Investigating how cloud computing may affect security and privacy issues
By
ACKNOWLEDGEMENT
I would like to take this chance for thanking my research facilitator, friends & family for the support they provided & their belief in me as well as guidance they provided without which I would have never been able to do this research.
DECLARATION
I, (Your name), would like to declare that all contents included in this thesis/dissertation stand for my individual work without any aid, & this thesis/dissertation has not been submitted for any examination at academic as well as professional level previously. It is also representing my very own views & not essentially which are associated with the university.
Signature:
Date:
ABSTRACT
Cloud computing, is an innovative network-based distributed computing paradigm that promises us that "we won't compute on local computers, but on centralized facilities operated by third- party compute and storage utilities". Compared to other distributed computing paradigms over the network, cloud computing has a few advantages that distinguish it from other similar paradigms. Cloud computing offers a scalable virtual Infrastructure to users and developers It gives the illusion of an unlimited resource for computation and data storage Since It allows users to start small and Increase computation or storage resources only when they need, It provides users With access to large amounts of "hardware resources" In a short time Interval Without requiring the users' fixed Investments or maintenance costs for expensive hardware. Cloud computing requires a new trust model that shares the security responsibility between service provider and client. The core security challenge of cloud computing is that the information owner does not control the hardware that is operating on his data. Complicating the situation is that the hardware is multi-tenant with shared resources among many users. We leverage trusted computing technology to build trust into utility cloud computing; however, existing techniques do not satisfactorily solve the problem. We define a new trust model for cloud computing and introduce three new mechanisms that provide for building trust into utility cloud computing environments and help solve the core security challenge of cloud computing. The threat profile increases considerably for cloud computing compared to traditional IT environments.
TABLE OF CONTENTS
ACKNOWLEDGEMENTII
DECLARATIONIII
ABSTRACTIV
CHAPTER 1: INTRODUCTION1
Background of the Research Study1
Problem Statement3
Aims of the Research Study3
Objectives of the Research Study3
Purpose of the Research Study4
Rationale of the Research Study4
Significance of the Research Study5
Research Questions6
CHAPTER 2: RESEARCH METHODS7
Introduction7
Research Method7
Overview of Qualitative and Quantitative Research Approaches8
Research Design9
Research Participants11
Benefits and Disadvantages of Mixed Method11
Informed Consent12
Confidentiality13
Validity13
Ethical Issues14
CHAPTER 3: DATA COLLECTION16
Introduction16
Primary Sources16
Secondary Sources16
Qualitative Data Analysis17
Interview Analysis Procedure17
Quantitative Data Analysis17
Introduction19
Survey Analysis19
Interview Analysis21
Privacy and Security Issues in Emerging Markets21
Changes in Revenues due to Cloud Computing Security Issues22
Value Chain Model in Cloud Computing22
Management in Cloud Computing Operations22
Major Players in Cloud Computing Industry23
Role of Information Technology in Cloud Computing25
Security Issues and Risks Associated with Cloud Computing26
Issues of Removing Bugs and Errors27
Technology of Cloud Computing28
Cost Effectiveness29
Availability of Services as an Issue33
Benefits of Economy of Scale through Cloud Computing34
Cloud Computing Adoption35
CHAPTER 5: CONCLUSIONS AND RECOMMENDATIONS1
Security and Risks2
Recommendations for Further Research4
CHAPTER 1: INTRODUCTION
Background of the Research Study
Cloud computing, is an innovative network-based distributed computing ...