I like to give my thanks to supervisor who has taught us brilliantly to conduct our research. I would also like to thanks my family and friends for their constant support in making this research possible.
DECLARATION
I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.
Signed __________________ Date _________________
ABSTRACT
The concept of cloud computing defines cloud computing as an alternative method of improving the capacity of without incurring additional cost. It has been defined as a affordable and flexible way of providing consumers with computer resources. In the cloud computing program, the computational power and the database storage capacity is pooled which can be shared by different number of users. But concerns exist about hackers finding ways to insert malware into cloud computing systems.
TABLE OF CONTENTS
ABSTRACT4
CHAPTER I: INTRODUCTION7
Hypervisor Issues10
Problem Statement11
Aims & Objectives12
CHAPTER II: RESEARCH METHODOLOGY13
Orientation13
Literature review13
Case Selection15
Data Analysis15
Design & specification of the framework16
CHAPTER III: SECURITY CHALLENGES IN CLOUD COMPUTING17
TRUST17
Susceptibility in virtualization20
Accessibility21
Backup21
Identity management and sign-on process22
Security Issues In Paas25
Security Issues In IAAS25
Impact of deployment model26
Security identification of threats28
CHAPTER IV: HYPERVISOR BASED CLOUD COMPUTING39
Low and high level confidentiality43
CHAPTER V: RELATED WORKS45
Creation of security domains48
Cryptographic separation of data49
Certificate-based authorization49
CHAPTER VI: PROPOSED SOLUTION FOR HYPERVISOR51
Security Issues in SAAS55
Grid and Cloud Computing58
CHAPTER VII: EVALUATION AND COMPARISON64
CHAPTER VIII: CONCLUSION AND FUTURE WORKS73
REFERENCES76
CHAPTER I: INTRODUCTION
In the history of computer science, many attempts have been made to unlock users from computer hardware needs to the commercial system of grid in the 1960. The abstract is getting more realistic as more and more business leaders in the field of science are getting attracted towards cloud computing. Cloud computing is referred as the future of computing, a driving force which is totally catering to the need of security to the consumers or users. Cloud computing has removed and diminished the complexities of the users.
This paper proposes a security solution, which leverages clients from the security burden, by trusting a Third Party. The Third Party is tasked with assuring specific security characteristics within a distributed information system, while realizing a trust mesh between involved entities, forming federations of clouds. This research is based on the basic engineering of soft wares and different approaches to information design systems. The collection of requirement and the abstract analysis are the basic steps for the system design.
In today' era, medium and small business (SMB) corporations are beginning to realize that by achieving at the top, a company can gain quick access to a afar more better business applications or in other words, to boost their business infrastructure to a higher level without any additional cost.
Gartner (Jay Helser, 2009, p.102) explains cloud computing as a method of calculating where high tech IT services are delivered to external customers using various internet technologies and techniques. Cloud suppliers are presently enjoying a reflective opportunity in the ...