Order Now

Techniques In The Banking Sector Assignment Sample

6500 Project Delivered
4.9/5 User Rating

Techniques In The Banking Sector Assignment Sample


Get free samples written by our Top-Notch subject experts for taking online assignment services.

1.1 Background and Context

Cloud computing security is a great platform for all sectors and is beneficial in the banking sector. Cloud computing is imposed as storing and accessing data and providing the data that are service-related to computing over the internet (Satheesh and Nagaraj, 2021). Cloud computing is basically the data referred to as the remote services on the internet and helps to access and manage the online data rather than the local drives of the computer. The restored data of cloud computing can be any type like documents, images, audio, files, and videos. The role of cloud computing is basically functioning as a model of data enabling convenient, ubiquitous, on-the-demand networks which are accessed to and shared by a pool of configurable resources of computing systems like servers, applications, networks, storage, and services which are released and provisioned by the minimal effort of management and service provider interaction [referred to appendix 1].

1.2 Problem Statement

The security problem arises in a cloud computing system and these are

  • The problem arises in the security of virtual machine
  • Access and identity control of the computing system management of the system
  • The data security system of the computing system

These are the main issues that are occurring in the cloud computing system and the most challenging part is it restricts the cloud data limit when using cloud computing. Not only restricts but also prevents the access control of the data security (Li, et al. 2021). Data security is the most important factor of the cloud computing system. It refers to some significant key factors like data confidentiality, traceability, availability, and integrity. These all are the risk management factors for the cloud computing system [referred to Appendix 3].

1.3 Aim and Objectives

The main research aim of the cloud computing system in the banking sector is to store high-security informative data without any glitches. For the public and private sectors, the aim of the cloud computing system is to restore the data and provide easy-to-access data in the computing system and the renowned IT services (Subramanian and Jeyaraj 2018). A Cloud computing system consists of both software and hardware systems and these components work according to the model of cloud computing [referred to Appendix 5].

The main objective of the research is

  • To understand the technique of storing data in the cloud computing system.
  • To identify the mitigation technique that is used to reduce the workload in the banking sector.
  • To rectify the high-security process of informative data in the cloud computing systems.
  • To analyze how cloud computing helps to improve better businesses in the banking sector (Alhenaki, et al. 2019).
  • To use the technique of a cloud computing system gets access to the data centres.
  • To identify and manage the banking task from a remote location.

1.4 Research Questions 

Based on the objectives of the research some research questions have been evaluated in this proposal which are presented in below section-

Question 1

What are the techniques for storing data in the cloud computing system? [Referred to appendix 4]

Question 2

What are the mitigation techniques used to reduce the workload in the banking sector?

Question 3

How to rectify the high-security process of informative data in cloud computing systems?

Question 4

What are the improvement techniques of cloud computing that provide better businesses in the banking sector?

Question 5

What are the techniques used to access the data centre?

1.5 Research Rational

The main focus of the research rationale is to identify the significance, implementation, and future impact of the research on an organization. The main purpose of the research on cloud computing systems is how to store the data in the cloud and how to access the data in the future (Tariq, 2019). The purpose is to amplify the responsibility for the security and analysis of the data and store them to maintain all the security in the banking database. The main significance of the cloud computing system with its mitigating technique in the banking sector is to reduce the workload by accessing only one file that stores the multiple data of one customer and it saves time for both the customer and employee of the organization. 

1.6 Thesis organization of the research

In this research, the structure should be mentioned above so this structure is to be followed by the researchers. In the introduction part, the researchers discussed the whole assessment what they are discussing in this research and what is the main aspect of their research (Hosseinian, et al. 2018). In the literature review part, the researchers have described the author's view of what they are thinking about the importance and the impact of Cloud computing security with its mitigation techniques in the banking sector.

In every research, the researchers have followed some method which might be the secondary method or the primary method so the researchers are describing their methodology in this part. In the data analysis part, the researchers describe their collecting data as the time of research they are collecting to complete their project so in this section they are analyzing their data in the right way. Lastly, in the conclusion part, the researchers conclude their research in the right way. In this part, the researchers have described an overall view of their research and described what they have to learn from this research.

