Faculty of Management Sciences
Permanent URI for this communityhttp://ir-dev.dut.ac.za/handle/10321/13
Browse
Search Results
Item Circumstantial discussion on security and privacy protection using cloud computing technology(IEEE, 2022-04-28) Lourens, Melanie Elizabeth; Naureen, Ayesha; Guha, Shouvik Kumar; Ahamad, Shahanawaj; Dharamvir; Tripathi, VikasCloud computing is becoming a demanding technology due to its flexibility, sensibility and remote accessibility. Apart from these applications of cloud computing, privacy and security are two terms that pose a circumstantial discussion. Various authors have argued on this topic that cloud computing is more secure than other data sharing and storing methods. The conventional data storing system is a computer system or smartphone storage. The argument debate also states that cloud computing is vulnerable to enormous types of attacks which make it a more concerning technology. This current study has also tried to draw the circumstantial and controversial debate on the security and privacy system of cloud computing. Primary research has been conducted with 65 cloud computing experts to understand whether a cloud computing security technique is highly secure or not. An online survey has been conducted with them where they provided their opinions based on the security and privacy system of cloud computing. Findings showed that no particular technology is available which can provide maximum security. Although the respondents agreed that blockchain is a more secure cloud computing technology; however, the blockchain also has certain threats which need to be addressed. The study has found essential encryption systems that can be integrated to strengthen security; however, continuous improvement is required.Item The critical role played by big data management in effectively addressing the security and overall privacy concerns through correlation analysis(IEEE, 2022-04-28) Ahamad, Shahanawaj; Roshan, Amit; Lourens, Melanie Elizabeth; Shekher, Vineet; Joshi, Kapil; Alanya-Beltran, JoelDue to the widespread application of big data in a wide range of fields, there has been a significant rise in a diverse range of data assets, and numerous data analysis technologies, such as standardized data mining or quantitative analytical techniques, are speeding up the constant enlargement of the big data industry. The fact that information from several different resources has a life cycle from acquisition to disposal is a key property of big data, as is the fact that new information may be obtained via analysis, combining, and exploitation of existing data. Yet, information security & dependability challenges arise at every stage of the life cycle, rendering the protection of individually identifying data a vital goal throughout the whole process. It is possible to evaluate user behavior using different big data analytics techniques, and the collection of this information results in the violation of personal privacy. This study analyses dangers and security challenges that arise during the administration of large amounts of data by verifying the existing standards produced by international standardization bodies and doing an analysis of relevant research.Item The role of implementing cloud computing technology for addressing critical security issues and overcoming the challenges effectively(IEEE, 2022-04-28) Lourens, Melanie Elizabeth; Kaushik, Manish; Goyal, Jayanti; Singh, Rajesh; Kuchhal, Shikha; Tiwari, MohitThe term cloud computing possesses the critical aspect to enhance the network by leveraging the available resources in an effective manner. It has been widely stated that the usage of enhanced IT infrastructure support in realising the goals of the stakeholders in an easier aspect. Cloud computing is a shared pool of operations that is growing in popularity due to its low cost, high efficiency, and high output. Along with its many advantages, cloud computing presents a considerably more difficult scenario in terms of data privacy, intellectual property rights, authenticated access, data security, and so on. Cloud computing technology is becoming ever more challenging in today's society as a result of these challenges. This paper aims to evaluate the security issues in cloud services and implementation of advanced technology to prevent these challenges. In this context, mixed method has been considered (primary quantitative and secondary qualitative) to gather relevant and factual information.