Cloud computing solution
IV. The questions that I will answer in order to address my main research problem are the following:
What are some of the reasons a unified encryption approach towards cloud security and privacy is better than applying an encrypted approach on a case-to-case basis?
What would be the most effective encryption technique to address cloud computing security challenges and issues in the Australian context?