SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT DEVELOPMENTS.

 

Task details

For the LD7028 assignment you must produce a proposal for a short research project.

Your research proposal will be approximately 2500 – 3000 words and specify the project background, motivation and relevance to your programme of study; its scope, aims and objectives; a plan of the major activities.

Your proposal should draw on current and recent research and other appropriate sources of information and cite these sources using a consistent standard referencing system. The proposal will be assessed by your supervisor and second marker in a short meeting, during which they will give feedback and provide suggestions and comments on how to improve the project.

The Proposal Structure

Aim

Produce a summary of what your project will achieve in one or two sentences, ideally construct a research question.

SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT DEVELOPMENTS.

Background, Motivation and Relevance – literature review

  • Set out and justify, using supporting literature, where your work will fit in the computing body of knowledge.
  • Outline and critically discuss what relevant research has been undertaken, in the past, in your area of interest and why this project is necessary.
  • Outline and critically discuss why the research will be of value, in the future, and what the anticipated impact of the outcomes will be.
  • Outline why you want to undertake this work, some areas to consider are, personal motivation, skills set and career choices.

Scope, Objectives and Risk

  • Outline and justify the scope of your project – what you intend to do, what you will not include but might be expected by others to be incorporated.
  • Outline numbered steps (SMART Objectives) you will have to complete in order to achieve the aims.  After each objective outline the deliverable or outcome that will be produced.  Outline how you will assess and or measure the quality for that objective.  Outline what research method/design you will adopt for each objective and how each method will support one another.
  • Produce a task list for all objectives, that defines, task, deliverable, resources (all types) required, skills required, time required.
  • Produce a risk log (see example on your Blackboard Assessment tab) for you project. (Risk log pasted)

Sources and use of Knowledge

  • Identify and justify a journal where your work would be relevant for publication.
  • Identify aspects of the standards for publication in the target journal that you can incorporate into your project proposal, so for example the referencing system, font style and pitch etc.
  • Identify, justify and critically discuss any authors, journals where previous relevant research has been published within the last 5 years.  There is no fix number, it is your judgement to scope this listing.

Ethics, Legal, Social, Security and Professional Issues

Write out a section that discusses, explores and defines all of the ethical, legal, social and professional issues associated with your project, including how you will consider security issues.  If you think an area of this section is not applicable to your project, you should justify why this is the case.

Schedule of Activities

Using your task list, construct a Gantt Chart and a Monitoring and Control table

SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT DEVELOPMENTS