Preview

Data Security

Good Essays
Open Document
Open Document
15434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Security
Master Thesis Electrical Engineering November 2011

Security Techniques for Protecting Data in Cloud Computing

Venkata Sravan Kumar Maddineni Shivashanker Ragi

School of Computing Blekinge Institute of Technology SE - 371 79 Karlskrona Sweden

i

This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering. The thesis is equivalent to 40 weeks of full time studies.

Contact Information: Author(s): Venkata Sravan Kumar Maddineni
Karlskrona, Sweden sravanmusic@gmail.com

Shivashanker Ragi Karlskrona, Sweden ragis38@gmail.com

External advisor(s): Mj Jens Kvarnberg Swedish Armed Forces jens.kvarnberg@mil.se
Mr. Ross W Tsagalidis Swedish Armed Forces wross@tele2.se

University advisor: Prof. Lars Lundberg, PhD School of Computing lars.lundberg@bth.se

School of Computing Blekinge Institute of Technology SE - 371 79 Karlskrona Sweden

Internet Phone Fax

: www.bth.se/com : +46 455 38 50 00 : +46 455 38 50 57 ii ABSTRACT
Context: From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. Aims and Objectives: The main aim of this research is to understand the security threats and identify the appropriate security techniques used to mitigate them in Cloud Computing. The main objectives of this research are:  To understand the security issues and the techniques used in the current world of Cloud Computing.  To identify the security challenges, those are expected in the future of Cloud Computing.  To suggest counter measures for the future challenges to be faced in Cloud Computing. Research Methodology: In this

You May Also Find These Documents Helpful

  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Cloud computing helps in bringing together complex IT documents in a small number of places, which can be managed easily. Although cloud computing has its advantages such as simplicity and cost, there are certain security concerns which have been brought about by users, as it involves storing important, and critical data in a shared and public environment. The issues on security concerns can be explained as follows:…

    • 2014 Words
    • 9 Pages
    Best Essays
  • Better Essays

    Secure Cloud

    • 1589 Words
    • 7 Pages

    CSQ1: Although cloud computing have the potential to deliver powerful benefits, they pose new challenges to system security and reliability. Cloud computing is indeed cloudy, and due to lack of transparency it creates so many problems. One of the major security issue is cloud computing is highly distributed. Cloud applications and application mash-ups reside in virtual libraries in large remote data centers and server mainly supplies business services and data management for multiple corporate and organizations clients.…

    • 1589 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Data Integrity

    • 500 Words
    • 3 Pages

    This section describes the rules that can be applied to table columns to enforce different types of data integrity.…

    • 500 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Data Encryption

    • 757 Words
    • 4 Pages

    The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and the Data Encryption Standard (DES) will provide a better understanding of data encryption.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Rittinghouse, J.W. and Ransome, J.F. , 2010. Cloud computing : implementation, management, and security. [e-book] Boca Raton, Fla. ; London: CRC Press. Available.…

    • 4373 Words
    • 18 Pages
    Best Essays
  • Better Essays

    Data Encryption

    • 3732 Words
    • 15 Pages

    Often there has been a need to protect information from 'prying eyes'. In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals. Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personal freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going against the wishes of those who attempt to control.…

    • 3732 Words
    • 15 Pages
    Better Essays
  • Powerful Essays

    Cloud Computing

    • 1561 Words
    • 7 Pages

    Cloud Computers contribute to organizations by providing a useful way for businesses to access instant on-demand networks to the Web, but the companies have less regulation over their information and the important data can be compromised. Thesis: It is of critical importance to find an all-inclusive resolution for strict internet security in order to protect data for businesses and in other areas with access to cloud computing.…

    • 1561 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Cloud computing describes a new supplement, consumption and delivery model of IT services based on Internet and it typically evolves over the Internet provision of dynamically scalable and often virtualized resources. Cloud Computing places organization 's sensitive data in control to third party which introduces a significant level of risk on the privacy and security of sensitive data of organization. The main responsibility of Private Virtual Infrastructure (PVI) is to share the security of cloud computing between the service provider and client and elimination of risk exposure between the two.…

    • 2691 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    A Thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science:…

    • 3433 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    network intrusion detection

    • 10618 Words
    • 43 Pages

    Abstract—Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years.…

    • 10618 Words
    • 43 Pages
    Better Essays
  • Powerful Essays

    International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 01– Issue 02, November 2012…

    • 6383 Words
    • 26 Pages
    Powerful Essays

Related Topics