Preview

Data Security

Good Essays
Open Document
Open Document
15434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Security
Master Thesis Electrical Engineering November 2011

Security Techniques for Protecting Data in Cloud Computing

Venkata Sravan Kumar Maddineni Shivashanker Ragi

School of Computing Blekinge Institute of Technology SE - 371 79 Karlskrona Sweden

i

This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering. The thesis is equivalent to 40 weeks of full time studies.

Contact Information: Author(s): Venkata Sravan Kumar Maddineni
Karlskrona, Sweden sravanmusic@gmail.com

Shivashanker Ragi Karlskrona, Sweden ragis38@gmail.com

External advisor(s): Mj Jens Kvarnberg Swedish Armed Forces jens.kvarnberg@mil.se
Mr. Ross W Tsagalidis Swedish Armed Forces wross@tele2.se

University advisor: Prof. Lars Lundberg, PhD School of Computing lars.lundberg@bth.se

School of Computing Blekinge Institute of Technology SE - 371 79 Karlskrona Sweden

Internet Phone Fax

: www.bth.se/com : +46 455 38 50 00 : +46 455 38 50 57 ii ABSTRACT
Context: From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. Aims and Objectives: The main aim of this research is to understand the security threats and identify the appropriate security techniques used to mitigate them in Cloud Computing. The main objectives of this research are:  To understand the security issues and the techniques used in the current world of Cloud Computing.  To identify the security challenges, those are expected in the future of Cloud Computing.  To suggest counter measures for the future challenges to be faced in Cloud Computing. Research Methodology: In this

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Cloud computing helps in bringing together complex IT documents in a small number of places, which can be managed easily. Although cloud computing has its advantages such as simplicity and cost, there are certain security concerns which have been brought about by users, as it involves storing important, and critical data in a shared and public environment. The issues on security concerns can be explained as follows:…

    • 2014 Words
    • 9 Pages
    Best Essays
  • Better Essays

    Secure Cloud

    • 1589 Words
    • 7 Pages

    CSQ1: Although cloud computing have the potential to deliver powerful benefits, they pose new challenges to system security and reliability. Cloud computing is indeed cloudy, and due to lack of transparency it creates so many problems. One of the major security issue is cloud computing is highly distributed. Cloud applications and application mash-ups reside in virtual libraries in large remote data centers and server mainly supplies business services and data management for multiple corporate and organizations clients.…

    • 1589 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Data Integrity

    • 500 Words
    • 3 Pages

    This section describes the rules that can be applied to table columns to enforce different types of data integrity.…

    • 500 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Data Encryption

    • 757 Words
    • 4 Pages

    The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send information electronically over the Internet or through a network. Date encryption is, in its simplest terms, the translation of data into a secret code. In order to read an encrypted file, the receiver of the file must obtain a secret key that will enable him to decrypt the file. A deeper look into cryptography, cryptanalysis, and the Data Encryption Standard (DES) will provide a better understanding of data encryption.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cloud Computing

    • 1561 Words
    • 7 Pages

    Cloud Computers contribute to organizations by providing a useful way for businesses to access instant on-demand networks to the Web, but the companies have less regulation over their information and the important data can be compromised. Thesis: It is of critical importance to find an all-inclusive resolution for strict internet security in order to protect data for businesses and in other areas with access to cloud computing.…

    • 1561 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Cloud computing describes a new supplement, consumption and delivery model of IT services based on Internet and it typically evolves over the Internet provision of dynamically scalable and often virtualized resources. Cloud Computing places organization 's sensitive data in control to third party which introduces a significant level of risk on the privacy and security of sensitive data of organization. The main responsibility of Private Virtual Infrastructure (PVI) is to share the security of cloud computing between the service provider and client and elimination of risk exposure between the two.…

    • 2691 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Cloud computing has recently developed as a new model for hosting and delivering services over the Internet. Since the development, the Cloud computing attracts different business owners by way of eliminating the requirement to plan in advance for IT hardware and software acquisition allowing the enterprises to start from scratch and they do not need to increase their resources but only when there is a growth in the service. Regardless of the fact that cloud computing offers huge opportunities to the IT industry and businesses, yet the development of cloud computing technology is currently in the early stages and has many issues to be addressed and researched. The purpose of this paper is to highlight the cloud computing technology pros and cons and its key concepts, from the business perspective as well as presenting all research challenges and security issues, plus identifying all important research directions in this new trend, so a better understanding of this technology will be obtained by enterprises prior to the technology adoption.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Rittinghouse, J.W. and Ransome, J.F. , 2010. Cloud computing : implementation, management, and security. [e-book] Boca Raton, Fla. ; London: CRC Press. Available.…

    • 4373 Words
    • 18 Pages
    Best Essays
  • Better Essays

    Data Encryption

    • 3732 Words
    • 15 Pages

    Often there has been a need to protect information from 'prying eyes'. In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals. Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personal freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going against the wishes of those who attempt to control.…

    • 3732 Words
    • 15 Pages
    Better Essays
  • Better Essays

    network intrusion detection

    • 10618 Words
    • 43 Pages

    Abstract—Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years.…

    • 10618 Words
    • 43 Pages
    Better Essays
  • Powerful Essays

    International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 01– Issue 02, November 2012…

    • 6383 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    A Thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science:…

    • 3433 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Expansion of Ideas

    • 2986 Words
    • 12 Pages

    This paper gives a brief about CLOUD COMPUTING and its growing impact in the sector of technology. It covers important parts like:…

    • 2986 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    My Personal Information

    • 5647 Words
    • 23 Pages

    We recommend acceptance of this manuscript in partial fulfillment of this candidate’s requirements for the degree of Master of Software Engineering in Computer Science. The candidate has completed the oral examination requirement of the capstone project for the degree.…

    • 5647 Words
    • 23 Pages
    Powerful Essays

Related Topics