A survey on security challenges in cloud computing: issues, threats, and solutions

  • Published: 28 February 2020
  • Volume 76 , pages 9493–9532, ( 2020 )

Cite this article

  • Hamed Tabrizchi 1 &
  • Marjan Kuchaki Rafsanjani   ORCID: orcid.org/0000-0002-3220-4839 1  

15k Accesses

219 Citations

3 Altmetric

Explore all metrics

Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection and the cost efficiencies that cloud computing can bring. The associated security and privacy challenges in cloud require further exploration. Researchers from academia, industry, and standards organizations have provided potential solutions to these challenges in the previously published studies. The narrative review presented in this survey provides cloud security issues and requirements, identified threats, and known vulnerabilities. In fact, this work aims to analyze the different components of cloud computing as well as present security and privacy problems that these systems face. Moreover, this work presents new classification of recent security solutions that exist in this area. Additionally, this survey introduced various types of security threats which are threatening cloud computing services and also discussed open issues and propose future directions. This paper will focus and explore a detailed knowledge about the security challenges that are faced by cloud entities such as cloud service provider, the data owner, and cloud user.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

cloud computing security thesis

Similar content being viewed by others

cloud computing security thesis

Cloud Computing Security Challenges: A Review

cloud computing security thesis

A Survey on Data Security Challenges and Their Solutions in Cloud Computing

cloud computing security thesis

Cloud Computing—Security, Issues, and Solutions

Subramanian N, Jeyaraj A (2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42

Google Scholar  

Mell P, Grance T (2018) SP 800-145, The NIST Definition of cloud computing | CSRC (online) Csrc.nist.gov. https://csrc.nist.gov/publications/detail/sp/800-145/final . Accessed 11 Dec 2018

Xu X (2012) From cloud computing to cloud manufacturing. Robot Comput Integr Manuf 28(1):75–86

Pippal SK, Kushwaha DS (2013) A simple, adaptable and efficient heterogeneous multi-tenant database architecture for ad hoc cloud. J Cloud Comput Adv Syst Appl 2(1):5

Shi B, Cui L, Li B, Liu X, Hao Z, Shen H (2018) Shadow monitor: an effective in-VM monitoring framework with hardware-enforced isolation. In: International Symposium on Research in Attacks, Intrusions, and Defenses. Springer, Berlin, pp 670–690

Bhamare D, Samaka M, Erbad A, Jain R, Gupta L, Chan HA (2017) Optimal virtual network function placement in multi-cloud service function chaining architecture. Comput Commun 102:1–16

Alzahrani A, Alalwan N, Sarrab M (2014) Mobile cloud computing. In: Proceedings of the 7th Euro American Conference on Telematics and Information Systems (EATIS’14)

Deka GC, Das PK (2018) Application of virtualization technology in IaaS cloud deployment model. In: Design and Use of Virtualization Technology in Cloud Computing: IGI Global, pp 29–99

Oracle.com (2018) The Oracle and KPMG Cloud Threat Report 2018 | Oracle (online). https://www.oracle.com/cloud/cloud-threat-report.html . Accessed 11 Dec 2018

Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115

Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698

Ramachandra G, Iftikhar M, Khan FA (2017) A comprehensive survey on security in cloud computing. Proc Comput Sci 110:465–472

Csrc.nist.gov (2018) SP 500-299 (DRAFT), NIST Cloud Computing Security Reference Architecture | CSRC (online). https://csrc.nist.gov/publications/detail/sp/500-299/draft . Accessed 11 Sept 2018

Yu S, Wang C, Ren K, Lou W (Mar 2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the IEEE INFOCOM

Sgandurra D, Lupu E (2016) Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput Surv 48(3):1–38

Kaur M, Singh H (2015) A review of cloud computing security issues. Int J Adv Eng Technol 8(3):397–403

Kumar PR, Raj PH, Jelciana P (2018) Exploring data security issues and solutions in cloud computing. Proc Comput Sci 125:691–697

Khalil I, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3(1):1–35

Bashir SF, Haider S (Dec 2011) Security threats in cloud computing. In: Proceedings of the International Conference for Internet Technology and Secured Transactions, pp 214–219

Ryan MD (2013) Cloud computing security: the scientific challenge, and a survey of solutions. J Syst Softw 86(9):2263–2268

Wang C, Wang Q, Ren K, Lou W (Mar 2010) Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE INFOCOM

Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200–222

Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3(1):1–35

Ahmed M, Litchfield AT (2018) Taxonomy for identification of security issues in cloud computing environments. J Comput Inf Syst 58(1):79–88

Fotiou N, Machas A, Polyzos GC, Xylomenos G (2015) Access control as a service for the Cloud. J Internet Serv Appl 6(1):11

Sumitra B, Pethuru C, Misbahuddin M (2014) A survey of cloud authentication attacks and solution approaches. Int J Innov Res Comput Commun Eng 2(10):6245–6253

Fernandes DA, Soares LF, Gomes JV, Freire MM, Inácio PR (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170

Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61

MATH   Google Scholar  

Abbas H, Maennel O, Assar S (2017) Security and privacy issues in cloud computing. Springer, Berlin

TechRepublic (2018) Building Trust in a Cloudy Sky (online). https://www.techrepublic.com/resource-library/whitepapers/building-trust-in-a-cloudy-sky/ . Accessed 11 Sept 2018

Basu S et al (2018) Cloud computing security challenges and solutions—a survey. In: Proceedings of the IEEE 8th Annual on Computing and Communication Workshop and Conference (CCWC), pp 347–356

Dzombeta S, Stantchev V, Colomo-Palacios R, Brandis K, Haufe K (2014) Governance of cloud computing services for the life sciences. IT Prof 16(4):30–37

Butun I, Erol-Kantarci M, Kantarci B, Song H (2016) Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Commun Mag 54(4):47–53

Saevanee H, Clarke N, Furnell S, Biscione V (2015) Continuous user authentication using multi-modal biometrics. Comput Secur 53:234–246

Khalil I, Khreishah A, Azeem M (2014) Consolidated identity management system for secure mobile cloud computing. Comput Netw 65:99–110

Faber T, Schwab S, Wroclawski J (2016) Authorization and access control: ABAC. In: McGeer R, Berman M, Elliott C, Ricci R (eds) The GENI book. Springer, Berlin, pp 203–234

Khan MA (2016) A survey of security issues for cloud computing. J Netw Comput Appl 71:11–29

