higher operational and service costs when compared to cloud computing systems (Udendhran, 2017).

With the help of cloud services, organizations can manage complex business operations, including business logic, risk management, data recovery, and transaction management. We can also clearly see that some new technological advancements and innovations are helping the cloud computing field proliferate (Udendhran, 2017). While this is beneficial for organizations, this rapid growth also increases data security risks. Data security is an integral part of both enterprise and corporate security. Data security at an organizational level can be mitigated and eliminated with the help of solid encryption technologies or security protocols. However, these systems have little effect on cloud data security as the threats are highly varied (Udendhran, 2017).

Cloud data security has been a cause for concern for many years, and there have been several developments in this regard. Cloud service providers have created various measures to ensure the security of the data. Data protection systems are also deployed and maintained within the cloud and the organizational end by several technologies (Udendhran, 2017). For instance, companies have made it mandatory for IT staff to download and use encryption software before passing on crucial data to users. It is also essential to understand what role machine learning can play in incorporating cloud storage platforms. Since the data security threats are constantly evolving, many cloud service providers have incorporated AI-based systems like machine learning to help manage the security risks through threat analysis. These strategies have helped cloud service systems operate efficiently and mitigate data security threats to a level. This is further evidenced by several research papers on the topic (Udendhran, 2017).

However, many literary papers that have explored the concept have shown that the service providers are reacting to the threats rather than proactively creating security systems. While this has worked till now, the reactive data security systems might not keep data secure in the current business environment where most of the companies have started to use digital and cloud-based systems (Giri & Shakya, 2019). With the increase in customers, cloud service providers might find it challenging to efficiently manage their data privacy policies and security measures. Therefore, it is crucial to thoroughly analyze the current data security threats to create standardized systems that provide sustainable security results. It is also essential to use the analysis to predict future data security threats that might increase data protection and monitoring solutions (Giri & Shakya, 2019).

This research proposal will analyze the cloud data security threats to know what data security threats are growing the most and propose solutions for the service providers to help them address these threats and protect the data better. The proposal will also show how cloud service providers could develop the needed technologies to deal with the security issues that they might face in the future (Giri & Shakya, 2019). The proposal will also propose data security risk models that could help cloud service providers understand emerging threats in the cloud service sector. This will help them better protect against new data security threats and render faster resolutions to mitigate new data security threats. The dissertation will primarily collect literary papers on data security risks/threats and cloud-based systems (Giri & Shakya, 2019).

The research proposal will collect data from academic libraries to understand the cloud data security framework better. The proposal will use document analysis on the literary reviews to gain new insights into the cloud data security framework. The data collected through the document analysis will be further explored through thematic analysis. This thematic analysis will be focused on three main categories: the current data security threats, the current security framework & the future data security threats. Future threats are predicted using shreds of evidence present in the literary papers. In addition to exploring the current cloud data security frameworks, the thematic analysis will help predict new threats. The same can be used as a guideline for creating new data security systems. The researchers will also use textual analysis to help determine where new and emerging threats could come from and the best security strategy for dealing with these issues/risks (Akhil et al., 2017).

Therefore, the focus is to help improve the current data security systems present in the cloud service sector. This thematic analysis will also help researchers and professionals in cloud data security. To ensure that the research is up to date, this thematic analysis will look at the most recent literary works in the field of data protection (Akhil et al., 2017). It will then predict and analyze which elements of these works hold up the current cloud data security framework. This will include, for example, the current security frameworks and the current data protection solutions within that framework. The latter two features will help us understand how the current cloud data security framework is failing compared to the current threats.

Researcher’s Positionality

Cloud computing systems have become a significant part of the society we live in. Hence, it is essential to understand the benefits and challenges present in the same. While researching the topic of cloud computing and its related services, it was clear that data security has become a significant concern for most service providers (Akhil et al., 2017). Even with the development of various technologies and systems to combat security risks and issues, there are still concerns regarding cloud data security. This prompted the researcher to explore the topic in detail. The researcher was also fascinated by the fact that most organizations are moving to digital and cloud-based systems due to the pandemic. Therefore, the impact of a data security breach has become higher in the current society. Thus, the researcher felt that there needs to be an exploration of the future security risks and issues that could threaten cloud service providers (Akhil et al., 2017).

 

 

Purpose

The main goal of the proposal is to explore the efficiency of the current cloud data security systems and understand whether they will handle issues that could arise in the future. The proposal will also provide suggestions and alternatives to improve cloud data security (Kumar et al., 2018).

Research Question(s)

Cloud data security is not an isolated issue that will affect only select organizations. Since most organizations in society are moving towards a digital-only operation, any data security risk will affect a wide range of companies. This is detrimental for the whole society. Therefore, there needs to be extensive research on the data security systems of service providers rendering cloud computing services (Kumar et al., 2018). In this dissertation, the main focus is understanding the current cloud data security scenario and improving the same with the help of extensive research into the field. To ensure that the dissertation is focused, the same will be centered upon answering three essential research questions mentioned below.

