Cloud Computing Security Phd Thesis TextIndustry has become very interested in cloud computing because of its potential for low investment and high flexibility. In academia, researchers want to investigate many aspects of cloud computing such as security and performance. A group of researchers and phd students from the school of computing science are investigating cloud computing. Although this is still an emerging field, we are very exciting to be working in this area. A brief summary of their research is as follows: abdulaziz alabdulhafez topic: targeted co location for attacking virtual machines in the cloud. John mace topic: automating and controlling the deployment of workflows/business processes on public cloud environments. Mohammed ibrahim m almanea topic: towards balanced security and transparency in the cloud. Aide Philosophie DissertationAbreu the final frontier: confidentiality and privacy in the cloud, ie computer, september 2011. Correia lucy in the sky without diamonds: stealing confidential data in the cloud, in proceedings of the 1st international workshop on dependability of clouds, data centers and virtual computing environments dcdv, with dsn'11 , hong kong, june 2011. Design and implementation of user managed access framework for web 2.0 applications. In: proceedings of the 5th workshop on middleware for service oriented computing, mw4soc 2010, held at the acm/ifip/usenix international middleware conference. In: proceedings of the second international conference on contemporary computing ic3. International journal of simulation: systems, science and technology 2004, 5 5 , 3 12. Persuasive Letter Writing HomeworkHewlett packard laboratories: school of computing science, university of newcastle upon tyne, 2003. In: self managing distributed systems: 14th ifip/ie international workshop on distributed systems: operations and management dsom. In: 3rd ie/acm international symposium on cluster computing and the grid ccgrid2003. How to Write An Engineering Phd ProposalHewlett packard laboratories: school of computing science, university of newcastle upon tyne, 2002. Cloud computing security is a rapidly emerging research area amidst growing security concerns among the companies availing cloud hosting services for their critical it systems. The virtual closed user group v cug mode of cloud computing operation, upon a massive shared real infrastructure shared among thousands of clients, is not yet well understood in the academic and even in the professional worlds. There are many unanswered questions because a direct analogy with self hosted infrastructure systems is not yet established. Regulators across the world are facing tough challenges in allowing the companies to host their critical it infrastructures on cloud computing platforms. Protection of user sessions from the threats on the internet takes us back to the old era of zone based firewall security system which was solved by establishing the public, secured and de militarised zones. Intrusion detection and prevention systems extended added advantages to the zone based security system. However, cloud computing hosting requires the user sessions to traverse the internet. What are service providers doing to ensure that one client do not get even accidental access to the dear visitor: please visit the page detailing subject areas of specialization pertaining to our services to view the broader perspective of our offerings for dissertations and thesis projects. Cloud computing infrastructures employ the same it components that corporations have been using in their self hosted infrastructures. However, clouds are deployed at massive scales with virtualization as their core technology. The security threats and vulnerabilities are the same that the world has been witnessing in self hosted real and virtual infrastructures. In self hosted environments, corporations have kept themselves secured by operating within cug closed user group environments, which are protected from the external world through peripheral devices like zone based firewalls, intrusion prevention systems, network admission control, anomaly control, antivirus/antispyware, etc. All users in the cug go through an organized authorization system to achieve privilege levels on the secured computers, and their activities are logged and monitored. The sessions between users and servers, that were highly protected on private ip addresses on cug lans, get exposed to public ip addresses of the internet. The security controls are out of the hands of the end customers, as the service providers own the clouds. The end user files and data gets spread across multiple physical hosts, with no identifiers determining the location of a component of a file/folder and its data. The service providers, on the other hand, use real components for the entire cloud and only virtual components for the end customers. Hence, personalisation becomes a major problem, because there is nothing real everything is just virtual everywhere the authentications, authorizations, accounting, file locations, database locations, sessions, application demands, servers, etc. The end users get virtual screens to manage their so called personalized cloudlet on a massive cloud infrastructure. The challenge is related to going back to the olden days of security controls, prevalent in real cug environments, and implementing them on the virtual cug environments. In your study, you can pick one of the prominent security challenges like access control, network control, de militarized zones, web services control, file/folder security controls, etc. In fact, you should prefer to choose an area that can be simulated on a network modelling and simulation platform like opnet, cisco packet tracer, omnet++, etc. Do not try to address more than one areas in your thesis, because your study would tend to get generalised. I propose that you should study the following areas in your dissertation/thesis project about cloud computing security: you may like to study data security services in cloud computing environments. Data security services in cloud computing is still mystery for the customers although service providers have implemented all standard technologies that you can imagine: stateful inspection firewalls, intrusion detection and prevention devices, web services firewalls, application firewalls, spam filters, antivirus, anti spyware, gateway level file inspections, etc. But customers are not able to specifically identify the controls applicable on their files/folders because they do not know the physical location of them as you must be knowing, files get distributed into multiple virtual machines spread across multiple data centres. In utm, a separate service provider builds a lot of controls for the customers that can be shared through 34 subscription model 34 similar to the cloud computing model and can assure security for the customers' assets by seamlessly integrating their utm solutions with the cloud hosting service providers. The customer just needs to buy a leased line connection to the utm provider and will get all the controls applicable on their hosted environments. Jl Chemistry Previous Papers In EnglishThe model appears like the following: currently, cloud computing service providers are operating in three different modes software as a service saas , platform as a service paas and infrastructure as a service iaas. However, a fourth mode is emerging rapidly to provide security solutions on cloud computing infrastructures unified threat management as a service utmaas. Unified threat management utm service for cloud hosting users is a rapidly emerging concept in which, the security controls for the end users are managed by a third party, that allow the user sessions from thousands of clients through their systems and ensure optimum protection and personalization. Their services span from network security controls to application security controls. European Union Law Dissertation Topics
© Copyright 2013 - 2016 - www.writehomestudio.com.
All rights reserved. |