Site Loader
Rock Street, San Francisco

1. Research Problem

a. Research Subject

Question: Write this subject name as the rubric of your assignment.

B. Gap in Literature

Question: Identify the spread that your specific research is covering with. Write it out in two sentences.

The literature studied has highlighted security and privateness as the chief challenges associated with Cloud Computing ; nevertheless, there is still a spread in the literature studied in supplying a security theoretical account to the security and privateness job identified. This research seeks to specify a security theoretical account upon which the industry can implement cloud security.

c. Supporting Literature

Question: Supply literature to back up your claim that this spread is deserving researching.

Cloud Computing is emerging as a new calculating engineering in the field of high public presentation and distributed calculating. Many research workers have proposed definitions for the term cloud calculating. Buyya, Yeo and Venugopal ( 2008 ) specify a cloud as a type of analogue and distributed system dwelling of a aggregation of interrelated and virtualised computing machines that are dynamically provisioned and presented as one or more incorporate computer science resources based on service-level understandings established through dialogue between the service supplier and consumers.

Harmonizing to other research workers, clouds are a big pool of easy useable and accessible virtualised resources such as hardware, development platforms and / or services ) which can be dynamically configured to set to a variable burden, leting for optimal resource use. This pool of resources is exploited on a pay-per-use theoretical account in which warrants are offered by the Service Provider by agencies of customised Service Level Agreements ( SLA ) , ( Vaquero, Rodero-Merino, Caceres and Lindner, 2008 ) .

Research has determined that cloud computer science is a promising engineering which promises to present many benefits and doing a displacement in the current perceptual experience and usage forms of calculating ; nevertheless, security and privateness ever surface and are cited as major barriers forestalling widespread acceptance of the engineering, ( Li, Sedayao, Hahn-Steichen, Jimison, Spence, and Chahal, 2009 ) . This has resulted in industry experts and corporates to press authoritiess to turn to the issue of cloud security and privateness, ( Smith 2010 ) .

Kaufman, ( 2009 ) , examines security issues and associated regulative and legal concerns that have arisen as cloud calculating emerges as a primary distributed calculating platform, reasoning that with cloud computer science, users are universally required to accept the implicit in premiss of trust. With cloud calculating use on the addition, cloud security criterions and constructs including trust and privateness must be clearly defined and adopted by the industry every bit good as the bidirectional functions and duties for both the users and service suppliers, ( Bret, 2009 ; Gu and Chueng, 2009 ) . Despite the inroads that have been made in the acceptance of cloud calculating most administrations are still skeptic about join forcesing with service suppliers and trust among the spouses is indispensable to the effectivity of cloud computer science, ( Mello, Wangham, Fraga and Rabelo, 2008 ) .

Gu, et al. , ( 2009 ) , conclude that though many research jobs can follow back to earlier plants in related countries, few bing techniques can supply complete and efficient solutions suited for cloud computer science, hence, given the importance and potency, fresh designs and techniques for cloud computer science will develop in the old ages to come. Prior research has determined that clouds do non hold a clear and complete definition in literature, a spread that will assist future research and geographic expedition of new and possible use of clouds every bit good as security protocols and criterions so that users can widely follow this engineering, ( Vaquero, et al. , 2008 ) .

Another barrier to the to the acceptance of is the deficiency of authorities policies and Torahs which will label along with the industry security criterions and protocols so that proper controls can be established by assorted service suppliers, therefore future research can research how current informations and privateness Torahs can be adopted or modified to provide for cloud security, ( Motahari-Nezhad, Stephenson and Singhal, 2008 ) .

2. Research Problem

Question: Articulate the subject of research that you have identified in ( a ) above in a comprehensive research job ( at least 15 lines long excepting the mentions ) .

Cloud Computing is emerging as a new calculating engineering in the field of high public presentation and distributed calculating which has gained impulse in the IT universe with many administrations following the clouds, ( Motahari-Nezhad, et al. , 2008 ) .

Cloud computer science has its foundation in several Fieldss including, grid computer science, distributed computer science, web services and service orientated architecture every bit good as public-service corporation computer science, where calculating services are provided on demand as if it were a public-service corporation such as electricity, ( Weiss, 2007 ; Vaquero, et al. , 2009 ) .