Cai F, Zhu N, He J, Mu P, Li W, Yu Y (2018) Survey of access control models and technologies for cloud computing. Clust Comput 22(S3):6111–6122

Joshi MP, Joshi KP, Finin T (2018) Attribute based encryption for secure access to cloud based EHR systems. In: Proceedings of the International Conference on Cloud Computing

Indu I, Anand PR, Bhaskar V (2018) Identity and access management in cloud environment: mechanisms and challenges. Eng Sci Technol Int J 21(4):574–588

Mohit P, Biswas G (2017) Confidentiality and storage of data in cloud environment. In: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Springer, Berlin, pp 289–295

Khan SI, Hoque ASL (2016) Privacy and security problems of national health data warehouse: a convenient solution for developing countries. In: Proceedings of the IEEE International Conference on Networking Systems and Security (NSysS), pp 1–6

Tang J, Cui Y, Li Q, Ren K, Liu J, Buyya R (2016) Ensuring security and privacy preservation for cloud data services. ACM Comput Surv (CSUR) 49(1):13

Islam MA, Vrbsky SV (2017) Transaction management with tree-based consistency in cloud databases. Int J Cloud Comput 6(1):58–78

Ku C-Y, Chiu Y-S (2013) A novel infrastructure for data sanitization in cloud computing. In: Diversity, Technology, and Innovation for Operational Competitiveness: Proceedings of the 2013 International Conference on Technology Innovation and Industrial Management, pp 3–25

Singh HJ, Bawa S (2018) Scalable metadata management techniques for ultra-large distributed storage systems—a systematic review. ACM Comput Surv (CSUR) 51(4):82

Sehgal NK, Bhatt PCP (2018) Cloud computing concepts and practics. Springer

Prokhorenko V, Choo K-KR, Ashman H (2016) Web application protection techniques: a taxonomy. J Netw Comput Appl 60:95–112

Shin S et al (2014) Rosemary: a robust, secure, and high-performance network operating system. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, pp 78–89

Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput Commun 107:30–48

Sattar K, Salah K, Sqalli M, Rafiq R, Rizwan M (2017) A delay-based countermeasure against the discovery of default rules in firewalls. Arab J Sci Eng 42(2):833–844

Iqbal S, Kiah ML, Dhaghighi B, Hussain M, Khan S, Khan MK, Choo KKR (2016) On cloud security attacks: a taxonomy and intrusion detection and prevention as a service. J Netw Comput Appl 74:98–120

Mishra P, Pilli ES, Varadharajan V, Tupakula U (2017) Intrusion detection techniques in cloud environment: a survey. J Netw Comput Appl 77:18–47

Kohnfelder L, Garg P (1999) The threats to our products. Microsoft Interface, Microsoft Corporation, New York, p 33

Tounsi W, Rais HJC (2018) A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput Secur 72:212–233

Meinig M, Sukmana MI, Torkura KA, Meinel CJPCS (2019) Holistic strategy-based threat model for organizations. Proc Comput Sci 151:100–107

Mokhtar B, Azab MJAEJ (2015) Survey on security issues in vehicular ad hoc networks. Alex Eng J 54(4):1115–1126

Tan Y, Wu F, Wu Q, Liao XJTJOS (2019) Resource stealing: a resource multiplexing method for mix workloads in cloud system. J Supercomput 75(1):33–49

Hong JB, Nhlabatsi A, Kim DS, Hussein A, Fetais N, Khan KMJCN (2019) Systematic identification of threats in the cloud: a survey. Comput Netw 150:46–69

Haber MJ, Hibbert B (2018) Asset attack vectors. Apress, Berkeley, CA

Rai S, Sharma K, Dhakal D (2019) A survey on detection and mitigation of distributed denial-of-service attack in named data networking. In: Sarma H, Borah S, Dutta N (eds) Advances in communication, cloud, and big data. Lecture notes in networks and systems, vol 31. Springer, Singapore

Bojović P, Bašičević I, Ocovaj S, Popović M (2019) A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method. Comput Electr Eng 73:84–96

Eldewahi AE, Hassan A, Elbadawi K, Barry BI (2018) The analysis of MATE attack in SDN based on STRIDE model. In: Proceedings of the International Conference on Emerging Internetworking, Data and Web Technologies, pp 901–910

Tuma K, Scandariato R (2018) Two architectural threat analysis techniques compared. In: Proceedings of the European Conference on Software Architecture. Springer, Berlin, pp 347–363

Symantec.com (2019) Cloud Security Threat Report (CSTR) 2019 | Symantec (online). https://www.symantec.com/security-center/cloud-security-threat-report . Accessed 19 July 2019

Akshaya MS, Padmavathi G (2019) Taxonomy of security attacks and risk assessment of cloud computing. In: Peter J, Alavi A, Javadi B (eds) Advances in big data and cloud computing. Advances in intelligent systems and computing, vol 750. Springer, Singapore

Subramanian N, Jeyaraj AJC, Engineering E (2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42

Tan CB, Hijazi MHA, Lim Y, Gani A (2018) A survey on proof of retrievability for cloud data integrity and availability: cloud storage state-of-the-art, issues, solutions and future trends. J Netw Comput Appl 110:75–86

Ghafir I, Jibran S, Mohammad H, Hanan F, Vaclav P, Sardar J, Sohail J, Thar B (2018) Security threats to critical infrastructure: the human factor. J Supercomput 74(10):4986–5002

Yamin MM, Katt B, Sattar K, Ahmad MB (2019) Implementation of insider threat detection system using honeypot based sensors and threat analytics. In: Future of Information and Communication Conference. Springer, Berlin, pp 801–829

Osanaiye O, Choo K-KR, Dlodlo MJJON (2016) Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl 67:147–165

Alsmadi I (2019) Incident response. In: The NICE Cyber Security Framework, pp 331–346

Fernandes G, Rodrigues JJPC, Carvalho LF, Al-Muhtadi JF, Proença ML (2018) A comprehensive survey on network anomaly detection. Telecommun Syst 70(3):447–489

Nashimoto S, Homma N, Hayashi Y, Takahashi J, Fuji H, Aoki T (2016) Buffer overflow attack with multiple fault injection and a proven countermeasure. J Cryptogr Eng 7(1):35–46

Chen Z, Han H (2017) Attack mitigation by data structure randomization. In: Cuppens F, Wang L, Cuppens-Boulahia N, Tawbi N, Garcia-Alfaro J (eds) Foundations and practice of security. FPS 2016. Lecture notes in computer science, vol 10128. Springer, Cham

