Cloud Computing Security

Read Complete Research Material



[Cloud Computing Security]

By

Acknowledgement

I like to give my thanks to supervisor who has taught us brilliantly to conduct our research. I would also like to thanks my family and friends for their constant support in making this research possible.

DECLARATION

I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

ABSTRACT

The concept of cloud computing defines cloud computing as an alternative method of improving the capacity of without incurring additional cost. It has been defined as a affordable and flexible way of providing consumers with computer resources. In the cloud computing program, the computational power and the database storage capacity is pooled which can be shared by different number of users. But concerns exist about hackers finding ways to insert malware into cloud computing systems.

TABLE OF CONTENTS

ABSTRACT4

CHAPTER I: INTRODUCTION7

Hypervisor Issues10

Problem Statement11

Aims & Objectives12

CHAPTER II: RESEARCH METHODOLOGY13

Orientation13

Literature review13

Case Selection15

Data Analysis15

Design & specification of the framework16

CHAPTER III: SECURITY CHALLENGES IN CLOUD COMPUTING17

TRUST17

Susceptibility in virtualization20

Accessibility21

Backup21

Identity management and sign-on process22

Security Issues In Paas25

Security Issues In IAAS25

Impact of deployment model26

Security identification of threats28

CHAPTER IV: HYPERVISOR BASED CLOUD COMPUTING39

Low and high level confidentiality43

CHAPTER V: RELATED WORKS45

Creation of security domains48

Cryptographic separation of data49

Certificate-based authorization49

CHAPTER VI: PROPOSED SOLUTION FOR HYPERVISOR51

Security Issues in SAAS55

Grid and Cloud Computing58

CHAPTER VII: EVALUATION AND COMPARISON64

CHAPTER VIII: CONCLUSION AND FUTURE WORKS73

REFERENCES76

CHAPTER I: INTRODUCTION

In the history of computer science, many attempts have been made to unlock users from computer hardware needs to the commercial system of grid in the 1960. The abstract is getting more realistic as more and more business leaders in the field of science are getting attracted towards cloud computing. Cloud computing is referred as the future of computing, a driving force which is totally catering to the need of security to the consumers or users. Cloud computing has removed and diminished the complexities of the users.

This paper proposes a security solution, which leverages clients from the security burden, by trusting a Third Party. The Third Party is tasked with assuring specific security characteristics within a distributed information system, while realizing a trust mesh between involved entities, forming federations of clouds. This research is based on the basic engineering of soft wares and different approaches to information design systems. The collection of requirement and the abstract analysis are the basic steps for the system design.

In today' era, medium and small business (SMB) corporations are beginning to realize that by achieving at the top, a company can gain quick access to a afar more better business applications or in other words, to boost their business infrastructure to a higher level without any additional cost.

Gartner (Jay Helser, 2009, p.102) explains cloud computing as a method of calculating where high tech IT services are delivered to external customers using various internet technologies and techniques. Cloud suppliers are presently enjoying a reflective opportunity in the ...
Related Ads