Prior research has determined that clouds do non hold a clear and complete definition in literature, a spread that will assist future research and geographic expedition of new and possible use of clouds every bit good as security protocols and criterions so that users can widely follow this engineering, ( Vaquero, et al. , 2009 ) . With cloud calculating use on the addition, cloud security criterions and constructs including trust and privateness must be clearly defined and adopted by the industry every bit good as the bidirectional functions and duties for both the users and service suppliers, ( Michael, 2009 ; Gu, et al. , 2009 ) . Cloud security must be addressed otherwise the user credence of this engineering will be limited.

3. Research Theory / Theories

Question: What theory/theories are these academic research workers utilizing to back up the claims being made in your research infinite? Explain ( briefly ) each of these theory or theories.

The literature studied points to Service Oriented Architecture ( SOA ) , on-demand computer science and Utility Computing as theories upon which cloud computer science is built / draws its features from.

Cloud computer science is a comparatively new construct in calculating which derives from cloud computer science, public-service corporation computer science, virtualisation and abstraction. Research workers on grid calculating have determined that in grid calculating resource composing is a two measure procedure. First, it is necessary to execute resource find, the designation of Grid resources that are available for usage. Resources are listed in an accessible grid directory service or a default list can be provided by the user and so the proper resources need to be selected based on the application processing/data demands and extra external restraints such as fiscal cost or executing deadline, Ranjan, Harwood and Buyya ( 2007 ) . This theoretical account is built on the Research dependence theory.

Research workers on the research dependence theory propose that histrions missing in indispensable resources will seek to set up relationships with others in order to obtain needful resources and administrations attempt to change their dependance relationships by understating their ain dependance or by increasing the dependance of other administrations on them, hence within this position, administrations are viewed as alliances alarming their construction and forms of behavior to get and keep needful external resources, ( Akbari H ) .

4. Research Procedure

This subdivision of the papers highlights the procedures that were used in the research

a. Question 1 a

The undermentioned hunt strings were used to acquire an apprehension and definition of cloud computer science. The hunt procedure was guided by the fact that I was seeking for an apprehension of the Cloud Computing field and the related constructs.

Search Stringing

Search Engine / URL

Cloud Computing

Define: Cloud Calculating

Google

www.ibm.com/grid

Cloud calculating

Google Scholar

“ cloud computer science and security ”

Google Scholar

Cloud Security

Google – www.google.com

AltaVista – www.altavista.com

Cloud calculating definition

www.metacrawler.com

B. Question 1 Bacillus

Search Stringing

Search Engine / URL

A§ Cloud Security

A§ “ Cloud Security ”

A§ Cloud Computing

A§ “ Cloud Computing and Security ”

Google Scholar

Cloud calculating

A§ EBSCO HOST

A§ ISI Web of Science

A§ Science Direct

A§ Information Systems Research Journal

A§ Communications of the ACM

A§ WITS E Journal Portal

A§ hypertext transfer protocol: //web.wits.ac.za/Library/ResearchResources/EJournalPortal.htm

URL ‘s

A§ hypertext transfer protocol: //www.buyya.com/papers/hpcc2008_keynote_cloudcomputing.pdf

A§ hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/xpl/tocresult.jsp? asf_arn=null & A ; asf_iid=5189548 & A ; asf_pun=null & A ; asf_in=null & A ; asf_rpp=null & A ; asf_iv=null & A ; asf_sp=null & A ; asf_pn=2

A§ hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/xpl/tocresult.jsp? asf_arn=null & A ; asf_iid=5189548 & A ; asf_pun=null & A ; asf_in=null & A ; asf_rpp=null & A ; asf_iv=null & A ; asf_sp=null & A ; asf_pn=2

A§ hypertext transfer protocol: //download.intel.com/it/pdf/320566.pdf

A§ hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/search/searchresult.jsp? newsearch=true & A ; queryText=In+Clouds+Shall+We+Trust % 3F & A ; x=15 & A ; y=12 & A ; filter= & A ; tag=1