Cohen A, Nissim N, Rokach L, Elovici Y (2016) SFEM: structural feature extraction methodology for the detection of malicious office documents using machine learning methods. Expert Syst Appl 63:324–343

Sangeetha R (Feb 2013) Detection of malicious code in user mode. In: Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES)

Lichtman M, Poston JD, Amuru S, Shahriar C, Clancy TC, Buehrer RM, Reed JH (2016) A communications jamming taxonomy. IEEE Secur Priv 14(1):47–54

Wu M, Moon YB (2017) Taxonomy of cross-domain attacks on cyber manufacturing system. Proc Comput Sci 114:367–374

Bhagwani H, Negi R, Dutta AK, Handa A, Kumar N, Shukla SK (2019) Automated classification of web-application attacks for intrusion detection. In: Lecture notes in computer science, pp 123–141

Chen M-S, Park JS, Yu PS (1996) Data mining for path traversal patterns in a web environment. In: Proceedings of 16th International Conference on Distributed Computing Systems, pp 385–392

Murugan K, Suresh P (2018) Efficient anomaly intrusion detection using hybrid probabilistic techniques in wireless ad hoc network. Int J Netw Secur 20(4):730–737

Ghose N, Lazos L, Li M (2018) Secure device bootstrapping without secrets resistant to signal manipulation attacks. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), pp 819–835

Osanaiye O, Choo K-KR, Dlodlo M (2016) Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl 67:147–165

Zhang X, Zhang Y, Mo Q, Xia H, Yang Z, Yang M, Wang X, Lunand L, Duan H (2018) An empirical study of web resource manipulation in real-world mobile applications. In: Proceedings of the 27th Security Symposium (Security 18), pp 1183–1198

Coppolino L, D’Antonio S, Mazzeo G, Romano L (2017) Cloud security: emerging threats and current solutions. Comput Electr Eng 59:126–140

Gumaei A, Sammouda R, Al-Salman AMS, Alsanad A (2019) Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation. J Parallel Distrib Comput 124:27–40

Vlajic N, Chowdhury M, Litoiu M (2019) IP Spoofing in and out of the public cloud: from policy to practice. Computers 8(4):81

Download references

Author information

Authors and affiliations.

Department of Computer Science, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran

Hamed Tabrizchi & Marjan Kuchaki Rafsanjani

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Marjan Kuchaki Rafsanjani .

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Tabrizchi, H., Kuchaki Rafsanjani, M. A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76 , 9493–9532 (2020). https://doi.org/10.1007/s11227-020-03213-1

Download citation

Published : 28 February 2020

Issue Date : December 2020

DOI : https://doi.org/10.1007/s11227-020-03213-1

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cloud computing
  • Vulnerabilities
  • Data protection
  • Find a journal
  • Publish with us
  • Track your research

Research on Cloud Computing Security Platform

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

edugate

Cloud Computing Security Thesis Topics

         Cloud Computing Security Thesis Topics is one of our prime services for students and scholars to enable the viewer /reader to fully understand and grasp requirements and methodology of thesis writing.Researchers are currently interested in security in cloud computing, which will identify previous issues and vulnerabilities regarding the protection of users’ data.

Our experts are experts of experts in every field worldwide due to our seven years of experience and expertise. Simply we can say that our experts make you reach your dream destination. Our world-class certified experts refer to a hefty amount of reviews, and also in research works have been done on the subject of cloud computing, especially on concerns regarding security in cloud computing.

Try not to become a graduate but rather try to become a research…..

Computing Security Thesis Topics

     Cloud Computing Security Thesis Topics is a comprehensive guide for PhD/MS Theses/Dissertations and also for the subsequent process of graduation. Cloud computing is a paradigm to describe both platform and application, and a cloud user can also use computing resources, including storage, network, and software application.  We update our self with the most recent topics in cloud computing. Innovations creations are also our main theme of research for scholars and students worldwide.   

  We offer a list of topics with a lot of scope also for research scholars in the cloud computing security domain:

  • Key management and also cloud access control
  • Virtualized resources also for secure management
  • Data outsourcing by integrity assurance
  • Advanced privacy aware protocol design
  • Joint Security Mechanisms
  • Within and also across Data Centre’s secure management
  • Design trusted computing technology
  • Secure Cloud Architecture
  • Mobile Cloud Security
  • Data outsourcing also by secure computation
  • Cloud cryptography
  • Secure and also Fault tolerant Petri Net Model
  • Index management system
  • Multi tenancy clouds with privacy
  • Secure and also private virtual infrastructure

Advanced Research Areas in Cloud Computing

      In above we are also listed some research topics related to Security in Cloud computing. Although, many mature technologies from cloud computing can be used as a current projects that are follows:

  • VM technologies (Open Source Xen and also KVMs)
  • Amazon EC2, S3, IAM, VPC, and also Lamda
  • Microsoft Azure
  • Aneka Technology
  • Open Stack Cloud Environment
  • VMware Cloud

  Our Friendly Services

       We offer the following services with more friendly for students and scholars:

  • 24/7 customer support
  • On-time delivery
  • 0 o plagiarism fault tolerance
  • Most confidential
  • 100+ world class experts support
  • Money back guarantee
  • Quality and also novel research
  • 500+ Journal members

        Once the problem is found, the research proposal/synopsis is prepared. As far as we know, current problems that are also existed in cloud computing security, we can solve the problem in a fraction of a second. To save the time of research scholars and students, we also support your paper proposal, journal paper writing, thesis proposal, final thesis writing, proofreading, formatting, and journal publication.

Additionally our committee members go through the entire thesis and also solved the common errors and also mistakes noted by the reviewers over the years. To completely know our standard, call us at any time

If you don’t start your research, come and join with us today……..

We help you to build your best research………., related pages, services we offer.

Mathematical proof

Pseudo code

Conference Paper

Research Proposal

System Design

Literature Survey

Data Collection

Thesis Writing

Data Analysis

Rough Draft

Paper Collection

Code and Programs

Paper Writing

Course Work

ScholarWorks at WMU

  • < Previous

Home > Graduate College > Theses > 919

Masters Theses

Security and privacy in cloud computing.