R1: What are the current data security issues and risks that threaten an organization’s cloud services?

R2: What are the predicted future trends for the data security issues in organizations?

R3: How can current cloud data security be made more efficient to facilitate tighter data security in organizations?

Significance

As mentioned earlier, a data hack in cloud services would cause significant disruptions in the current society. Data needs to be secured efficiently to ensure that organizations can operate efficiently because of the rapid increase of digitization. Most companies are moving towards a cloud-based infrastructure. With the increasing data flow, security and privacy are of utmost importance. It is considered essential to ensure the security of data and users’ privacy from any attack (Zhe et al., 2017). Therefore, it is crucial to create a data security system capable of handling both current and future data security issues. This dissertation aims to contribute significantly to the field by analyzing the data security issues to find emerging data hacking and security-related trends. The research into the domain is significant to improve the data security frameworks of cloud service providers and enhance them to efficiently mitigate future risks in the domain (Zhe et al., 2017).

 

Definitions

i. Machine Learning – Machine Learning is a type of Artificial Intelligence that uses systems to learn from data, identify patterns, and make decisions with limited human intervention (Zhe et al., 2017).

ii. Cloud Computing – Cloud computing is a computer system resource that uses on-demand data storage and computing power (Zhe et al., 2017).

 

 

Summary

Cloud computing systems have started to gain extensive recognition because of the various benefits it provides organizations from several sectors. Cloud services have become a critical tool for organizational growth and significantly helped several organizations improve their digital frameworks. However, several issues still hinder the implementation and development of cloud services. One of the main issues that cloud service providers face is data security. Data security is a primary concern for cloud service providers and organizations using cloud-based frameworks because the cloud data is located in third-party servers. Even though several cloud service providers are using security systems to enhance data security, the efficiency of the current systems in stopping any future security issues and risks is debatable. This proposal aims to explore the current data security threats faced by cloud service providers and analyze the efficiency of the current data security systems. The proposal will also predict future data security trends with the help of literary sources and propose changes that can be made to the current digital security frameworks based on the same.

 

Chapter 3: Methodology

Introduction

In this methodology section, the researcher will provide an overview of the research methodology and framework used in the study. Therefore, the focus of the study is directed on understanding the data security standards of current cloud networks and checking their ability to handle the ever-evolving threats faced by cloud service providers. The dissertation will also render alternative suggestions for deficiencies in the current cloud security strategies (Kritikos et al., 2017) to study the efficiency of cloud data security. Additionally, the research proposal will identify peer-reviewed literary sources for thematic document analysis. In addition to the research methodology, the section will also explore the data collection methodologies and the validity and ethical consideration for the research.

Statement of the Problem

This proposal will explore both the current data security risks and the future data risks/issues that threaten the current cloud security frameworks. The main goal is to provide a comprehensive understanding of the current cloud service environment and create sustainable solutions to combat data security risks that threaten the field and help reduce companies’ financial and operational risks. The research focus will also include the exploration of future cloud data security frameworks to keep up with the increased complexity of the data management business model.

Research Question(s)

The cloud data security dissertation will answer four core research questions about the field. They are:

R1: What are the current data security issues and risks that threaten cloud service providers?

R2: What are the predicted future trends for the data security issues?

How can current cloud data security be made more efficient to facilitate tighter data security?

Research Methodology

The proposal uses qualitative research methodology, and the design is the qualitative research design to dissect the cloud data security environment through analyzing the risks that may likely occur. The thematic analysis is a research methodology focused on analyzing qualitative data that would be collated from a set of texts, especially literary documents and interview transcripts (Kritikos et al., 2017). The literature review will be conducted on sets of peer-reviewed literary sources that will focus on combating the ever-evolving threats in the industry. The methodology involves identifying and analyzing informative sections from the selected sources. With thematic analysis, researchers can identify common topics, ideologies, and patterns that highlight the data security efficiency of current cloud computing and service systems. The thematic analysis also helps researchers identify the significant data/information security risks that will affect the cloud environment. The research study will use thematic analysis to identify the current data security issues and learn the efficacy of current cloud data security systems. The thematic analysis focuses on identifying and analyzing textual samples based on three major themes, namely current data security threats, cloud security frameworks, and future threats and capabilities. This research study will be able to provide fact-based inferences that can lead to better results through this methodology. (Kritikos et al., 2017).

