Cloud Computing Security: How Secure Is The Cloud?

Read Complete Research Material



Cloud Computing Security: How Secure is the Cloud?

by

ACKNOWLEDGEMENT

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

ABSTRACT

In this study we try to explore the concept of Cloud Computing in a holistic context. The main focus of the research is on the security of cloud computing. The research discusses the concept of cloud computing and provides details on the advantages and disadvantages of cloud computing. The research also analyses many security concerns related to cloud computing. Furthermore, the research also provides some security measures that cloud providers have taken to strengthen the security of cloud computing. Finally the research suggests ways to improve the security of cloud computing. The research is conducted using secondary methodology and only 2010 and 2011 files have been accessed to collect the data.

TABLE OF CONTENTS

ACKNOWLEDGEMENTII

DECLARATIONIII

ABSTRACTIV

CHAPTER 1: INTRODUCTION1

Background of the Study1

Research Aim and Objectives3

Significance of the Study3

Research Questions5

Definition of Terms5

CHAPTER 2: LITERATURE REVIEW8

Cloud Computing8

Cloud Computing Background and History8

Cloud Computing Methods10

Need for Cloud Computing11

Cloud Computing: Advantages and Disadvantages13

Advantages13

Disadvantages16

Cloud Computing Security Concerns19

CHAPTER 3: METHODOLOGY24

Research Approach24

Advantages and Disadvantages of Secondary Data24

Data collection procedure25

Search Technique25

Literature Search26

Inclusion and exclusion criteria26

Additional Online searches26

Search terms - key terms27

CHAPTER 4: DISCUSSION AND ANALYSIS28

Security Requirements in a Cloud System28

Security Measures Taken By Cloud Providers29

Amazon29

Host Operating System29

Guest Operating System30

Firewall31

API31

Back-up32

Certifications32

Physical Security32

Network Security32

SalesForce34

Physical Security34

Certification and Data Transmission34

Network Security34

Recovery Management and Data Back-up34

Testing35

Certifications and Principles35

SLA (Service Level Agreement)35

Open Cloud Manifesto36

HIPPA37

EU - U.S. Safe Harbour Privacy Principles37

Recent Cloud Failures38

Recent Attempts to Address Cloud Security41

Privacy Preserving Public Auditing41

Privacy Preserving Audit and Extraction of Digital Contents43

CHAPTER 5: CONCLUSION45

Recommendation45

Cloud-based protection45

Hashing and Cloud Security48

Cryptographic Hash Function49

Integrity Check using Hash Function50

Hash Paths52

Conclusion53

Research Objective 153

Research Objective 254

Research Objective 355

Research Objective 456

REFERENCES58

Chapter 1: Introduction

Background of the Study

Cloud computing is the area which has gained wide attention in all kinds of industries (Zhang, 2010, 7). It is a widely used computing technique which provides three main models SaaS (Software as a service), PaaS (Platform as a service) and IaaS (infrastructure as a service). These models work on a pay-per-use system and provide users the ability to access their database and applications remotely. Very common examples are Google's App Engine, Amazon's EC2 and S3 and Microsoft Azure. The services provided by the clouds include resources like data storage or software and hardware services (Sultan, 2010, 109). Users can use these resources at very low cost on pay-per-use method. The data owners can save the cost of installing and maintaining their own new software or hardware by moving their businesses into the clouds.

Cloud computing has several key characteristics that differentiate it from other forms of computing such as standalone computing, mobile computing, grid computing, and other computing ...
Related Ads