Ramakrishnan Krishnan

Date of Award

Spring 2017

Degree Name

Master of Science

Computer Science

First Advisor

Dr. Leszek T. Lilien

Second Advisor

Dr. John Kapenga

Third Advisor

Dr. Ikhlas Abdul Qader

Cloud, cloud security, cloud privacy, intertwined security and privacy, cloud based services

Access Setting

Masters Thesis-Open Access

Cloud computing (CC) gained a widespread acceptance as a paradigm of computing. The main aim of CC is to reduce the need for customers' investment in new hardware or software by offering flexible cloud services, with a user reaping the benefits of the pay per use approach. CC demands addressing many security and privacy issues : both problems (vulnerabilities, threats, and attacks) and solutions (controls). The thesis discusses all these classes of problems and solutions, categorizing them as either security-related issues, privacy-related issues, or intertwined security and privacy issues. The main contributions of the thesis are twofold: first, using the above categorization of the issues; and second, the literature review of the security and privacy issues in CC within the categorization framework. The major lessons learned during this research include confirmation of the decisive role that security and privacy solutions play and will continue to play in adopting CC by customers; understanding numerous vulnerabilities, threats, and attacks; and identifying controls for these problems. In addition, the sheer number of references to trust (in both problems and solutions), demonstrated a significant role of trust in CC.

Recommended Citation

Krishnan, Ramakrishnan, "Security and Privacy in Cloud Computing" (2017). Masters Theses . 919. https://scholarworks.wmich.edu/masters_theses/919

Since July 06, 2017

Included in

Information Security Commons

ScholarWorks

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines

Author Corner

  • Graduate College

Western Michigan University Libraries, Kalamazoo MI 49008-5353 USA | (269) 387-5611

Home | About | FAQ | My Account | Accessibility Statement

Privacy | Copyright

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

thesis Cloud Computing & Security final.doc

Profile image of Md. Shihabul  Gani

A cloud is the powerful combination of cloud computing, storage, management solution. More and more turning to data storage, management in the cloud computing &amp; Security. It is often provided &quot;as a service “over the Internet, typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers. In this thesis paper we analysis about AWSEC2 and GCE and compare both which is better. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Google Compute Engine lets you create and run virtual machines on Google infrastructure. Compute Engine offers scale, performance, and value that allow you to easily launch large compute clusters on Google&#39;s infrastructure. There are no upfront investments and you can run thousands of virtual CPUs on a system that has been designed to be fast, and to offer strong consistency of performance. Arguably, Infrastructure as a Service (IaaS) is the most important cloud computing vertical. Within that, in terms of services and features, AWS enjoys the top position, while Google Cloud Platform is slowly catching up. In this post, we’ll discuss major differences between Amazon’s EC2 and Google Compute Engine (GCE). This paper we proposed a method by implementing RSA algorithm will explore data security of cloud in cloud computing by implementing digital signature and encryption with elliptic curve cryptography.

Related Papers

IJFRCSCE Journal

cloud computing security thesis

Journal of Computer Science IJCSIS

In today's modern IT everything is possible on the web by cloud computing, it allows us to create, configure, use and customize the applications, services, and storage online. The Cloud Computing is a kind of Internet-based computing, where shared data, information and resources are provided with computers and other devices on-demand. The Cloud Computing offers several advantages to the organizations such as scalability, low cost, and flexibility. In spite of these advantages, there is a major problem of cloud computing, which is the security of cloud storage. There are a lot of mechanisms that is used to realize the security of data in the cloud storage. Cryptography is the most used mechanism. The science of designing ciphers, block ciphers, stream ciphers and hash functions is called cryptography. Cryptographic techniques in the cloud must enable security services such as authorization, availability, confidentiality, integrity, and non-repudiation. To ensure these services of security, we propose an effective mechanism with a significant feature of the data. This paper is to show how to improve the security of the Cloud storage using the implementation of a hybrid encryption algorithm and hash functions. It proposes the implementation of two algorithms, Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES) with a secure hashing algorithm (SHA256) by using Netbeans IDE 8.0.2, JDK 1.7 tool and EyeOS2.5 as a cloud platform on ubuntu14.04.

Dr Manikandasaran S S , Arockiam Lawrence

Abstract— Current security scheme in cloud computing applied single encryption algorithm. However, usage of a single algorithm is not effective for high-level security requirement towards data processing in cloud computing. Therefore, this study proposes combination of AES, ECC and RSA encryption method to strengthen the security in cloud in terms of authentication and encryption. The method for this study is the text data has been encrypted using AES then, AES key have been encrypted by ECC only after that RSA will encrypt both the ciphertext and the encoding key again. Java NetBean is used to program the evaluation tool to calculate the performance of the encryption method. First, the tool has applied the three algorithms AES, ECC and RSA using a dataset consisting of multiple text file with different sizes. Evaluation has been performed using encryption time, decryption time and secrecy measure. Results showed that the proposed method has the ability to fulfil both efficiency and security factors with highest secrecy value. The impact of combination layer of encryption algorithms provides a higher secrecy value compared to single layer encryption. Keywords- cloud computing; AES; RSA; ECC; secrecy

International Journal of Advance Research in Computer Science and Management Studies [IJARCSMS] ijarcsms.com

International Journal of Scientific Research in Science, Engineering and Technology IJSRSET

At present, cloud computing is the fastest growing technology in today's world. Cloud computing is a model that provides the services based on as-needed and when-needed basis. Cloud computing provides online information storage, infrastructure and application. Many organizations shift towards cloud computing due to its benefits of less hardware maintenance and reduced expenditure start-up cost and at the same time, cloud computing offers many hazards. Network and Internet applications are growing very fast, since the need to secure these applications are very fast. For this purpose cryptography algorithms (symmetric & Asymmetric) are proposed. The use of relevant algorithm deals with the level of data safety in cloud because data security in cloud computing is a serious issue as the data centers are located worldwide. Authentication is the most essential procedure to ensure the cloud data in a secured manner. However, strong user authentication is the main requirement for cloud computing that reduces the unauthorized user access of data on cloud. Data security is a more important issue of cloud computing. Thus, the need to ensure the safety of information. Here in this survey paper, I have presented encryption based security algorithms for cloud computing.

IJCSMC Journal

IJIRST - International Journal for Innovative Research in Science and Technology

In Cloud computing, Data sharing is the important functionality. Secure distributed data storage was developed to reduce the burden of data owner from managing numerous files, by transferring the files from data owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver withoutthe necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Therefore, there is no guarantee that the outsourced files are not accessed by the unauthorized users and not modified by proxy servers is an important problem that has been considered. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, there are two Identity-Based Secure Distributed Data Storage (IBSDDS) schemes. The properties of IBSDDS schemes are as follows: The file owner can decide the access permission independently without the help of the private key generator; for one query, a receiver can only access one file, instead of all files of the owner. These schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy server, but cannot obtain the owner’s secret key. Though the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen cipher text attacks (CCA). To the best of our knowledge, it is the firstscheme where access permission is made by the owner for an exact file and collusion attacks can be protected.