1.7 Relevance and Importance of Research

The research on the cloud computing system in the banking sector is very relevant and also has great importance. The data of the customer is stored in the company database which helps to store the customer’s information and it is handled by only one employee of any organization (Dong, et al. 2019). So using the cloud computing system in the banking sector mitigates the employee workload and also relieves the employee from taking on the huge workload in the office. The previous time period was very hectic for the people who stored the customer information and registered them in a registered copy. At that time it was very difficult to find the proper copy of the exact person’s information and it was also very time-consuming that’s why the work dealing was a general problem. However, cloud computing eases the problem of storing the data in the company database maintaining all safety. The job is becoming easier and providing the services in a very time-bound manner. That’s why both customers and employees do not face the time bounding issue, using less time the company produces more productive work.

1.8 Significance of the study

There is much significance in cloud security. Maintaining security in cloud computing helps the organization and banking sectors in various ways. This study will help the organization and banking sector to improve the quality of the cloud-based security system (Bose et al. 2019). Various types of risks are discussed in this analysis which helps the banking sectors to be aware of and prevention process. The methodology is discussed and the different types of technology must be used to prevent the risk of data breaches and fraud. This will also help the individuals to know the various risks and improvement processes. Various ideas can be taken from many researchers' ideas to implement a cloud security system. 

1.9 Scope and limitation

There are some limitations to cloud security. The major limitation of cloud security is data loss and leakage. Account service hijacking is one of the biggest problems in cloud security (Vinoth et al. 2022). Technical vulnerability is one of the major problems and limitations which need to improve. There are various scopes found in this analysis. Artificial intelligence and machine learning should be improved to prevent problems. It needs to check in multiple ways to find vulnerabilities in the security system and needs improvement. A b AI system should be developed to identify the unethical behaviour of the system and send the log data to the admin of the security system. The future scope of this study is to focus on the improvement process in the cloud security system and artificial intelligence [referred to Appendix 2].

2.0 Literature Review

2.1 Key Concepts, theories, and studies

According to Subramanian, and Jeyaraj, 2018, the traditional industry like IT and many different kinds of industries including banking is changing rapidly through digital transformation and accelerating the constantly evolving technology. This research process is accepted widely and has experienced various transformations (Geng, 2019). The term “Fintech” was introduced in the 1980s and 1990s; the term fintech means financial technology which mostly helps in the financing month of the year. Using previous technology it was almost impossible to complete the work within a given time bound because of using poor technologies. Using the research it has been that the help of technology especially using a cloud computing system transformed the customer's services.

According to Alhenaki, et al.(2019), cloud computing technology is taken into account with the top technology which strategically works for the organization and helps to reduce the cost of the organization and increase the flexibility of the services instead of dealing with big data both the storage and computer. According to the research, although cloud computing helps the organization store data and mitigate the extra unusual workload, cloud computing still needs to address privacy and security issues (Kadhim, et al. 2018). There are some policies that are followed and these are preserving data privacy, authorization, authentication, access and identity of the control management, data ownership, and policy management.

According to Tariq, 2019, sometimes cloud computing is unaware of sensitive data and the exact location because of the provider of the cloud services. The provider of the cloud services always maintains the data centres in a geographical manner and distributes the resulting locations in several security threats and challenges. In a cloud computing system, the organization faces some security challenges and these security challenges consist of risks and threats of cloud computing, security use in the crypto cloud, and so on (Mehrban, et al. 2020). Sometimes communication level arises because the whole process is controlled digitally so without the proper access to the internet it is difficult to communicate and access the information of the customer in their respective bank.

2.2 Key debates, and controversies

The important factors that are involved in the cloud computing system identified in the literature are network access, scalability, reliability, privacy, savings, security, interoperability, and sustainability.

