When t he network administrators are asked regarding the level of visibility required to the organizations with respect to the data protection, one of the admin replied to the question like “We require a clear visibility of the data processing and we need a data log as well at regular intervals”. From this statement it is clear that, service providers should make a visible layer to the organizations such that the organizations can view their data operations without any restrictions and also a log should be prepared against all the day to day data operations and share to the clients as well. One of the network admin replied to the same question like “We need all the operations done on the private data by our employees and third parties on a regular interval and a details track of this is required”.

From his reply it is clear that if the organizations can view the private data operations done by their own employees or remote employees such that can be aware of all the data operations that were done at their own premises and remote location as well. When the same question is asked to one of the network admin, he replied that “Visibility of data depends on the level of applications that access the data and we required 100% visibility such that we need to track the application level metrics that uses and manipulates the data”.

From this statement it is clear that, there are many applications that run across the organizations and these applications will operate on the clients data in several manners and a clear view of the application level database operations are required in this context to understand what applications are modifying or manipulating the data objects of the organization that were saved across the remote locations.  When one of the network admin is asked the question, he replied that “Visibility to our data should be given and this visibility should be at different levels such that the top management can view all the data objects”.

From his opinion it is clear that even the visibility should be at different levels and the low level employees should be provided a less visibility of the data operations when compared to the top levels and finally the top level management should be given the top priority in this context. One of the network admin replied to the same question like “Irrespective of the data issues faced these days a clear vision should be given to us to understand what happening around and we should be able to track the status of the data operations executed at the remote location”.

From his reply it is clear that even there are some issues with the security of the data that was stored across the remote locations by the organizations, the companies should be aware of all the things that were happening out of the enterprise and even the service providers should make sure they provide the maximum visibility to the organizations in this context. Thus from this overall analysis it is clear that, visibility of the data operations executed at the remote location is really important to track and implement the required security measures to the data of the organizations in all the possible aspects. 

When the network administrators are asked regarding their future plans of improving the data security of their organization against the cloud services, one of the network admin replied that “We are planning to migrate from the public cloud mechanism to private cloud and also insisting the service providers to create a private space for us at their location”.

From this statement it is clear that, the primary solutions for more data security is that public clouds can be migrated to the private clouds and thus more security is added to the clients from the perspective of the service providers. Providing the private space to the individual clients is also the best way to create optimal security solutions against the data protection of the organizations.

One of the admin replied to the same question like “In future we are planning to create a security alliance with the service providers and discuss the audit regularly without any failures”. From his reply it is clear creating a security alliance with the service providers can be considered as the best solution in this context as they can discuss the security threats and issues in the audit process on a regular interval with the service providers and thus getting updated with all the issues.

When the same question is asked to one of the network admin, he replied that “In future we are planning to have a dedicated cloud for us and don’t want to share the Information to the service providers or any other third parties.”  From this analysis it can be observed that always maintaining the private clouds would be the optimal solution to have more access and security to the client’s data and also sharing only few parts of the data to the service providers is also the possible solution in this context.

One of the network client replied to the same question like “We are doing lot of research and development on different security models for protecting the organizational data and in future we will implement them”. From his reply it is clear that, most of the organizations are doing a lot of R and D towards development of their own security models for protecting the data and if this is the case, there is lot of scope for introduction of the sophisticated security models and even they can be used for more applications and can be integrated with the existing applications and security models.

When one of the network admin is asked the same question, he replied that “We are planning to have a hybrid cloud such that, all the data and application tiers are under our control and we can monitor each and every aspect in detail”. From his opinion it is clear that, a hybrid cloud can be implemented across the future cloud computing services, thus both the application and database layers are tightly integrated in this process and even the clients can have the complete control over the database and application operations.