 

Research Design

The approach to cloud data security research will be conducted where the data collected from the literary sources are subjected to a qualitative research design. The core research framework will be a thematic analysis of peer-reviewed literary sources sourced from authentic public websites. By identifying and synthesizing these sources, it will be easier to identify a significant subset of the topics and ideologies that have impacted the cloud computing security landscape and how these themes will impact cloud security systems (Vaismoradi & Snelgrove, 2019). These core topics will then be analyzed concerning data security requirements, how they relate to the cloud and service infrastructure, and which data security tools will be helpful. Various research instrumentation such as social networking applications, website crawling tools, document-tracking, and mobile data analysis will be used to select the most relevant literary sources. The analysis of the literary sources will help analyze this relevant information and identify specific security trends. The research methodology design will include multiple steps, and each step requires careful selection and validation of the data sources that will be utilized for the document analysis (Vaismoradi & Snelgrove, 2019).

 

Study Population & Sample Selection

This proposal will analyze the efficacy of data security measures in the current cloud computing environment through collecting data from literary sources that focus on cloud security systems. This is because the proposal will analyze the data collected through a comprehensive thematic analysis that will group the data into three main categories: the current data security threats, the current security framework & the future data security threats. Therefore, the dissertation concerns all the sectors dependent on cloud computing and cloud service systems. The proposal mainly concerns cloud service providers, the most vulnerable to cyber security concerns in the current cloud computing environment (Vaismoradi & Snelgrove, 2019).

The research methodology and sample selection will be developed based on research requirements and executed with utmost sincerity. All the research material (including source files) will be acquired from research institutes and commercial libraries. The literary documents for the study will be acquired from relevant and reliable sources. Purposive sampling, a sampling method where researchers can select sources based on their judgment, will be used for selecting literary documents. With purposive sampling, documents with the most relevant subject matter, information sources, or platforms will be sought. In addition, various categories of sources will be included. The document selection will be then performed over three weeks, during which several samples were collected from various sites.

 

Data Collection Methods

The research proposal will primarily use purposive document selection to select the relevant literary sources, making it easier to draw sample generalizations. The sequential document selection will be used in connection with purposive sampling to determine which topics will be the most relevant to the research question at hand.

R1: What are the current data security issues and risks that threaten cloud service providers?

R2: What are the predicted future trends for the data security issues?

How can current cloud data security be made more efficient to facilitate tighter data security?

For this purpose, the peer-reviewed sources (categorized themes) are identified through the information available in the most recent academic publications from the same subjects in cloud data security to arrive at an informed and factual decision. The selection of relevant documents and the study’s goals, strategies, and results will be performed through the data extraction, indexing, or comparison processes (Bunkar & Rai, 2017). These processes will be conducted by the researcher physically.

Data extraction – The selected documents will be analyzed for data related to the themes of cloud data security and data security issues.

Data Indexing – The relevant data will be grouped into themes.

Data Comparison – The data will be analyzed to identify the most prominent issue, the current data security framework, and the avenues for improvement. With the aid of purposive sampling methodology, literary sources with specific characteristics, including topic relevance, data security exploration, and cloud storage, as well as the subject matter themselves, will be systematically selected from the available literature (Bunkar & Rai, 2017).

The complete step-by-step data collection procedure is explored in detail in this section.

i. Research and identification of literary source pools from reputed scholarly sources.

ii. Examination and judgment-based selection of literary documents using purposive sampling with specific criteria (topic/data relevance, depth of exploration, etc.)

iii. Factual information selection and collection using sequential data selection methodology.

iv. Data extraction, categorization & thematic matching using physical identification and interpretation (Bunkar & Rai, 2017).

 

Data Analysis & Procedures

Much like the previous section, this section will explore the data analysis procedures of this study. The core data analysis procedure used in the proposal is the thematic analysis based on categorizing themes to arrive at an informed and factual decision (Powell et al., 2018). The step-by-step exploration of the same is as follows. In the first step, the theme determination using topic and information necessity. The identified literary sources will be studied to identify and infer the relevant themes selected from the sources. The themes will then be categorized into solid and well-defined data sets for future research and analysis (Powell et al., 2018).

The grouped themes will be analyzed to understand the critical research answers for interrelated variables. With the help of the analysis, this study hopes to learn about the current state of the Cloud Security environment and the data security efficacy, deficiencies, and limitations. The focus will also be on identifying future data security risks and the necessary innovations and adaptations required to combat the same.

 

Validity & Reliability

The dissertation seeks to conclude that the current data security procedures require constant monitoring and evolution to combat ever-evolving threats. The lack of comprehensive cloud security frameworks capable of combating new threats regarding data security is also seen as a significant concern (Powell et al., 2018). The validity of the dissertation conclusion about the need for evolution was derived from factual interpretation of the current cloud security frameworks and the information sources that come with them. In addition to the Data that come with the framework, essential factors like the latest technologies that are being developed in that framework and, in fact, for the new data will also be explored in the dissertation. This will add further validity to the research conclusion.