TJPRC Publication

Cloud Computing is an emerging technology widely used in the IT sector due its wide range of characteristics. These characteristics serve a medium for the intruders to attack the cloud and its users. The security of cloud can be compromised by employing different strategies and techniques. Many systems and techniques have been proposed for solving the security issues and implementing a high level of security on both the sides. Encryption is one of the best method suggested for making the cloud more secure and increasing its areas of application. This paper contains an overall study and comparison of various cryptographic algorithms implemented for cloud security. We also study some hybrid systems designed using combination of various crypto terminologies for enhancing data security in cloud. The hybrid systems implement multiple cryptographic algorithms like RSA and Digital signature, Diffie Hellman and AES in combination with Digital signature. Some of the comparison parameters included are technique proposed, type of algorithm, algorithm, scalability.

RELATED PAPERS

Revista Monografias Ambientais

Heron Salazar Costa

Applied and Computational Mathematics

Gantulga Tsedendorj

International Journal of Economics and Finance

Dr. M. Wakilur Rahman

European Journal of …

luis eloy ledesma

Uripto Trisno Santoso

RöFo - Fortschritte auf dem Gebiet der Röntgenstrahlen und der bildgebenden Verfahren

Jin Yamamura

Tidsskriftet Antropologi

Perspectivas de la enseñanza en educación infantil

MARCELA DUARTE HERRERA

Human Organization

Carmen Ferradas

Eduardo Beche

Marine Environmental Research

Juan Muñoz Arnanz

Irodalom és kanonizáció : Tanulmányok a magyartanítás módszertanairól

Anett Farkas

Journal of Biomedicine and Biotechnology

Elena Stoppani

Faisal Al-Kasasbeh

Robert Blażlak

Biomedicines

Manop Panapoy

Risca Maharani

International Journal of Environmental Research and Public Health

Beneska Danka

Anais da Academia Pernambucana de Ciência Agronômica

carlos tavares

Janina Burandt

The Journal of Infectious Diseases

Daniela Rodriguez

Jessica Wright286

BioMed Research International

Abdul Samad

See More Documents Like This

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

cloud computing security thesis

  •   Home
  • University of Bedfordshire e-theses
  • PhD e-theses

A novel approach to providing secure data storage using multi cloud computing

Thumbnail

Description

Collections.

The following license files are associated with this item:

  • Creative Commons

entitlement

Attribution-NonCommercial-NoDerivatives 4.0 International

Related items

Showing items related by title, author, creator and subject.

Thumbnail

Multiple-clouds computing security approaches: a comparative study

A multi-cloud approach for secure data storage on smart device, personally identifiable information security in cloud computing, export search results.

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.

  • BE Projects
  • B Tech Projects
  • ME Projects
  • M Tech Projects
  • mca projects
  • Mini Projects for CSE
  • Mini Projects for ECE
  • Mini Projects for IT
  • IEEE Projects for CSE
  • IEEE Projects for ECE
  • Digital Image Processing Projects
  • Medical Image Processing Projects
  • Matlab Thesis
  • Fuzzy Logic Matlab
  • Matlab Projects
  • Matlab Simulation Projects
  • Matlab based Communication Projects
  • Medical Imaging Projects
  • Biomedical Engineering Projects
  • Image Processing Thesis
  • Scilab Projects
  • OpenCV Projects
  • Steganography Projects
  • Cryptography Projects
  • Cyber Security Projects
  • Network Security Projects
  • Information Security Projects
  • Wireless body area network projects
  • Wireless Communication Projects
  • Wireless Sensor Networks Projects
  • Wireless Network Projects
  • Router Projects
  • CAN Protocol Projects
  • NS2 Projects
  • NS3 Projects
  • Opnet Projects
  • Omnet Projects
  • Qualnet Projects
  • VANET Projects
  • Manet Projects
  • LTE Projects
  • Ad hoc projects
  • Software Defined networking projects
  • Peersim Projects
  • P2P Live Streaming Projects
  • Video Streaming Projects
  • Green Radio Projects
  • Distributed Computing Projects
  • PPI Projects
  • Cognitive Radio Projects
  • IoT Projects
  • m2m projects
  • Hadoop Projects
  • MapReduce Projects
  • Core Java Projects
  • Forensics Projects
  • Cloudsim Projects
  • Cloud Analyst Projects
  • Weka Projects
  • Pattern Recognition Projects
  • Gridsim Projects
  • Augmented Reality Projects
  • Android Projects
  • Rtool Projects
  • Software Engineering Projects
  • ARM Projects
  • Signal Processing Projects
  • GPS Projects
  • GSM Projects
  • RFID Projects
  • Embedded System Projects
  • LabVIEW Projects
  • Microcontroller Projects
  • Robotics Projects
  • VHDL Projects
  • FPGA Projects
  • Zigbee Projects
  • Simulink Projects
  • Power Electronics Projects
  • Renewable Energy Projects for Engineering Students
  • Writing Phd Thesis
  • Cognitive Radio Thesis
  • Vanet Thesis
  • Manet Thesis
  • Mobile Application Thesis
  • Neural Network Thesis
  • Security system Thesis
  • Steganography Thesis
  • Software Defined Networking Thesis
  • Wireless Network Sensor Thesis
  • Computer Science Thesis
  • M Tech Thesis
  • Phd Projects
  • Dissertation Writing Service

What is Cloud computing? Here we are giving you an overview of cloud computing security which is another most important domain in the cloud. Cloud computing security thesis is becoming important for the very same reason. You can check out with us as we are guiding cloud computing research projects since their introduction. Let us now start with the basics of the cloud and its security systems. Cloud Computing is chosen by individuals for allowing accessing the local servers. It is used for the following reasons.

  • Access from any place and time
  • Reduced cost (hardware)
  • Easy collaboration among all stakeholders 
  • No necessity of outsourcing (hardware maintenance)
  • Enhanced wireless connectivity 
  • Easy communication 

TYPES OF CLOUD COMPUTING

Cloud computing can be understood simply as a storage medium working in a virtual environment. With that understanding let us have an idea of different types of clouds.

