Security and privacy issues over the cloud environment: Tips for developing secure cloud model:

Security and privacy issues over the cloud environment: Tips for developing secure cloud model: : The Best UK Dissertation Research Topics from Existing Recent Research Gaps in Computer Science Engineering Domain

In brief

  • You will find the best dissertation research areas / topics for future researchers enrolled in . computer science These topics are researched in-depth at the University of Glasgow, UK, Sun Yat-sen University, University of St Andrews and many more.
  • In order to identify the future research topics, we have reviewed the computer science literature (recent peer-reviewed studies) on the security and privacy issues in the cloud environment for efficient cloud service provisioning.
  • There is a possibility to minimize the security errors and develop a secure cloud model.
  • Recommendations and suggestion for a secure cloud model were discussed
  • Download our cloud security Reference book papers such as tutorials, proprietary materials, research projects and many more @ tutorsindia.com/academy/books

General background

Over the past decades, there is a rapid growth of data generated in the form of semi-structured and unstructured [1] which is from multiple resources. For instances, various organization, government sector, social network website and medical applications that serve around millions of web page views per day, but the storage and maintenance of these huge data becomes complex and cannot be handled by traditional data management systems [2].  Hence there is a need of new frameworks, platforms and novel techniques for data safety, data management, privacy maintenance, and data analytics [3]. Hire Tutors India experts to develop new frameworks and novel techniques on improving the scheduling efficiency for your Computer Science dissertation Services.

 Among these, there is a special focus required for privacy and security of our data [4] [5] [6]. Apart from the security and privacy issue, the following questions are significant issues:

“How to make good use of data,

How to maintain the user privacy,

How to guarantee data availability

While ensuring the data security”.

Tutors India has vast experience in developing dissertation research topics for students pursuing the UK dissertation in business management. Order Now 


Security and privacy concern

From an academic and industrial point of view, the encryption process will be an effective solution toward solving the privacy and security issues. Also, it protects the sensitive information which is outsourced as long as the data has been encrypted through data owner before upload to the trusted cloud system. But, till date, there is a lack of effective approach to offering secure access on cloud services and complex due to the open nature of the wireless communication medium (Sundareswaran et al., 2012; Peng et al., 2012; Qin et al., 2016; Jegadeesan et al., 2019). Hire Tutors India experts to develop your algorithm and coding implementation on improving the secure access for your Computer Science dissertation Services.

The primary security requirements include data transparency, availability, authentication, integrity confidentiality, and audits as specified [10]. Similarly, the privacy requirements are like malicious insiders, insecure APIs, shared technology issues, account hijacking and so on [11]. Hire Tutors India experts to develop your algorithm and coding implementation on improving the secure access for your Computer Science dissertation Services

Figure 1: Tree structure for security and privacy issues over the cloud environment [10]

There is a need of following recommendations:

  • Secure access control framework for full-fledged network security control
  • Flexible management policy which should considering a large number of users
  • Effective machine learning technique to handle cloud resources and load balancing task for both private and public cloud
  • Effective scheduling technique to handle multiple workflow with considering multiple priorities at different times in cloud
  • Suitable machine learning technique to find and differentiating pattern of data from multiple sources
  • Solve and optimize the security and decision-making issues via artificial intelligence
  • Implement effective Soft computing technique to detect network attacks where we can solve the hacking issues
  • Implement the effective web mining technique to discover the knowledge in web-based environments
  • Tutors India experts has experience in handling dissertation and assignment in cloud security and machine learning techniques with assured 2:1 distinction. Talk to Experts Now

Summary

Till date, there is a lack of effective approach to offering secure access cloud model and services. This is due to the open nature of the data from multiple sources. Hence I have suggested the above recommendations for full-fledged network secure model. It can be concluded that the different kinds of management system, the Cloud service providers (CSPs) have more responsibility in cloud environment. Also, the sensitive data requires security and privacy concern from both cloud users and CSPs.

Tutors India develop ML algorithms using Python, Hadoop framework and many more to booth secure access control in cloud computing platforms. Hiring our experts, you are assured with quality and on-time delivery.

  1. D. Gil and I.-Y. Song, “Modeling and Management of Big Data: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 63, pp. 96–99, Oct. 2016.
  2. C. L. Philip Chen and C.-Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data,” Inf. Sci. (Ny)., vol. 275, pp. 314–347, Aug. 2014.
  3. Q. Liu, A. Srinivasan, J. Hu, and G. Wang, “Preface: Security and privacy in big data clouds,” Futur. Gener. Comput. Syst., vol. 72, pp. 206–207, Jul. 2017.
  4. V. Chang and M. Ramachandran, “Towards Achieving Data Security with the Cloud Computing Adoption Framework,” IEEE Trans. Serv. Comput., vol. 9, no. 1, pp. 138–151, Jan. 2016.
  5. V. Chang, Y.-H. Kuo, and M. Ramachandran, “Cloud computing adoption framework: A security framework for business clouds,” Futur. Gener. Comput. Syst., vol. 57, pp. 24–41, Apr. 2016.
  6. Q. Zhang, G. Wang, and Q. Liu, “Enabling Cooperative Privacy-preserving Personalized search in cloud environments,” Inf. Sci. (Ny)., vol. 480, pp. 1–13, Apr. 2019.
  7. S. Sundareswaran, A. Squicciarini, and D. Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloud,” IEEE Trans. Dependable Secur. Comput., vol. 9, no. 4, pp. 556–568, Jul. 2012.
  8. Z. Qin, H. Xiong, S. Wu, and J. Batamuliza, “A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing,” IEEE Trans. Serv. Comput., pp. 1–1, 2016.
  9. S. Jegadeesan et al., “An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications,” Sustain. Cities Soc., vol. 49, p. 101522, Aug. 2019.
  10. N. Subramanian and A. Jeyaraj, “Recent security challenges in cloud computing,” Comput. Electr. Eng., vol. 71, pp. 28–42, Oct. 2018.
  11. N. A. Azeez and C. Van der Vyver, “Security and privacy issues in e-health cloud-based system: A comprehensive content analysis,” Egypt. Informatics J., vol. 20, no. 2, pp. 97–108, Jul. 2019.

[wce_code id=1]

Comments are closed.