Is Security A Concern In Cloud Storage?

Read Complete Research Material



Is Security a Concern in Cloud Storage?

By

ACKNOWLEDGEMENT

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

ABSTRACT

Data storage is integral part of data centres architecture, over the years several storage solutions have been develop to satisfy applications requirements and demands. There is a diversity of storage alternatives offered, yet the most common ones are: Direct Attached Storage (DAS), Network-Attached Storage (NAS) and Storage Area Networks (SAN). Selection of appropriate data storage solution is complex process because the various needs and plans of each business applications. In large scale data centre SAN and NAS are dominating the market. Two significant computer advances - cloud technology and powerful mobile devices are revolutionizing how users work and the degree of control they experience over their data. Cloud computing is catalyzing a migration from in-house infrastructure and applications to remote public infrastructure and Web services; as a result, personal desktop applications are yielding to Web services such as Google Docs and Photoshop Express and IT-managed enterprise applications and data centres to cloud-based solutions such as Amazon AWS. Further, robust and usable small-form portable devices are encouraging users to adopt increasingly mobile computing habits. For example, travellers can carry gigabytes of data on their laptops and USB sticks, access calendars and e-mails on phones, and read documents with e-readers. While cloud and mobile computing enable pervasive data access and large-scale sharing, they also threaten users' sense of control over their data's security, privacy, and management. Users cede all data control to the Web service for example, when sending an email over Hotmail, posting a photo to Facebook, or uploading a document on 'Google Docs. The service can decide to retain the data for months after the user requests its deletion, to share it with others for monetary or legal reasons, or to replicate it on servers outside the user's jurisdiction. However, detrimental such practices are common place today. Similarly, losing a mobile device means users cannot securely erase their data, prevent access to it by thieves, or identify potentially compromised data.

TABLE OF CONTENTS

ACKNOWLEDGEMENTII

DECLARATIONIII

ABSTRACTIV

CHAPTER 1: INTRODUCTION1

Background of the Study1

Data breaches2

Research Problem Area3

Objectives of the Research Study3

Problem Statement4

Aims of the Research Study4

Purpose of the Research Study4

Rationale of the Research Study4

Significance of the Research Study5

Research Questions5

CHAPTER 2: LITERATURE REVIEW6

Theoretical Framework6

Background of the Study6

Cloud Storage6

Data Centres7

Root Causes of Lost of Data Control7

Benefits of Cloud Storage8

Cloud Storage Practice8

Security Risks in Cloud Storage8

History and Evolution of Cloud Computing8

Cloud Properties9

The properties or Characteristics of Cloud computing can be listed as follows :9

Functionality of Cloud10

Cloud Applications10

Advantages10

Disadvantages11

Security Requirements in a Cloud System11

Security Features Existing in a Cloud Environment12

Cloud Storage Serivce of Amazon12

Transfer of Data to Cloud System13

Functionality ...
Related Ads