Investigating How Cloud Computing May Affect Security And Privacy Issues

Read Complete Research Material



Investigating how cloud computing may affect security and privacy issues

By

ACKNOWLEDGEMENT

I would like to thank my supervisor for supporting me throughout my project and giving his valuable suggestions. Finally thanks to all my friends and family for their utmost support and inspiration.

DECLARATION

I, (Your name), would like to declare that all contents included in this dissertation stand for my individual work without any aid, & this dissertation has not been submitted for any examination at academic as well as professional level previously. It also represents my own views & not essentially the ones associated with university.

Signed __________________ Date _________________

TABLE OF CONTENTS

ACKNOWLEDGEMENTii

DECLARATIONiii

CHAPTER 2: LITERATURE REVIEW1

2.1 Introduction1

2.3 Types of Clouds2

2.4 Data breaches3

2.5 Cloud Computing: Directions For The Conscious Use Of Services5

2.6 Guarantor for the Protection of Personal Data6

2.7 Benefits6

2.8 Disadvantages8

2.9 Layers9

2.9.1 Software As A Service9

2.9.2 Platform As A Service9

2.9.3 Infrastructure As A Service10

2.10 Security Implications11

2.11 Security Measures by Agencies13

2.11.1 Cloud Computing Architectural Framework13

2.11.2 Governance and Enterprise Risk Management13

2.11.3 Legal14

2.11.4 Electronic Discovery14

2.11.5 Compliance and Audit14

2.11.6 Information Lifecycle Management14

2.11.7 Portability and Interoperability15

2.11.8 Traditional Security, Business Continuity and Disaster Recovery15

2.11.9 Data Center Operations15

2.11.10 Incident Response, Notification and Remediation16

2.11.11 Application Security16

2.11.12 Encryption and Key Management16

2.11.13 Identity and Access Management16

2.11.14 Storage17

2.11.15 Virtualization17

2.12 Analysis of Cloud Computing17

2.13 Challenges to the Cloud Computing System18

2.14 Guidelines For Responsible Use Of Cloud Services19

2.14.1 Ponder Priority Risks And Benefits Of The Services Offered19

2.14.2 Carry Out An Audit Regarding The Reliability Of The Supplier19

2.14.3 Give Priority To Services That Promote Data Portability20

2.14.4 Ensure The Availability Of Data In Case Of Need20

2.14.5 Select The Data To Be Inserted In The Cloud21

2.15 Delivery Models for Cloud Security Alliance21

REFERENCES24

CHAPTER 2: LITERATURE REVIEW

2.1 Introduction

The research study is based on the investigation of how cloud computing may affect security and privacy issues in the firms that have been using it in its management system for the sound working of the business operations. The invention of the cloud computing has proved to be an important step that provide various opportunities to the industry of Information Technology, academics and the whole economy as it is considered to be the revolution in the information technology. In comparison to the different distributions with respect to the computing paradigm for example High Performance Computing (HPC) and Grid Computing (GC) etc., the cloud computing has proved to be an important computing system that has provided broader inter operations within the networks of the world wide web. It has proved to be worthwhile to expect that the operations of the cloud computing has brough variety of changes in every aspect of the IT sector while adding to other sectors of the economy at the same time. In this respect, other leaders in the IT industry like IBM, Amazon, Google etc are also trying hard to encourage the innovative paradigms in the computing industry. The literature review section of the research study takes into account different past studies that have been performed by the researchers in this field and are considered to be important with respect to the cloud computing. Different sections have been elaborated in this chapter ...
Related Ads