Cloud Computing Security: How Secure is the Cloud?
by
ACKNOWLEDGEMENT
I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.
DECLARATION
I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.
Signed __________________ Date _________________
ABSTRACT
In this study we try to explore the concept of Cloud Computing in a holistic context. The main focus of the research is on the security of cloud computing. The research discusses the concept of cloud computing and provides details on the advantages and disadvantages of cloud computing. The research also analyses many security concerns related to cloud computing. Furthermore, the research also provides some security measures that cloud providers have taken to strengthen the security of cloud computing. Finally the research suggests ways to improve the security of cloud computing. The research is conducted using secondary methodology and only 2010 and 2011 files have been accessed to collect the data.
TABLE OF CONTENTS
ACKNOWLEDGEMENTII
DECLARATIONIII
ABSTRACTIV
CHAPTER 1: INTRODUCTION1
Background of the Study1
Research Aim and Objectives3
Significance of the Study3
Research Questions5
Definition of Terms5
CHAPTER 2: LITERATURE REVIEW8
Cloud Computing8
Cloud Computing Background and History8
Cloud Computing Methods10
Need for Cloud Computing11
Cloud Computing: Advantages and Disadvantages13
Advantages13
Disadvantages16
Cloud Computing Security Concerns19
CHAPTER 3: METHODOLOGY24
Research Approach24
Advantages and Disadvantages of Secondary Data24
Data collection procedure25
Search Technique25
Literature Search26
Inclusion and exclusion criteria26
Additional Online searches26
Search terms - key terms27
CHAPTER 4: DISCUSSION AND ANALYSIS28
Security Requirements in a Cloud System28
Security Measures Taken By Cloud Providers29
Amazon29
Host Operating System29
Guest Operating System30
Firewall31
API31
Back-up32
Certifications32
Physical Security32
Network Security32
SalesForce34
Physical Security34
Certification and Data Transmission34
Network Security34
Recovery Management and Data Back-up34
Testing35
Certifications and Principles35
SLA (Service Level Agreement)35
Open Cloud Manifesto36
HIPPA37
EU - U.S. Safe Harbour Privacy Principles37
Recent Cloud Failures38
Recent Attempts to Address Cloud Security41
Privacy Preserving Public Auditing41
Privacy Preserving Audit and Extraction of Digital Contents43
CHAPTER 5: CONCLUSION45
Recommendation45
Cloud-based protection45
Hashing and Cloud Security48
Cryptographic Hash Function49
Integrity Check using Hash Function50
Hash Paths52
Conclusion53
Research Objective 153
Research Objective 254
Research Objective 355
Research Objective 456
REFERENCES58
Chapter 1: Introduction
Background of the Study
Cloud computing is the area which has gained wide attention in all kinds of industries (Zhang, 2010, 7). It is a widely used computing technique which provides three main models SaaS (Software as a service), PaaS (Platform as a service) and IaaS (infrastructure as a service). These models work on a pay-per-use system and provide users the ability to access their database and applications remotely. Very common examples are Google's App Engine, Amazon's EC2 and S3 and Microsoft Azure. The services provided by the clouds include resources like data storage or software and hardware services (Sultan, 2010, 109). Users can use these resources at very low cost on pay-per-use method. The data owners can save the cost of installing and maintaining their own new software or hardware by moving their businesses into the clouds.
Cloud computing has several key characteristics that differentiate it from other forms of computing such as standalone computing, mobile computing, grid computing, and other computing ...