  • Private  cloud
  • Public  cloud
  • Hybrid  cloud

These types of clouds are primarily based on the extent of cloud access provided to the users of the cloud . We have been very keen on ensuring the long-lasting security system as the most important need of our projects. We have also been very successful in producing research cloud computing security thesis . So we can support you in all ways in your research. Now we will let you know about cloud computing security architecture.

CLOUD COMPUTING SECURITY ARCHITECTURE

            Security in the cloud is a very important aspect of today’s world.  We are one of the best and top online research guidance providers. This was possible mainly for us because we are more professional in handling the user data and ensuring privacy . 

  Likewise ensuring the security of cloud data and protection of data during transmission of all the major concerns of cloud computing. The following are the important concerns of security in cloud computing.

  • Data separation 
  • Security in the storage of data
  • Data transfer security
  • Protection of user access control
  • Security in software interfaces

By enrolling in our guidance you get to know the practical essentialities of these concerns. While we commit to making you a successful project, we also take the responsibility of enriching your practical implementation knowledge about the field.  We let you understand the following related to cloud computing security.

  • Risks faced in cloud computing 
  • The most important security mechanism (threats and concerns)
  • Cloud security standards 
  • Including new cloud security system 
  • Security in the public cloud (resource center)

So you can feel free to connect with our experts. They are ready to guide you in your research project in all aspects. Now let us see about some of the features of security already in place in a cloud computing system. 

CLOUD COMPUTING SECURITY FEATURES

The following are the characteristics of cloud computing security . We can help you do your cloud security project with more ease and interest.

  • Security of data center (strong)
  • Databases and application Firewalls (internal)
  • Top of the line perimeter (firewall)
  • Encryption (Data at rest)
  • System to detect intrusion (based on event logging)

You need to understand the capacities of cloud computing for which it is adopted by a large chunk of the population. Our experts can give you all practical experience of implementing and understanding the technical nuances in execution. Connect with us to get more ideas on real-time cloud computing projects . In the following section, we will provide you with details on the capabilities of cloud computing.

CLOUD SECURITY CORE CAPABILITIES

The following capabilities are expected out of Cloud Computing Security . You need to be well aware of these so that it becomes easy for you to design your project.

  • Integrity  – getting exactly the same output as expected 
  • Confidentiality  – protecting the privacy of user (business or individual) 
  • Availability  – prevents DDoS threats

Projects are being built to enhance these capacities.  We are witnessing an increased interest among researchers to build their cloud security projects with advanced technologies incorporated into all these aspects of it. 

We have many of our projects built in the same advanced ways. So you can have a look into our projects and their success stories for which we will give you access to the cloud computing security thesis too. Now let us look into some of the expert tips for writing a thesis. 

THESIS WRITING TIPS

For writing the best Cloud computing Security Thesis, you need to add some important points to it . Our writers have great thesis writing skills for which they are praised by students and research scholars.  They have provided you with the following tips to remember. 

  • The objective of the research work must be specified correctly in the form of filling the research gap
  • The literature review must be up to date. Citations that are out of date must be removed. 
  • Only statistical information must be used to justify the better performance. 

As you know, these tips can help you fetch high value for your thesis. You can contact our developers and writers at any time. They are ready to clear your queries and support you in writing a thesis to win the hearts of the readers.

We can assist you in designing your cloud security project, provide you with technical details for its implementation, simulation, and analytical tools, write a thesis with grammatical checks and a standard internal review.  You can connect with us at any time and talk to our research experts regarding these. Now we will provide you with some important topics for your thesis in cloud security. 

CLOUD COMPUTING SECURITY THESIS TOPICS

Our experts have gained vast research experience in cloud computing technology. They are well trained with ample skills and are updated. They have now provided you with some of the most demanding or trending research and thesis topics in cloud computing security . You can have them for your choices. 

Research and thesis topics in cloud computing security can be broadly based into three heads where these are the primary parts of Cloud computing. 

  • Based on Data
  • Data discovery 
  • Classification of data
  • Based on people
  • Report on the activity of logs
  • The second layer of approval
  • Authentication 
  • Analyzing the behaviour of users
  • Controlling access
  • Based on Infrastructure 
  • Enforcing boundary 
  • Key management 
  • Segmentation based on logic
  • Encryption 
  • Configuration hardening 

These are the most important cloud computing security thesis topics.  We provide project guidance and thesis writing on all these topics.  You can connect with us to get access to a huge amount of reliable data on cloud security. This includes the information on projects that we implemented. The success of our projects gained us a huge reputation among the researchers of the world. Now we will provide you with a detailed account on the firewall. 

FIREWALL FOR CLOUD SECURITY

Primarily protection offered by firewall includes the following 

  • Blocking IP address 
  • Blocking (domain name and port) 
  • Inspection of states
  • Filtering (packets) 

Global Researchers are thriving on improving firewall security to ensure greater control and protection of user data . So it becomes important for you to understand the expected features of the next-generation advanced firewall. Our experts have given the details of research on advancement in firewall below. 

  • System to prevent intrusion 
  • Controlling applications 
  • In-depth inspection (packets) 
  • Encrypted traffic (analysis) 
  • Ultimate mechanism for detection and prevention of risks 

Most of the Projects in cloud security that we guided helped our customers design more advanced firewall systems comprising of the above features.  You can look into the performance analysis of our projects and understand the expertise of our technical team.  Now we will provide you with some more details on firewalls and their types.

TYPES OF FIREWALL

The following are the different types of firewalls. Due to the variation in behavior and structure, the firewall is classified as follows 

  • Software 
  • Next-generation 
  • Gateways (level of applications)
  • Gateways (level of the circuit) 
  • Inspecting (states) 
  • Firewalls for filtering (packets) 

Advanced techniques can be adopted to bring in improvements in every type of firewall given above. We are very much pleased to guide in cloud computing security thesis research .  You can connect with us to know more about our services.  Now let us look into the advantages of firewalls in cloud computing security. 

BENEFITS OF FIREWALL PROTECTION 

The following are the merits of using a firewall in cloud computing security . A basic firewall system is always advisable for using cloud services. But as the usage of the cloud is taken up for critical data and other sensitive information, advanced and multiple layers of security including one with a firewall is suggested. 

