Graduate Thesis on Information System

Requirement

Thanks for sharing--I'm not clear on your primary research question and what research methods you will be using for your data collection and analysis. You need to better define and explain.

Add those details in attached file. He asked me for what kind of data collection or data analysis have you done or expect to do in coming weeks? Please add those details in attached report.

Solution

Introduction

Security is the quality or condition of being protected and to be free from threat. The Committee on National Security Systems (CNSS) describes data security as the protection of data and its basic components, containing the frameworks and equipment that store, utilization and transfer that data. Today, the amount of information and data has been developing at a high rate and the extent of classified information is additionally expanding.
According to survey created worldwide in 2010, it adds up to 1.2 zettabytes (1021bytes) in which 28% are should have been stored safely. This will rise to 33% by 2015. From IDC (International Data Partnership) survey led in 2013, it is realized that storage is a massively vital subsystem of big data that can decide the success and analytic implementation. Application execution and capacity growth keep on being the top challenges facing all organizations as they anticipate on how storage is appended to Big Data and analytics environments.

Do you have no idea how to write your Information Technology assignment? Then consider contacting Allassignmenthelp.com for assistance. Our professionals have extensive experience and always deliver well-researched bioinformatics assignments. The main advantage of getting information systems homework help from our website is timely delivery. We never miss a deadline for an assignment.

Data Security is the idea of keeping data secure. Data security comprises of three major parts. Figure 1.1 demonstrates the significant parts of data security. Data can be taken from information, so information security is a data security.    

To secure all the operations, the organization shod going with different layers of security. They are,

  1. Physical Security: To guarantee physical things, objects from unapproved get to Security.

  2. Personal Security: To protect the individual or groups who are endorsed to get to the association capacities and its data.

  3. Operations Security: To secure the purposes of enthusiasm of particular operation or course of action of activities.

  4. Communication Security: To protect technology, interchanges media and substance.

  5. Information Security: To guarantee the protection, propriety and availability of data resources. 

  6. Network Security: To secure management systems parts, associations and constituent. 

Description of Proposed Research

Problem Statement

Computer and network security is interesting but very complex. Security is not as clear as it might first appear to the tenderfoot. There are many studies and research made on distributed computing, as we know it's in particular developmental in technology world; which drags lots of consideration and threats of use cloud in any sector. Additionally, cloud partitioned into three user classifications. However, privacy of data and risk of information is dependably on high mode while anybody utilizes the cloud. Since information is open for multiple clients who offer same network. 

Purpose Statement

This research work focuses on the security of sensitive data which is place into the cloud systems. This work predominantly manages the cloud information security which spreads over anyplace in the world. For the security, the proposed work predominantly focuses on key era. In future, the research work can be reached out by reducing the time and cost of utilizing the storage cloud. There are different steps to be performed in this work. They incorporate, 

  • Key generation for cryptography 

  • Encryption algorithm 

  • Split the record/file, change over into jar file and place into various cloud storage nodes. 

  • Decryption algorithm 

Utilizing these procedures, the cloud information security is performed. Different record parts have different random keys and every record part can have different AES key. Rather than utilizing single encryption key for a record, every record part have allocated separate keys.

Literature Review

At present, Cloud Computing is set up to be sent at a quick pace. Cloud computing is another innovation which has boundless potential for a few application territories including IT, instruction, military, transportation, stimulation, country barrier and brilliant spaces. One central point of preference of  utilizing cloud computing is pay-as-you-go estimating model, where clients pay just as indicated by their utilization of the administrations. Cloud security is one of the dynamic exploration ranges and broad examination work has been completed lately. Various successful methods have been proposed by different creators to give security to cloud information and data. This literature review examines a few works done by different researchers that deal with cloud data-centric security. Data security and access control is one of the most challenging continuous research work in distributed cloud computing, in light of fact that the clients outsourcing their sensitive information to distributed storage suppliers. Before picking distinctive sorts of encryption strategies, it is essential to pick strategies for creating keys. A few authors have discussed several types of key management and key generation techniques. 
Gehana Booth et al.,  present an unusual state portrayal of disseminated figuring security. The authors plot a couple hazard models, discuss specific attack segments, and request proposed protects by which they address these models and counter these frameworks. Additionally, the authors give an audit on circulated strikes and shields as for five attack domains, collocation, dispute of organization, collocation break of mystery, data accessibility and respectability, data secrecy, and structure deals.
Kangchan Lee  examines specialized segments of cloud figuring and different dangers as far as cloud administration client and cloud administration supplier. The author isolates the cloud administration framework into 4 layers, the Network Layer, Access Layer, Services Layer, and User Layer. Every layer incorporates a set of functions and all layers ought to be capable in security viewpoint.

Also, the authors infer that in view of Cloud Security dangers, the taking after things are vital for Cloud Security standardization : 

  • Security Architecture/Model and Framework 

  • Security Management & Audit Technology 

  • Business Continuity Planning (BCP) and Disaster Recovery 

  • Storage Security 

  • Data & Privacy Protection 

  • Account/Identity Management 

  • Network Monitoring and Incident Response 

  • Network Security Management  

  • Interoperability and Portability Security 

  • Virtualization Security 

  • Obligatory Predicates

Qian Wang et al., focus on public audibility and dynamic data operations. The authors first recognize the challenges and potential security issues of direct expansions, and afterward demonstrate to build an exquisite confirmation plan for the consistent mix of the above elements. The authors present the cloud information storage design as following. 
 
