The purpose of study is to evaluate and analyze cloud computing technologies with respect to potential security weaknesses in sensitive environments, and to further develop new technologies for implementing high assurance clouds.
Research Questions
- How can existing security mechanisms like security policy enforcement, identity and access management, incident response handling or auditing be adopted in large scale cloud environments?
- How distributed systems can be built with cloud services that provide end-to-end data confidentiality?
CHAPTER NO 2: LITERATURE REVIEW
Cloud computing is a technology that enables some of the tasks typically performed on the client, such as data processing or storage, offshore servers on the Internet. It provides multiple user benefits, including access data from anywhere via an Internet connection, the possibility of additional resources on demand or worry of maintenance. However, despite these advantages, the great reluctance by users to transfer data to the cloud includes confidentiality or privacy (Michael, 2010). Confidentiality or privacy can be affected; the guarantee that they can only access data by authorized users. The user, in principle, has no full control access to data provider. This aspect is especially vital for certain applications that work with sensitive data that cannot be compromised in any way (Warwick, 2010). Such applications will have their own banks, companies or hospitals, often by law.
Security and privacy are major concerns in the near future, since it seems that the authorities have been caught by surprise as the cloud computing and social media.
Cloud computing presents same system problems plus many other conventional new specifications (Robinson, 2009). Cloud computing has grown out of ...