The principal research instruments used in the research are sequential data analysis and thematic analysis on literary sources. The reliability of the research instruments will be verified to ensure that they are sound, and their involvement will be able to resolve some of the issues related to the research. The research content and the data provided for the research are unique to the field and are of high quality. The research on literary sources has a higher chance of providing the same results. This study hopes that the information collection procedure can be replicated. There will be a higher chance of arriving at the exact inference in the “second” round of validation. The primary consideration for the validity of the research is the research methodology. For this reason, the research instrument has to be performed on a real dataset that is selected from peer-reviewed literary sources (Nowell et al., 2017).

 

Ethical Considerations

The document analysis is a research methodology that needs solid ethical behavior from the researchers. The research team can misuse the research instruments and methodology, and the information needs to be monitored for falsification of the data and in the research with an appropriate policy. Ethical behavior needs to be observed from the start when it comes to scientific research in academic areas (Vaismoradi & Snelgrove, 2019). It is not something that can be done quickly. One has to work through the scientific process to obtain the necessary understanding and the appropriate ethical behavior from the researchers. Ethical issues based on data misuse and sampling bias are primary considerations for the dissertation team. Therefore, the team will monitor and review the document selection and thematic analysis procedures to make sound ethical decisions.

 

Limitations

This research on cloud data systems will provide significant insights and the need to evolve data security tools and strategies. However, the research might limit in scope and scale. The research methodology focuses on thematically analyzing the cloud security system based on literary sources. Future research needs to focus on analyzing threats and vulnerabilities based on recent real-life scenarios (Kritikos et al., 2017). This will provide a better understanding of future security threats and present an excellent approach to the researchers and professionals in the cloud data security field. The research is also centered on prevalent security threats. Most generic and popular security threats are covered in literary sources. Therefore, the need to analyze specific threats that are rare will also be an avenue for future research works. This will help data security service providers better understand the field (Kritikos et al., 2017).

 

Summary

The third chapter of the proposal will be focused entirely on exploring the research methodology used. The proposal will use qualitative document analysis and thematic analysis to categorize information collected from peer-reviewed literary sources. The information will then be analyzed using factual interpretations and cross-relation analytics to answer the core research question(s) comprehensively. In addition to the research methodology, the chapter also explores the central data collection methodology. The academic articles will be selected based on specific criteria and topical relevance. The data analysis methodology and the step-by-step procedure were also provided to enhance the researcher’s understanding.

Furthermore, the chapter also provides proof of validity and reliability for the research methodology and the instruments. The limitations of the research and the ethical considerations that were part of the dissertation were also explored to provide a comprehensive overview of the process. The research methodology hopes to conclude that data security systems need significant levels of evolution to combat future security threats and issues.

 

 

References

Akhil, K. M., Kumar, M. P., & Pushpa, B. R. (2017, June). Enhanced cloud data security using the AES algorithm. In 2017 International Conference on Intelligent Computing and Control (I2C2) (pp. 1-5). IEEE.

Bunkar, R. K., & Rai, P. K. (2017). Study on security model in cloud computing. International Journal of Advanced Research in Computer Science8(7), 841.

Giri, S., & Shakya, S. (2019). Cloud computing and data security challenges: A Nepal case. International Journal of Engineering Trends and Technology, 67 (3), 146150.

Kritikos, K., Laurenzi, E., & Hinkelmann, K. (2017, September). Towards business-to-IT alignment in the cloud. In European Conference on Service-Oriented and Cloud Computing (pp. 35-52). Springer, Cham.

Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science125, 691-697.

Nowell, L. S., Norris, J. M., White, D. E., & Moules, N. J. (2017). Thematic analysis: Striving to meet the trustworthiness criteria. International journal of qualitative methods16(1), 1609406917733847.

Powell, C., Miura, K., & Munetomo, M. (2018, July). Optimal cloud resource selection method considering hard and soft constraints and multiple conflicting objectives. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 831-835). IEEE.

Shaikh, R. A., & Modak, M. M. (2017, August). Measuring Data Security for a Cloud Computing Service. In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (pp. 1-5). IEEE.

Udendhran, R. (2017, March). A hybrid approach to enhance data security in cloud storage. In Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing (pp. 1-6).

Vaismoradi, M., & Snelgrove, S. (2019, September). The theme in qualitative content analysis and thematic analysis. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (Vol. 20, No. 3).

Zhe, D., Qinghong, W., Naizheng, S., & Yuhan, Z. (2017, May). Study on data security policy based on cloud storage. In 2017 IEEE 3rd international conference on extensive data security on cloud (significant data security), IEEE international conference on high performance and intelligent computing (hpsc), and IEEE international conference on intelligent data and security (ids) (pp. 145-149). IEEE.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Paper Now