Cloud Computing in Safeguarding customers data in the cloud: Survey, Implementation and Models
By
ABSTRACT4
CHAPTER 1: INTRODUDCTION5
1.1 Background5
1.2 Aims and Objectives of the Study7
1.3 Statement of the Problem7
1.4 Research Questions (RQ)8
1.5 Scope and Limitations8
CHAPTER 2: LITERATURE REVIEW9
2.1 Introduction9
2.2 Cloud Computing Issues in Security of Information12
2.3 Solutions against Cloud Security Issues13
2.4 Deployment Models of Cloud Computing14
2.4.1 Private Cloud14
2.4.2 Public Cloud15
2.4.3 Community Cloud:16
2.4.4 Hybrid Cloud17
2.5 Cloud Computing for Business18
CHAPTER 3: METHODOLOGY21
3.1 Introduction21
3.2 Research Methodology21
3.2.1 Importance of Qulitative Research23
3.2.2 Case Study Discussion and Analysis24
3.2.3 Importance of Case study Approach25
CHAPTER 4: DATA FINDINGS26
CHAPTER 5: DATA ANALYSIS27
5.2 RQ127
5.2.1 Cloud Security Issues27
5.2.2 Privileged user access28
5.2.3 Regulatory Compliance28
5.2.4 Data Location29
4.2.5 Recovery29
5.2.6 Investigative support29
5.2.7 Data Lock-In30
5.2.8 Privacy Issue30
5.3 RQ231
5.4 RQ334
5.4.1 Solutions to Ensure the Confidentiality of Information35
5.5 RQ440
5.5.1 Cloud Computing Characteristics40
5.5.2 Broad network access41
5.5.3 Rapid elasticity41
5.5.4 Measured service42
5.5.5 Software as a Service (SaaS)43
5.5.6 Platforms as a Service (PaaS)44
5.5.7 Infrastructure as a Service (IaaS)45
CHAPTER 6: CONCLUSION AND RECOMMENDATION46
6.1 Conclusion46
6.2 Recommendation47
REFERENCES50
Abstract
The new developments in the field of information technology offered the people enjoyment, comforts and convenience. Cloud computing is one of the latest developments in the Information Technology industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. Cloud computing is a deployment model used by the Information Technology (IT) industry to reduce the infrastructure costs and/or address capacity/scalability concerns. Basically, it is the nuts and bolts of the Internet and networking and how applications and services are utilized that really determines if something is or is not cloud computing. Declaring that an application or service is operating in the cloud is primarily dependent on the behaviour of the entire infrastructure and how an application is delivered. This paper is a qualitative study which includes detailed analysis of major security threats in cloud computing, impact of cloud computing on the cost of companies business and the solutions to ensure the confidentiality of information in cloud computing. This paper also discusses the services, characteristics and deployment models of Cloud Computing.
CHAPTER 1: INTRODUDCTION
Cloud computing is considered as the most exciting technology since, it is linked to the cost effective operations that enhances flexibility and ability to handle gross amount of work in computer processes. Within few years cloud computing has emerged as growing business of information technology (IT) sector and thus, IT organizations are expressing their concerns about critical issues of securing information in cloud computing. For that reason, the comparison study regarding to the benefits and risks in cloud computing is considerable in order to evaluate the reliability and viability in cloud computing. In addition to this, cloud computing is providing a network based surroundings that merely spotlights on computational or related resources sharing and acknowledging several benefits to the IT world however, this technology are bringing issues of potential risk and compliance concerns. On the other hand, IT industry is making legal framework that can potentially protect and manage cloud adopter in terms of providing potential benefits and adequate security related to issues (Farrell, ...