A§ hypertext transfer protocol: //0-web.ebscohost.com.innopac.wits.ac.za/ehost/pdf? vid=1 & A ; hid=6 & A ; sid=2c7a115c-c342-482d-aaa3-550f18a87e7b % 40sessionmgr14

A§ hypertext transfer protocol: //www.hpl.hp.com/techreports/2009/HPL-2009-23.html,

A§ hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/citation.cfm? id=1327512.1327513 & A ; coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628

I searched for academic articles on the cyberspace utilizing Google Scholar and the associated hunt strings as highlighted in the tabular array above. For diaries and articles that were non found on the cyberspace, I used the unseeable web through the WITS Library databases.

c. Question 1 C

I searched for academic articles on the cyberspace utilizing Google Scholar and the associated hunt strings as highlighted in the tabular array below. For diaries and articles that were non found on the cyberspace, I used the unseeable web through the WITS Library databases and E-journal portal. The hunt technique included utilizing subjects as hunt strings on the WITS E-journal portal and Google bookman.

Search Stringing

Search Engine

“ Cloud computer science and emerging IT platforms: Vision, ballyhoo, and world for presenting calculating as the fifth public-service corporation ”

Google Scholar

Cloud calculating

hypertext transfer protocol: //0-web.ebscohost.com.innopac.wits.ac.za/ehost

“ cloud computer science and security ”

Google Scholar

Cloud calculating

hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/results.cfm? coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628

cloud computer science and security

hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/results.cfm? coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628

Cloud Security

Google Scholar

Cloud Computing and Security

Google Scholar

“ market orientated grids and public-service corporation computer science: The province of the art and future waies ”

Google

Google Scholar

Science Direct ( WITS )

“ Market-oriented cloud computer science: Vision, ballyhoo, and world for presenting it services as calculating public-service corporations ”

Journal

Google

URL ‘s

A§ hypertext transfer protocol: //www.buyya.com/papers/hpcc2008_keynote_cloudcomputing.pdf

A§ hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/xpl/tocresult.jsp? asf_arn=null & A ; asf_iid=5189548 & A ; asf_pun=null & A ; asf_in=null & A ; asf_rpp=null & A ; asf_iv=null & A ; asf_sp=null & A ; asf_pn=2

A§ hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/xpl/tocresult.jsp? asf_arn=null & A ; asf_iid=5189548 & A ; asf_pun=null & A ; asf_in=null & A ; asf_rpp=null & A ; asf_iv=null & A ; asf_sp=null & A ; asf_pn=2

A§ hypertext transfer protocol: //download.intel.com/it/pdf/320566.pdf

A§ hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/search/searchresult.jsp? newsearch=true & A ; queryText=In+Clouds+Shall+We+Trust % 3F & A ; x=15 & A ; y=12 & A ; filter= & A ; tag=1

A§ hypertext transfer protocol: //0-web.ebscohost.com.innopac.wits.ac.za/ehost/pdf? vid=1 & A ; hid=6 & A ; sid=2c7a115c-c342-482d-aaa3-550f18a87e7b % 40sessionmgr14

A§ hypertext transfer protocol: //www.hpl.hp.com/techreports/2009/HPL-2009-23.html,

A§ hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/citation.cfm? id=1327512.1327513 & A ; coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628

d. Question 2

I searched for academic articles on the cyberspace utilizing Google Scholar and the associated hunt strings as highlighted in the tabular array below. For diaries and articles that were non found on the cyberspace, I used the unseeable web through the WITS Library databases and E-journal portal. The hunt technique included utilizing subjects as hunt strings on the WITS E-journal portal and Google bookman.

