Sign In
Not register? Register Now!
You are here: HomeResearch ProposalTechnology
Pages:
11 pages/≈3025 words
Sources:
Level:
APA
Subject:
Technology
Type:
Research Proposal
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Cloud Computing Dissertation Research Proposal (Research Proposal Sample)

Instructions:

The task is dissertation research proposal For a MBA in I.T management. The sample is a research proposal for managing security in an enterprise cloud environment.

source..
Content:

Dissertation Research Proposal
For a
MBA in I.T Management
Student name
Institution
Date
Proposed Title
Cloud Computing: Managing the Security Risks in Small and Medium Enterprises in the United Arab Emirates
Summary
Cloud computing, in its present form, is a fairly new and evolving paradigm showing huge potential to grow in information technology industry. This is mainly due to the sheer attractiveness of providing very expensive server computing technology to smaller businesses that find it completely impractical to invest in this type of infrastructure when their needs are, for the most part, sporadic with usage requirements that are difficult to forecast. It is also useful for the larger companies that have their own servers for day to day operations, but require increased computing power for relatively short periods of time in their business cycles (Chee & Franklin, 2010). The ability to pay for the services as required without the costly infrastructure expenses is a good business model.
The relative newness of this type of service, while highly beneficial, has the potential for huge risks for the customers including security risks. This paradigm is a network in which the primary users have minimal control of the structure, shared users, and overall security, particularly in relation to data that is processed or stored in the external servers.
This mixed method study will discover and examine the issues that arise from the risks identified and discussed in the literature, particularly in relation to security for the small and medium business owners in the United Arab Emirates who access cloud computing technology to support their internet-based businesses. Data will be collected, from a convenience sample of information technology mangers in small and medium enterprises that conduct some or all of their business using the internet in the United Arab Emirates, using an on-line survey instrument that will be designed to collect both quantitative and qualitative data about their cloud computing experiences and issues.
The risks will always exist, but this researcher intends to discern which risks are the most problematic for end users in this country. The researcher will determine what mitigations are already being employed by information technology professionals that are supporting these internet-based businesses and how effective they are in minimizing security issues. And finally, the researcher will determine what issues persist and the types and levels of risk these issues bring to business owners and operators in the United Arab Emirates. Discovering the nature and severity of these risks will enable the information technology industry, the support organizations for small and medium enterprises, and perhaps even government to develop technology or policy to secure the cloud for end users in this country.
The potential for business growth will only increase as more small and medium enterprises access cloud-computing services and technology and this research will contribute to the ability of small and medium enterprises in the United Arab Emirates to minimize their risks associated with conducting business using this type of technology.
Literature Review
Cloud Computing: A Definition
The services offered by providers that deliver either hardware or software over the internet are referred to as cloud computing (Armbrust et al., 2010). Cloud computing provides business access to off-site resources that are efficient and agile (what is needed, when it is needed).
Marstona et al. (2011) define cloud computing as:
“An information technology service model where computing services (both hardware and software) are delivered on-demand to customers over a network in a self-service fashion, independent of device and location. The resources required to provide the requisite quality-of-service levels are shared, dynamically scalable, rapidly provisioned, virtualized and released with minimal service provider interaction. Users pay for the service as an operating expense without incurring any significant initial capital expenditure, with the cloud services employing a metering system that divides the computing resource in appropriate blocks.”
Mell & Gance (2011) of National Institute of Standards and Technology in the United States drafted a lengthy definition of cloud computing, including this first line:
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Deployment Models
Ogigău-Neamţiu (2012) describes four deployment models for cloud computing. The private cloud is infrastructure designed and operated for only one business user. It can be hosted externally and managed by a third party, but in effect is a company's private server. This model does not have any of the benefits outlined in the next section. The public cloud is infrastructure made available to subscribers or pay-per-use customers by a third party cloud service provider. The community cloud is infrastructure purchased and managed by a consortium of users. It is similar to the private cloud, but the costs are shared by all the members of the consortium. The hybrid cloud is a combination of two or more of the other models and users have both on-site and off-site infrastructure to support their computing requirements.