Network access is the most important characteristic of the cloud computing system and the capacity to access the computing platforms and make them available using the network over heterogeneous platforms like mobile phones, computers, and laptops. Adopting the cloud computing system of an organization is considered scalability (Porcedda, 2018). The role of scalability refers to the ability of the computer, system, and product. The system expands the large no. of users without crashing the important data.

2.3 Gaps in Existing Knowledge

Any research work contains the research proposals along with the research gap to write a research proposal and finding a valid research gap in the proposal is a precursor. In the research proposal research gap is a topic that contains insufficient data and missing information that limits the capacity to conclude the respective questions. In the given research a cloud computing system with mitigation techniques for the banking system is less communicative to the customer because the whole process is completed through the internet (Vafamehr and Khodayar 2018). This is the main research gap that can be found in the research process. Since the cloud computing method is used in the banking sector by using the mitigate technique it is obvious that there should be b network access but in remote areas, it is problematic to access the internet and in that context, it is difficult for the organization to use the technique and ease the workload.

3.0 Research design and methods

3.1 Research Design

This research design can be proposed as per the present study areas. Selecting and adopting appropriate methods, philosophy, research approach, time frame, method of sampling, data collection procedure, and most importantly analysis of the data will be utilized within the examination by understanding this research. In this research, the researcher has followed the qualitative method to discuss the research. The qualitative research design will be used in the research because it will be helpful in gathering so many formations and data from the small sample sizes (Aldasoro, et al. 2022). This research design will also be helpful in capturing several forms of data. That will be helpful in the research to evaluate such techniques of cloud computing systems.

3.2 Methods and Sources

To produce informative and considerable research, proper research is required. To produce a critical analysis of the CC (cloud computing system), such a research method will be considered in this research. In this research, the qualitative research design will be followed. The secondary data will be used in this research. To gather information, online platforms such as Google and Google Scholar will be used. The gathered information will be presented in a descriptive format to present a theory-based investigation. To complete each task properly the project schedule has been created, which will be helpful to complete each before the assumed time. All the instructions and ethical characteristics will be followed to present the investigation adhering to the regulations.

3.3 Practical Considerations 

In this study, the implication process of cloud security has been found. The improvement in cloud computing is possible including a lot of data. It needs to modify and develop patches if any data breaches occur in cloud security. One of the major limitations of cloud security is a technical problem. Data mobility is another problem because there may still be local storage where data can be stored. It depends upon the internet connection and a high risk still exists. Multi-Factor authentication can be implemented to protect the device and services from cyber-attacks. Security can be improved through the management of user access. The employees should train in anti-phishing techniques.

4.0 Implications and contributions to knowledge

According to the research on cloud computing systems, a mitigating technique for the banking sector is very important (Machkour and Abriane 2020). It helps to mitigate the time as well as helps to save important data in the company’s data cloud. That’s why it is easy to access and more convenient for the people as well as the banking employees. The knowledge of the research is very informative and important to know the facts about data storage policy in the banking sector.

4.1 Practical Implications

The practical means the actual and real result. People do not need to overstate it. The practical implication is important to fulfil certain conditions. After the analytical conduct and behavioural experiment, the primary and secondary data are collected for the implication of determining the effectiveness of behavioural remedies. The practical implication produces the desired results to aware people of cloud security and protect them from cyber attacks and data leakage.

4.2 Theoretical Implications

Theoretical implications are newly found additions that exist in the building materials and theories of the new theories of organization during the research work (Uchibeke, et al. 2018). From the research perspective, the main responsibility of the theory is to provide a promising and interesting area to work on.


The whole research indicates the importance of cloud computing systems in how store the data and manage them in accordance with the respective place in the computer. The main purpose of the mitigating technique (which is following the cloud computing system) in the banking sector is to mitigate the time as well as workload and simplify the glitches of the data. The overall research process follows the qualitative method and is implemented in various departments of the banking sector. To complete the whole research follows some important points like literature review, the practical implication of the study and theoretical implications, and so on. Overall the project is very helpful and convenient for the banking sector.