  • Controlled usage of the internet
  • Monitoring and alarming in case of misbehavior 
  • Using Protocol like WWW, FTP, etc (monitoring and other services) 
  • Prevent unauthorised users from access
  • Protect from private attacks

Our projects always revolved around all these benefits and we are renowned for bringing out the expected output at an excellent rate. Now it becomes crucial for you to know the performance metrics in cloud computing . We have provided it below. 

PERFORMANCE METRICS FOR CLOUD COMPUTING SECURITY 

The following performance metrics can be used to evaluate the effectiveness of your projects on cloud computing security. 

  • Fast Recovery of data
  • Number of Users 
  • Security (enhanced efficiency) 
  • Well defined Service Level Agreements 
  • Fault tolerance (high) 
  • Network bandwidth (coinciding with the quantity of services) 
  • Redundancy 
  • Scalability 
  • Workload 
  • Power of processor

Our experts have successfully solved the issues associated with these aspects. And our cloud computing security thesis proposal topics also showed results with maximum acceptance. So you can confidently connect with us and make use of our expert advice and services . 

  • CLOUD COMPUTING SECURITY THESIS [Professional Writers]

Cloud Computing Projects

Home / PhD Thesis in Cloud Computing Security

PhD Thesis in Cloud Computing Security

PhD Thesis in Cloud Computing Security will become the best part of the students in pursuing their PhD. We will go in the  right direction  for your  dream achievement . If you want your project more intelligent, read them across the world.

  Don’t panic  and  stop questioning  or  searching  for others; it is our job to do it for you. Every Monday morning, our mindset is so bright that it gives the tones power to work on the whole week. For each student, PhD course is their life.

‘ We are not just trainers; we are the principals of the cloud with containing a great resource.’

Our cloud computing projects is the  best PhD project help Centre  that completes tons of PhD works. It’s finished in a  high standardwithout any great efforts . Approach us for PhD Thesis in Cloud Computing Security . Our collection of resources is adequate also for your  whole PhD work . Since most of the PhD scholars are discontinues their work due to inadequate resources.

Implementing PhD Thesis in Cloud Computing Security

Cloud Computing Security Attacks

  • Authentication Attacks
  • Man-in-the Middle Attacks
  • Denial of Service Attacks
  • Side Channel Attacks
  • Cache Poisoning
  • DNS Amplification
  • IP Address Spoofing
  • Registrar Hijacking

Current Solutions Mechanism for Security Attacks

  • XML Encryption and Signature [XML Attacks]
  • Web Service Level Agreement [SLA Monitoring]
  • SOAP Security Extension [Web services Attacks]
  • Amazon DevPay [System Availability]
  • Traffic Encryption [Man in the Middle Attack]
  • Network monitoring [IP Spoofing]
  • Intrusion Detection and Prevention system [Port Scanning]
  • Logical Network Firewalls and Segmentation [DDOS]
  • Hadoop based Defense Solution [DoS Attack]
  • BASE (BGP Anti-Spoofing Extension) [IP Address Spoofing]
  • DNS Dampening [DNS Amplification]
  • Voice Over Internet Protocol optimized firewalls [Registrar Hijacking]

Advanced Topics – PhD Thesis in Cloud Computing Security

  • Agent based Secure Multi-Party Computation in Cloud
  • Cyber Threats Detection also in Virtualized Cloud
  • VM Scheduling using Dynamic Programming in Cloud
  • Anomaly Categorization in Multi-Cloud
  • Source Side DDoS Attacks Detection also in Cloud
  • Proxy-based Connection in Hybrid Cloud Virtual Network
  • Data Reconstruction also in Environmental Wireless Sensor Networks
  • Secure Mobile Cloud and Data Storage using RSA and Hashing
  • Hybrid Bayesian Network Infrastructure by MapReduce
  • Dynamic Encrypted Data Sharing also in Cloud Storage
  • Secure Data Access Control in IIoT based Fog
  • Secure Data Offloading in the Mobile Edge Cloud

In general, PhD course will require a weighty thesis topic. At the committee, it will easily reject and also need lots of effort for each PhD student. For any PhD scholar, we will support them till their end for PhD Thesis in Cloud Computing Security . With a specific and also single goal, we will help with your PhD work.

VM Migration

Related Pages

Cloud Computing Project Ideas

Cloud Based Projects

Projects Based On Cloud Computing

Cloud Computing Research Projects

Mini Projects In Cloud Computing

Simple Cloud Computing Projects

Cloud Computing Application Projects

Load Balancing In Cloud Computing Thesis

Projects On Cloud Computing

Cloud Computing Projects For Final Year Cse

Scheduling In Cloud Computing Thesis

Cloud Computing Projects For Engineering Students

Final Year Projects For Cse In Cloud Computing

Projects For Cse Final Year Students On Cloud Computing

Final Year Engineering Projects For Cse On Cloud Computing

Key Services

  • Literature Survey
  • Research Proposal
  • System Development
  • AWS Integration
  • Algorithm Writing
  • Paper Writing
  • Conference Paper
  • Thesis Writing
  • Dissertation Writing
  • Assignments

Testimonials

I really appreciate your project development team. Since, your source codes are very easy to understand and execute it. Thank you!

Happy Customer Wilson

You’re amazing and great working with you! I am totally satisfied with your paper writing. Keep up the best service for scholars!

Happy Client Lewis

Thank you so much for my project support and you guys are well done in project explanation. I get a clear vision about it.

Satisfied Client Eliza

You’ve been so helpful because my project is based on the AWS and HDFS integration. Before my commitment with you, I’ve a lot of fear, but you people rocked on my project.

Satisfied Customer Henry

Your project development is good and you made it so simple. Especially, codes are very new and running without any error.

Much Satisfied Client Frank

You exactly did my project according to my demand. I tried many services, but I get the correct result from you. So surely I will keep working with you!

Happy cloud Computing Project Customer

VIDEO

  1. Cloud Computing Security

  2. 2024-03-18 Cloud Computing (TI128, SI139, IF139)

  3. 2024-03-07 E-Business Application Development (SI146)

  4. Security in Cloud Computing Projects

  5. Cloud Computing Thesis Proposal

  6. The future of data security and management

COMMENTS

  1. PDF THE CONCEPT OF CLOUD COMPUTING AND THE MAIN SECURITY ISSUES IN IT

    THE CONCEPT OF CLOUD COMPUTING AND THE MAIN SECURITY ISSUES IN IT. This thesis focuses on studying and analyzing the Cloud Computing technology in concept and its security, which is still a developing technology with great convenience and portability for exchanging information over the Internet via different platforms.