Search Stringing

Search Engine

“ Cloud computer science and emerging IT platforms: Vision, ballyhoo, and world for presenting calculating as the fifth public-service corporation ”

Google Scholar

Cloud calculating

hypertext transfer protocol: //0-web.ebscohost.com.innopac.wits.ac.za/ehost

“ cloud computer science and security ”

Google Scholar

Cloud calculating

hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/results.cfm? coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628

cloud computer science and security

hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/results.cfm? coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628

Cloud Security

Google Scholar

Cloud Computing and Security

Google Scholar

“ market orientated grids and public-service corporation computer science: The province of the art and future waies ”

Google

Google Scholar

Science Direct ( WITS )

“ Market-oriented cloud computer science: Vision, ballyhoo, and world for presenting it services as calculating public-service corporations ”

Journal

Google

URL ‘s

hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/citation.cfm? id=1327512.1327513 & A ; coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628

hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/results.cfm? coll=portal & A ; dl=ACM & A ; CFID=79507880 & A ; CFTOKEN=27148561

hypertext transfer protocol: //www.hpl.hp.com/techreports/2009/HPL-2009-23.html

hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/search/searchresult.jsp? newsearch=true & A ; queryText=In+Clouds+Shall+We+Trust % 3F & A ; x=15 & A ; y=12 & A ; filter= & A ; tag=1

hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/citation.cfm? id=1640206.1640208 & A ; coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628

e. Question 3

I searched for academic articles on the cyberspace utilizing Google Scholar and the associated hunt strings as highlighted in the tabular array below and searched for the article writers. I used the Communications of the ACM diary through the WITS Library databases and E-journal portal.

I so searched for the writers academic establishments, which besides had personal home pages for the associated writers. The claims of the writers on their work was proved by look intoing the articles and work which has been credited to them

Search Stringing

Search Engine

James Broberg

A§ Google Scholar

A§ Google

A§ hypertext transfer protocol: //www.csse.unimelb.edu.au/

A§ hypertext transfer protocol: //ww2.cs.mu.oz.au/~brobergj/JamesBroberg/Publications.html

R Buyya

A§ Google

A§ Google Scholar

A§ EBSCOHOST: Communicationss of the ACM

A§ hypertext transfer protocol: //www.buyya.com/cv.html

A§ hypertext transfer protocol: //www.csse.unimelb.edu.au/

A§ hypertext transfer protocol: //0-web.ebscohost.com.innopac.wits.ac.za/ehost/results? vid=3 & A ; hid=9 & A ; sid=1b79f9e5-1967-435c-86e2-ba79a2562eb4 % 40sessionmgr13 & A ; bquery= % 28rajkumar+buyya % 29 & A ; bdata=JkF1dGhUeXBlPWlwJmRiPWJ1aCZsb2dpbnBhZ2U9TG9naW4uYXNwJnR5cGU9MCZzaXRlPWVob3N0LWxpdmU % 3d

URL ‘s

A§ hypertext transfer protocol: //www.csse.unimelb.edu.au/

A§ hypertext transfer protocol: //www.buyya.com/cv.html

A§ hypertext transfer protocol: //www.cs.mu.oz.au/~brobergj

f. Question 4

I studied the research academic articles by the writers and so searched for Information Systems theories on Google and Google Scholar utilizing the hunt strings provided.

Search Stringing

Search Engine

A§ Information Systems Theory

A§ “ Cloud Computing ” Theory

A§ Google Scholar

A§ Google

A§ hypertext transfer protocol: //www.fsc.yorku.ca/york/istheory/wiki/index.php/Resource_dependency_theory

R Buyya Theory

A§ Google

A§ hypertext transfer protocol: //www.buyya.com

URL ‘s

A§ hypertext transfer protocol: //gridbus.org/papers/ClusterFederation-FGCS2007.pdf

A§ hypertext transfer protocol: //www.fsc.yorku.ca/york/istheory/wiki/index.php/Resource_dependency_theory

5. Mentions

1. Akbari H, Resource Dependency Theory, [ Online ] , Available at hypertext transfer protocol: //www.fsc.yorku.ca/york/istheory/wiki/index.php/Resource_dependency_theory, Last Updated, [ 9 October 2008 ] , Accessed [ 26 February 2010 ]

2. Buyya, R, Yeo, C and Venugopal, S. ( 2008 ) , Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities, [ Online ] Available at hypertext transfer protocol: //www.buyya.com/papers/hpcc2008_keynote_cloudcomputing.pdf Accessed [ 20 February 2010 ]

3. Gu, L and Cheung, S ( 2009 ) . Constructing and proving privacy-aware services in a cloud calculating environment: challenges and chances, Asia-Pacific Symposium on Internetware, [ Online ] Available at, hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/citation.cfm? id=1640206.1640208 & A ; coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628, Accessed [ 20 February 2010 ]

