Data Security

Topics: Cloud computing / Pages: 62 (15434 words) / Published: Aug 21st, 2013
Master Thesis Electrical Engineering November 2011

Security Techniques for Protecting Data in Cloud Computing

Venkata Sravan Kumar Maddineni Shivashanker Ragi

School of Computing Blekinge Institute of Technology SE - 371 79 Karlskrona Sweden

i

This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering. The thesis is equivalent to 40 weeks of full time studies.

Contact Information: Author(s): Venkata Sravan Kumar Maddineni
Karlskrona, Sweden sravanmusic@gmail.com

Shivashanker Ragi Karlskrona, Sweden ragis38@gmail.com

External advisor(s): Mj Jens Kvarnberg Swedish Armed Forces jens.kvarnberg@mil.se
Mr. Ross W Tsagalidis Swedish Armed Forces wross@tele2.se

University advisor: Prof. Lars Lundberg, PhD School of Computing lars.lundberg@bth.se

School of Computing Blekinge Institute of Technology SE - 371 79 Karlskrona Sweden

Internet Phone Fax

: www.bth.se/com : +46 455 38 50 00 : +46 455 38 50 57 ii ABSTRACT
Context: From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. Aims and Objectives: The main aim of this research is to understand the security threats and identify the appropriate security techniques used to mitigate them in Cloud Computing. The main objectives of this research are:  To understand the security issues and the techniques used in the current world of Cloud Computing.  To identify the security challenges, those are expected in the future of Cloud Computing.  To suggest counter measures for the future challenges to be faced in Cloud Computing. Research Methodology: In this

You May Also Find These Documents Helpful

  • Data Security
  • Data security
  • Data Security
  • Data Security
  • Data Security
  • Data Security in Healthcare
  • data security process
  • Data protection and security
  • Data Mining in Homeland Security
  • Data Security and Mobile Devices