  2. Security and privacy protection in cloud computing: Discussions and

    7.1. Challenges. Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1.

  3. Security and Privacy in Cloud Computing

    As technological advances continue, the reach and influence of cloud computing continue to rise. Even so, when organizations outsource data and business applications to CC providers (who are. third parties for them), security and privacy issues emerge as crucial concerns. Virtualization in Cloud Computing.

  4. PDF Security and Privacy in Cloud Computing: Technical Review

    Cloud security is dependent primarily on SaaS layers and web applications because they mainly offer cloud services. Therefore, the availability and security of the overall cloud services are dependent on the overall safety of the APIs, software applications, and web browsers [17]. Table 8. Common security attacks.

  5. A survey on security challenges in cloud computing: issues, threats

    Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection and the cost efficiencies that cloud computing ...

  6. PDF Towards Enhancing Security in Cloud Storage Environments

    cability in cloud computing. Current research in cloud data protection primarily falls into three main categories: 1) Authentication & Access Control, 2) Encryption, and 3) Intrusion Detection. This thesis examines the various mechanisms that currently exist to protect data being stored in a public cloud computing environment. It also looks at ...

  7. PDF ABSTRACT Security Analysis and Framework of Cloud Computing with By Ali

    Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System By Ali Asghary Karahroudy July, 2011 Director of Thesis or Dissertation: Dr. M.H.N. Tabrizi Major Department: Department of Computer Science Abstract - Cloud computing offers massive scalability, immediate availability, and low cost

  8. A Systematic Literature Review on Cloud Computing Security: Threats and

    Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and ...

  9. PDF SECURITY TECHNIQUES FOR PROTECTING DATA IN CLOUD COMPUTING

    In this research the SLR is undertaken to discover published papers related to the security challenges and mitigation techniques in Cloud Computing associated with security attacks. To achieve the research objectives we selected the papers published between 2001 and 2010.

  10. (PDF) Cloud Computing Security Threats and Attacks with Their

    N. Amara, Huang Zhiqui, Awais Ali [1] conducted a survey of Cloud Computing Security Threats and Attacks with their Mitigation Techniques. This paper discussed the architectural principles of ...

  11. (PDF) Thesis for MS (Computer Science) DEFINING AN EFFECTIVE SECURITY

    1.5 Thesis Organization Chapter 1: Introduction; contains introduction about cloud computing and problems need to be addresses. The chapter also discusses the objective and structure of the thesis. Chapter 2: Cloud Computing and Security; Contains detail discussion about cloud computing, cloud security, and security policy.

  12. PDF A Study on Cloud Computing Security Challenges

    Objectives: This thesis aims to identify security challenges for adapt- ... For this the objective is to identify exist-ing cloud computing security challenges and their solutions. Identify the challenges that have no mitigation strategies and gather solution-s/guidelines/practices from practitioners, for a challenge with more ...

  13. Research on Cloud Computing Security Platform

    As a kind of new technology, cloud computing has become a study highlight in both industrial field and academic field. As the users have to save their data in the cloud to use cloud computing, the security of cloud could affect users' trust in cloud computing service directly. The thesis discusses the architecture and tier of cloud computing, analyzes the basic system structure of cloud ...

  14. Cloud Computing: Security Issues and Research Challenges

    This book, written by recognized authorities in the tech security world, addresses issues that affect any organization preparing to use cloud computing as an option and provides the detailed information on cloud computing security that has been lacking, until now. Expand. 584. 1 Excerpt.

  15. Trending Top 10 Cloud Computing Security Thesis Topics

    Cloud Computing Security Thesis Topics is a comprehensive guide for PhD/MS Theses/Dissertations and also for the subsequent process of graduation. Cloud computing is a paradigm to describe both platform and application, and a cloud user can also use computing resources, including storage, network, and software application. ...

  16. "Security and Privacy in Cloud Computing" by Ramakrishnan Krishnan

    Cloud computing (CC) gained a widespread acceptance as a paradigm of computing. The main aim of CC is to reduce the need for customers' investment in new hardware or software by offering flexible cloud services, with a user reaping the benefits of the pay per use approach. CC demands addressing many security and privacy issues: both problems (vulnerabilities, threats, and attacks) and ...

  17. Information Security Risk Assessment Methods in Cloud Computing

    ABSTRACT. Cloud computing faces more security threats, requiring better security measures. This paper examines the various classification and categorization schemes for cloud computing security issues, including the widely known CIA trinity (confidentiality, integrity, and availability), by considering critical aspects of the cloud, such as service models, deployment models, and involved parties.

  18. thesis Cloud Computing & Security final.doc

    thesis Cloud Computing & Security final.doc. A cloud is the powerful combination of cloud computing, storage, management solution. More and more turning to data storage, management in the cloud computing & Security. It is often provided "as a service "over the Internet, typically in the form of infrastructure as a service (IaaS), platform as ...

  19. A novel approach to providing secure data storage using multi cloud

    This study aims to improve the security of the delivered cloud storage service via multiple-cloud computing and to develop an approach for providing a secure data storage system that could be installed, configured, and easily consumed through the appropriate multiple-cloud model. The developed approached is supposed to maintain the ...

  20. PDF Cloud Computing & tization: A Case Study and Future Trends THESIS

    Cloud computing (CC) is likely to prove commercial sustainability for many firms due to its flexibility and pay-as-you-go cost structure, particularly in the current situation of economic difficulties. This master thesis analyses the nature of CC and depicts how this technology

  21. Latest Cloud Computing Security Thesis Topics [Professional PhD Writers]

    Segmentation based on logic. Encryption. Configuration hardening. These are the most important cloud computing security thesis topics. We provide project guidance and thesis writing on all these topics. You can connect with us to get access to a huge amount of reliable data on cloud security.

  22. Cloud Computing Security Thesis [Novel Research PhD Proposal]

    Cloud Computing Security Thesis. Cloud Computing Security Thesis is a constant river that on the trot of raises scholar's skill. Writing a thesis is a demanding journey for the entire scholar's course. In general, PhD, MS, or any other degree students must write a thesis in cloud computing security. The quality of thinking is finding the ...

  23. PhD Thesis in Cloud Computing Security

    In general, PhD course will require a weighty thesis topic. At the committee, it will easily reject and also need lots of effort for each PhD student. For any PhD scholar, we will support them till their end for PhD Thesis in Cloud Computing Security. With a specific and also single goal, we will help with your PhD work.