Reference list


Aldasoro, I., Gambacorta, L., Giudici, P. and Leach, T., 2022. The drivers of cyber risk. Journal of Financial Stability60, p.100989.

Alhenaki, L., Alwatban, A., Alamri, B. and Alarifi, N., 2019, May. A survey on the security of cloud computing. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-7). IEEE.

Bose, R., Chakraborty, S. and Roy, S., 2019, February. Explaining the workings principle of cloud-based multi-factor authentication architecture in banking sectors. In 2019 Amity International Conference on Artificial Intelligence (AICAI) (pp. 764-768). IEEE.

Dong, S., Abbas, K. and Jain, R., 2019. A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access7, pp.80813-80828.

Geng, Y., 2019. Homomorphic encryption technology for cloud computing. Procedia Computer Science154, pp.73-83.

Hosseinian-Far, A., Ramachandran, M. and Slack, C.L., 2018. Emerging trends in cloud computing, big data, fog computing, IoT and smart living. Technology for smart futures, pp.29-40.

Kadhim, Q.K., Yusof, R., Mahdi, H.S., Al-Shami, S.S.A. and Selamat, S.R., 2018, May. A review study on cloud computing issues. In Journal of Physics: Conference Series (Vol. 1018, No. 1, p. 012006). IOP Publishing.

Li, F., Lu, H., Hou, M., Cui, K. and Darbandi, M., 2021. Customer satisfaction with bank services: The role of cloud services, security, e-learning and service quality. Technology in Society64, p.101487.

Machkour, B. and Abriane, A., 2020. Industry 4.0 and its Implications for the Financial Sector. Procedia Computer Science177, pp.496-502.

Mehrban, S., Nadeem, M.W., Hussain, M., Ahmed, M.M., Hakeem, O., Saqib, S., Kiah, M.M., Abbas, F., Hassan, M. and Khan, M.A., 2020. Towards secure FinTech: A survey, taxonomy, and open research challenges. IEEE Access8, pp.23391-23406.

Porcedda, M.G., 2018. Patching the patchwork: appraising the EU regulatory framework on cyber security breaches. Computer law & security review34(5), pp.1077-1098.

Satheesh, M.K. and Nagaraj, S., 2021. Applications of artificial intelligence on customer experience and service quality of the banking sector. International Management Review17(1), pp.9-86.

Subramanian, N. and Jeyaraj, A., 2018. Recent security challenges in cloud computing. Computers & Electrical Engineering71, pp.28-42.

Tariq, M.I., 2019. Agent-based information security framework for hybrid cloud computing. KSII Transactions on Internet and Information Systems (TIIS)13(1), pp.406-434.

Thabit, F., Alhomdy, S.A.H. and Jagtap, S.B., 2019. Toward a model for cloud computing banking in Yemen. International Journal of Research in Advanced Engineering and Technology5(4), pp.14-18.

Uchibeke, U.U., Schneider, K.A., Kassani, S.H. and Deters, R., 2018, July. Blockchain access control ecosystem for big data security. In 2018 IEEE International Conference on Internet of Things (iThings) IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 1373-1378). IEEE.

Vafamehr, A. and Khodayar, M.E., 2018. Energy-aware cloud computing. The Electricity Journal31(2), pp.40-49.

Vinoth, S., Vemula, H.L., Haralayya, B., Mamgain, P., Hasan, M.F. and Naved, M., 2022. Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings51, pp.2172-2175.

It’s Time to Boost Your Grades with Professional Help
  • Improved Scores

    Get Better Grades In Every Subject

  • Timely Delivery

    Submit Your Assignments On Time

  • Experienced Writers

    Trust Academic Experts Based in UK

  • Safety is Assured

    Your Privacy is Our Topmost Concern

Rapid Assignment Help
Just Pay for your Assignment
  • Turnitin Report
  • Proofreading and Editing
  • Formatting
  • Unlimited revisions
  • Quality Check
  • Total
Let's Start
35% OFF
Get best price for your work
  • 6500+ Projects Delivered
  • 503+ Experts 24*7 Online Help

offer valid for limited time only*