4. Kaufman, L. M. ( 2009 ) , Data Security in the World of Computing, IEEE Security and Privacy, Vol. 7, Issue 4, pp 61 – 64, [ Online ] Available at hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/xpl/tocresult.jsp? asf_arn=null & A ; asf_iid=5189548 & A ; asf_pun=null & A ; asf_in=null & A ; asf_rpp=null & A ; asf_iv=null & A ; asf_sp=null & A ; asf_pn=2 Accessed [ 22 February 2010 ]

5. Li H, Sedayao J, Hahn-Steichen J, Jimison E, Spence C, and Chahal S ( 2009 ) Developing an Enterprise Cloud Computing Strategy, Intel Corporation, January 2009, [ Online ] Available at hypertext transfer protocol: //download.intel.com/it/pdf/320566.pdf Accessed [ 20 February 2010 ]

6. Mello, E.R. , Wangham, M.S. , Fraga, J.S. , Rabelo, R.J. , A Secure Model to Establish Trust Relationships in Web Services for Virtual Organizations, Collaborative Networks and Their Breeding Environments, Springer Boston, pp 183 – 190, [ Online ] Available at hypertext transfer protocol: //www.springerlink.com/content/e8128k353j7510k2/ Accessed [ 20 February 2010 ]

7. Michael, B ( 2009 ) , In clouds shall we swear, IEEE Security and Privacy, Vol. 7, Issue 5, pp 3 [ Online ] Available at hypertext transfer protocol: //0-ieeexplore.ieee.org.innopac.wits.ac.za/search/searchresult.jsp? newsearch=true & A ; queryText=In+Clouds+Shall+We+Trust % 3F & A ; x=15 & A ; y=12 & A ; filter= & A ; tag=1 Accessed [ 24 February 2010 ]

8. Motahari-Nezhad, H.R. , Stephenson, B, Singhal, S ( 2009 ) , Outsourcing Business to Cloud Computing Services: Opportunities and Challenges, Submitted to IEEE Internet Computing, Special Issue on Cloud Computing, [ Online ] Available at hypertext transfer protocol: //www.hpl.hp.com/techreports/2009/HPL-2009-23.html, Accessed [ 20 February 2010 ]

9. Smith B, ( 2010 ) , Microsoft Urges Policymakers To Help Secure Cloud Computing. Telecommunications Reports ; 2/1/2010, Vol. 76 Issue 3, p18-19, 2p [ Online ] Available at hypertext transfer protocol: //0-web.ebscohost.com.innopac.wits.ac.za/ehost/pdf? vid=1 & A ; hid=6 & A ; sid=2c7a115c-c342-482d-aaa3-550f18a87e7b % 40sessionmgr14 Accessed [ 22 February 2010 ]

10. Ranjan R, Harwood R and Buyya R ( 2007 ) , A instance for concerted and incentive-based federation of distributed bunch, Future Generation Computer Systems, [ Online ] Available at hypertext transfer protocol: //gridbus.org/papers/ClusterFederation-FGCS2007.pdf Accessed [ 26 February 2010 ] .

11. Vaquero L. M. , Rodero-Merino, L, Caceres, J and Lindner, M ( 2008 ) . A Break in the Clouds: Towards a Cloud Definition, ACM SIGCOMM Computer Communication Review, Volume 39, Number 1, December 2008. [ Online ] Available at hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/results.cfm? coll=portal & A ; dl=ACM & A ; CFID=79507880 & A ; CFTOKEN=27148561 Accessed [ 20 February 2010 ]

12. Weiss, A. ( 2007 ) . Calculating in the clouds. ACM netWorker Volume 11, Issue 4, pp 16-25, [ Online ] Available at hypertext transfer protocol: //0-portal.acm.org.innopac.wits.ac.za/citation.cfm? id=1327512.1327513 & A ; coll=portal & A ; dl=ACM & A ; CFID=79243436 & A ; CFTOKEN=12958628 Accessed [ 20 February 2010 ]

Post Author: admin