A short term proposal submitted for the registration of Ph.D. in Computer Science.
Researcher
Guide
Swami Ramanand Teerth Marathwada University
Nanded, Mahrrashtra, India
INTRODUCTION
Cloud computing provides a new computing paradigm that delivers IT as a service. The objectives of the new computing paradigm are to increase capacity and capabilities at runtime without investing in new infrastructure, licensing new software, and training new recruits. Cloud computing permits customers to utilize cloud services on the fly in pay-as-you-go manner [1,2] through the Internet.
The services provided by the cloud computing environment are: • Infrastructure as a Service (IaaS), • Data storage as a Service (DaaS), • Communication as a Service (CaaS), • Security as a Service (SecaaS), • Hardware as a Service (HaaS), • Software as a Service (SaaS), • Business as a Service (BaaS), • and Platform as a Service (PaaS).
There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.[3] In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
Security is very important to considered so in this proposal we try to elaborate and analyze the various unresolved issues in the cloud computing environment and try to propose alternative techniques which can be useful to the various architecture of controlling security in cloud computing.
AIMS:
Our aim is to exist and validate
References: [1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, Above the clouds: a Berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb. 2009. [2] R. Ranjan, A. Harwood, R. Buyya, Grid federation: an economy based distributed resource management system for large-scale resource coupling, Technical Report GRIDS-TR-2004-10, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, 2004. [3] "Swamp Computing a.k.a. Cloud Computing". Web Security Journal. 2009-12-28. Retrieved 2010-01-25 [4] Mr.S.Subbiah et al “Enhanced Survey and proposal to secure the data in Cloud Computing Environment” International Journal Of Engineering Sciences And Technology (IJEST) January 2013 [5] Shilpashree Srinivasamurthy et al. “Survey on Cloud Computing Security”Indiana University – Purdue University Fort [6] D.Kanchana, Dr. S.Dhandapani “A Novel Method for Storage Security in Cloud Computing”. International Journal of Engineering Science and Innovative Technology (IJESIT) March 2013 Researcher