Gonzalez et al.,  distinguish and group the primary security challenges in cloud computing and give the outline of current status of distributed computing security. This work quickly clarifies the review of proposed the security scientific categorization highlighting three fundamental classifications called consistence, protection and design. The security issue and security arrangements are shown utilizing pie outline. The author examines a few security spaces and dangers. 
D.Zissis et al.,  propose a security technique for cloud computing. The primary point of this proposed work is to assess cloud security by recognizing one of a kind security structure and present a reasonable arrangement that disposes of the potential dangers. This paper utilizes a strategy called Trusted Third Party inside a cloud to guarantee the CIA of information and interchanges. TTP is a perfect security facilitator in an appropriated cloud environment where substances have a place with various regulatory areas with no earlier learning of each other.
Whenever an information is exchanged by the customer, it is initially secured by certain verification conventions and spared at the server end. With this, the information will be put away in a secured path at server end. The individuals who need to download the information or perspective it ought to be associated or have admittance through the same system to see the information. This is done in application client level so that the information will be secured and exchanged where there is a need to aggravate any lower layers of the system.
I utilized Theoretical survey to discover my inquiries identified with multilayered data centric security on distributed clouds. There are numerous books, specialized surveys and articles out there on this theme; which helps me a considerable measure to research my objective for my paper. I discovered numerous intriguing points out from my examination. Concentrating on various article and indicates going be gathered and survey by me before I make my last survey on my themes. Content will be changed if necessary, and additionally I did investigation with respect to my examination. 

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

Research Methodology

Research questions

  1. What is an importance of Multilayered Data Centric Security?

  2. What is the impact of Multilayered Data Centric Security on distributed clouds?

  3. How Multilayered Data Centric Security works?

  4. What is a reason of protecting cloud system and computing?

  5. What are the various threats of using the cloud?

Research method

The quantitative method of research is used to analyze the data. It is defined as the systematic empirical investigation which is done through mathematical, statistical and computational techniques. The objective of research is to employ mathematical theories and models. It helps to identify the fundamental connection between the mathematical expression and empirical observation. The data is analyzed through statistical tools. The unbiased result is produced which can be generalized to the wide population. The qualitative research is based on the methods which are used in the natural science. The quantitative research can be done through telephonic, face to face, postal, and emails. The aim of quantitative research is to evaluate the data and measure in monetary terms. 

Data analyzing tools

The data analysis is done through using SPSS statistical tool. The tool helps to generate more accurate results with less error. The huge amount of data can be analyzed through SPSS tool in an organized manner. The tool calculates the broad range of statistics through data collection. After analyzing the data, reliability test is conducted to determine the reliability of data. Then correlation will be conducted to identify the acceptance or rejection of the hypothesis. The closed-ended questions are used for collecting the data through questionnaire survey which is conducted to collect the maximum information. 
The independent and dependent variables are taken for conducting the hypothesis. The Multilayered Data Centric Security is an independent variable and distributed clouds are treated as a dependent variable. The correlation is used to identify the acceptance or rejection of the hypothesis.
H1: There is a significant role of Multilayered Data Centric Security on securing the distributed clouds.
H0: There is no significant role of Multilayered Data Centric Security on securing the distributed clouds

Sampling 

The sampling is done through questionnaire survey in which closed-ended questions are used to collect the answers to requires questions.  The answers which are collected from the survey process that will be measured through using Likert scale. The survey will be conducted on sixty employees who had learning experienced which can be used as a sample to test the accuracy of conducting the research. The method of non-probability is used for conducting the convenient sampling.

Proposed Solution Approach  

The purpose of this research is to provide more security for cloud storage The methods used in this proposed approach are,

  • Generate the encryption key by using algorithms and effective methods. 

  • During the uploading process, execute AES encryption utilizing the generated encryption key.

  • Part the record into a few sections and store it into various storage nodes available. 

  • During the downloading process, perform AES decryption algorithm.

  • This work focusses on delivering multiple levels or layers of security to the cloud data. The multiple layers consist,

  • An authentication technique is used at the first level. The end user must be an authenticated person. 

  • In second level, the encryption key created by DKGA algorithm (proposed algorithm) gives higher security to the information.

  • Then, the file or record is fragmented into many parts, which are stored at various storage locations. It is measure of security.

  • In the next layer, strong AES algorithm is utilized for encryption and decryption.

  • The encrypted file then transformed into jar file. 

  • At last, the data owner gets the user log.

Proposed Work Plan

The future work will be starting in fall semester August 27, 2016 and is expected to be finish within four months in GRAD699.
In future work, the key length can be extended utilizing some other key generation algorithm rather than MD5 algorithm. The proposed work utilizes 128 bits by using dynamic AES algorithm. This incorporates ten rounds or cycles of AES algorithm. In future this can be expanded to 192 or 256 bits which includes 14 rounds. It enhances more security to the data because of increased key size.
In the present work, there is a requirement of storage of the values of IP location and the random keys. This consumes more time and it might take some space of memory. In future, utilizing some different procedures, the time and memory space can be minimized. 
Also, rather than using same kind of cloud provider, multi-clouds can be used, which lead to more safety. However, this proposed plan can be accomplished in 4 months considering the positive opinion and response. 

Conclusion

The research on "Multilayered Data Centric Security on Distributed Clouds" concentrates on giving more security for cloud information. Here there are a few levels of security given to the information which will be placed into the cloud. Also, new key generation method is utilized here. After the key generation different methods are taken after in particular encryption, file/record splitting, transformation of jar file and decoding. The record parts have separate AES keys instead of every record having separate keys, so the high level of security is provided to the data. 

 

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order