Advantages of Cloud Computing
Armbrust et al. (2010) explain how a 'pay as you go' utilization of accessing an external server for utility computing makes more economic sense than tying up capital resources in a server that will be under-utilized much of the time. Cloud computing now permits a business to purchase server hours on demand and as needed, such as for peak load times or when the organization needs additional server time to perform batch analytics. Additionally, when a business is unable to determine how much server time/capacity they may require (e.g., during a new Web startup), cloud computing does not require up-front commitments and will support spikes and the business will not be penalized (at least not from the public cloud) when there is a reduction in demand.
Marstona et al. (2011) reported that six corporate data centres who participated in a survey conducted by Gartner Research showed they were using only 10-30% of their available computing power. The businesses were responsible for 100% of the maintenance and service costs, however and this has been shown to be up to two-thirds of an 'average corporate IT staffing budget.' The cloud permits smaller businesses to benefit from "computational exercises [that] typically involve large amounts of computing power for relatively short amounts of time" without having to invest in high-cost server resources. In fact purchasing cloud computing services can provide a business "immediate access to hardware resources with no upfront capital investment" as well as to innovative applications (Antonopoulos & Gillam, 2010).
The opportunity for cost reduction while still enjoying optimal, efficient, and fully scalable computing resources that can be provisioned immediately and on demand, implemented according to business needs, decommissioned when no longer required, scaled up when business requirements peak, and scaled down when requirements wane is very attractive indeed. However, this burgeoning newer method of sharing technological resources had brought a plethora of privacy, security, reliability, access, and regulation issues (Rittinghouse & Ransome, 2010).
Security Issues in the Cloud
While the benefits of cloud computing delivering business-supporting technology are vast, there are a number of issues and security challenges that must be acknowledged and addressed. Marstona et al. (2011) insist there is an "urgent need for understanding the business related issues surrounding cloud computing."
The Cloud Security Alliance (2013) and Samson (2013) identify and discuss nine top threats to security as a result of cloud security The 'Top Threats Working Group' conducted a survey of industry experts and compiled a list of nine critical threats to cloud security (ranked in order of severity):
1. Data Breaches
2. Data Loss
3. Account Hijacking
4. Insecure APIs
5. Denial of Service
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared Technology Issues
Objective
This project seeks to discover the experience of managers providing information technology services to small and medium enterprises that serve their customers using the internet. Specifically, this research will gather feedback from information technology managers on their utilization of cloud computing services, the specific issues they have encountered, the mitigation activity resulting from encountered issues, the efforts they have undertaken to ensure security of their cloud enabled business interests and data storage, and their perceptions on the value of cloud computing to their respective businesses.
Project Outcomes
The purpose of this mixed methods study is to evaluate the current state of cloud computing in the United Arab Emirates. The researcher will gather quantitative and qualitative data from identified stakeholders in order to determine the specific risk factors, and associated mitigation in relation to security, associated with utilizing cloud computing technology and services to support internet-based businesses in this country in 2013. By examining the experiences of businesses currently engaged in this practice, this study hopes to discover commonalities in the issues experienced by the selected stakeholders.
The resu...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Using Blogs in Teaching ESL/EFL Writing
    Description: The purpose of this research is to investigate how tutors teaching ESL/EFL can use blogs as one of the most effective ways of improving their students’ writing skills....
    2 pages/≈550 words| APA | Technology | Research Proposal |
  • Counselling and Technology
    Description: Technology It gives full details of the reserch proposal on technology on young people and its effect....
    5 pages/≈1375 words| APA | Technology | Research Proposal |
  • Engineering
    Description: Engineering Technology Research Proposal Undergraduate level...
    6 pages/≈1650 words| APA | Technology | Research Proposal |
Need a Custom Essay Written?
First time 15% Discount!