NIT6130 – Assignment Result Analysis
This report will create for getting the information about cloud computing and services of the cloud computing. For that purpose, numbers of the survey will do and get the response of the users and companies. This report will describe the information which is used for collecting information about cloud computing. Then, the best suitable data or information sources will be selected and started to resolve the problems which are identified from these sources. Data or information will be converted or saved in the files and these files will be saved in the computer. So, all the problems can be resolved
In this first task, first of all, data or information will be collected or gathered by the information collector these data or information will use during the experiments. For that purpose, data or information will be collected from the numbers of sources. So, portion 1.2 of this report will describe the information which is used for collecting information about cloud computing. Then, the best suitable data or information sources will be selected and started to resolve the problems which are identified from these sources. So, all the information about the collection of data will be put in the tabular form. After that, in section 1.3, data or information will be converted or saved in the files and these files will be saved in the computer. So, all the problems can be resolved.
Data sources are part of the data collection which will describe the issues that are coming in the cloud computing. So, for that purpose, research has been done and information or data can be collected or gathered from some resources which are industries, schools, colleges, Government and private sector, IT offices, shoppers, and public persons.
For collecting or gathering the data or information, numbers of resources have been taken and created the table which will contain the data information in the form of text format, fee (for that information), target source of information and description of data or information.
Storage of data or information
When creation of table (for data resources) is completed then, all the data or information will be kept in another file or table. So, all these files will contain the raw data or information that was collected from the numbers of the company and public users. This table is providing information about the location of saved information, a number of data or information records, the format of the file, the name of saved file and collection’s date.
Implement and design Experiments
This task will describe the implementation and designing process of the cloud information that was collected from numbers of resources. This task is splitting into numbers of parts which will describe in the below portion such as the data or information pre-processing, selection of a feature, use of methodology and implementation of the experiment.
Data or information pre-processing is keeping the very vital place in the implement and design of the experiment and it will not mandatory that all users and company will contribute in the collection of the data or information for the cloud computing and the users will provide the answer of the questions. So in the pre-processing,
- First of all, read all the raw data for cloud computing.
- Then, select the useful data by using the filtering
- Then, integrate the data or information by using resampling technique.
- Then, generate the data information by using transformation (Aggregation, normalization, generalization).
- Data compression by using the data reduction technique.
This portion will describe the information about the feature selection. So, these features will select from the pre-processing result of the file and then, reduce the numbers of data or information from pre-processing. Then, the final file will be generated. So that purpose, a new table is also created that is explaining the reduction of information from the pre-processing file and generate a new file.
3 Experiment Designing
Whole research is totally created on basis of techniques that is using in this experiment so this methodology will be Quantitative and Qualitative methodology which is a type of the hybrid methodology. First of all, the information or data was collected about the cloud computing form the company and users. Then, analysis all the information and check that how the cloud services are secure, compare all the information, and analysis results on the basis of the survey. For creating a survey, six-question was prepared and conducted the survey with the 200 company and users.
So starting the survey, first of all, some features or criteria was created for generating the information graph such as private sector adoption of cloud computing, cloud services used by public users, and cloud computing used by the organization.
So, these questions will use in the survey therefore, these questions will ask the company and users to get the information about cloud’s using and cloud’s services or safety of cloud-computing. Then, this information will collect on the basis of the numbers of factors that are already explained in above table 4.
The next process of this portion is the implementation. For that purpose, each and every information will be saved and recorded in the proper file which is also given in the tabular form. So, this information can be used in future for evaluating the issues and using of cloud computing and services of cloud computing in the companies and by the public users.
This portion will describe the information about the response percentage or using of cloud computing and services of cloud computing.
According to the current scenario, all most companies and users are using the cloud computing and cloud’s services. So cloud is keeping a very vital part in the current time. Because by using the cloud computing, users and companies can easily share the information over the cloud which can be accessed by the numbers of users of the company and can also use the services via the cloud. Cloud computing is providing 68% security for the services of cloud computing. Cloud computing is used by the public and private sector. The particular methodology is using to resolve the problems which are a pre-processing technique.
The survey was conducted for getting the views of the users and companies about cloud’s using and cloud’s services. Therefore, results of research numbers of factors are using such as security’s factors, public acceptance of cloud-computing’s factors, and private acceptance of cloud-computing’s factors. For survey, 200 companies and users were taken for taking the response of these peoples. I am also analyzing the security factors of the cloud computing that is 68% users and companies are saying that cloud computing is secure and 13% users and companies are saying that cloud computing is not secure and 19% users and companies are saying that cloud computing can be secure.
So the basis of these results, I will resolve all the issues which are facing by the companies and users and enhance the security of the cloud computing.
Outline for the Result Analysis and Experiment
- Cloud Computing
- Information Gathering
- Information Sources
- Information Gathering
- Storage of data or Information
- Implement and design Experiment
- Information Pre-processing
- Measurement Reduction or Feature Choice
- Research Scheming
- Designing Steps
- Experimental Results
- Tools and Software used
- Experiment Results
- Analysis of Result
- Approximation of Results
- Result’s Summary
Cloud computing is playing a very vital role in the current time. Because by using the cloud computing, users and companies can easily share the information over the cloud which can be accessed by the numbers of users of the company and can also use the services via the cloud. Cloud computing is providing 68% security for the services of cloud computing.
Digitalistmag, 2018, Neediest Industry Adopting Cloud Computing, viewed 15 Oct. 2018 <https://www.digitalistmag.com/industries/public-sector/2012/10/12/neediest-industry-adopting-cloud-computing-018790>.
Rightscale, 2018, cloud-computing-trends-2016-private-yoy.png, viewed 15 Oct. 2018, <https://www.rightscale.com/blog/file/843>.
Blogs.systweak, 2017, 36 Fascinating Facts about Cloud Computing, viewed 15 Oct. 2018, <https://blogs.systweak.com/2017/02/36-fascinating-facts-about-cloud-computing/>.
4mation, 2018, Cloud Services Sydney | Managed Cloud Hosting | 4mation. viewed 15 Oct. 2018, <https://www.4mation.com.au/service/cloud-services/>.
Taylor, S., Young, A., Kumar, N. and Macaulay, J., 2011. A “Marriage Made in Heaven”: Mobile Devices Meet the Mobile Cloud.
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M., 2010. A view of cloud computing. Communications of the ACM, 53(4), pp.50-58.
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I., 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), pp.599-616.
Carlin, S. and Curran, K., 2013. Cloud computing security. In Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
Brodkin, J., 2008. Gartner: Seven cloud-computing security risks. Infoworld, 2008, pp.1-3.
Feng, D.G., Zhang, M., Zhang, Y. and Xu, Z., 2011. Study on cloud computing security. Journal of software, 22(1), pp.71-83.
Popović, K. and Hocenski, Ž., 2010, May. Cloud computing security issues and challenges. In MIPRO, 2010 proceedings of the 33rd international convention (pp. 344-349). IEEE.
Links For US