Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security Techniques for protecting data in Cloud Computing
Blekinge Institute of Technology, School of Computing.
Blekinge Institute of Technology, School of Computing.
2012 (English)Independent thesis Advanced level (degree of Master (Two Years))Student thesisAlternative title
Säkerhetstekniker för att skydda data i Cloud Computing (Swedish)
Abstract [en]

Context: From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. Aims and Objectives: The main aim of this research is to understand the security threats and identify the appropriate security techniques used to mitigate them in Cloud Computing. The main objectives of this research are: • To understand the security issues and the techniques used in the current world of Cloud Computing. • To identify the security challenges, those are expected in the future of Cloud Computing. • To suggest counter measures for the future challenges to be faced in Cloud Computing. Research Methodology: In this study, we have used two research methods. • Systematic Literature Review. • Survey and interviews with various security experts working on Cloud Computing. Result: As a result, we have identified the total of 43 security challenges and 43 security techniques. The most measured attribute is confidentiality (31%) followed by integrity (24%) and availability (19%). The impact of identified mitigation techniques is mainly on security (30%), followed by performance (22%) and efficiency (17%). Also we have identified 17 future challenges and 8 mitigation practices. Conclusion: The identification of security challenges and mitigation techniques in large number of services of Cloud Computing is a very challenging task. In the process of identification from research methods (SLR and Survey), we had identified a satisfactory number of challenges and mitigation techniques which are being used at present and also in future Cloud Computing.

Place, publisher, year, edition, pages
2012. , p. 75
Keywords [en]
Challenges, Cloud Computing, Security, Techniques
National Category
Computer Sciences Telecommunications
Identifiers
URN: urn:nbn:se:bth-3430Local ID: oai:bth.se:arkivexFAC3BCA68DD3A85AC12579910060E0C9OAI: oai:DiVA.org:bth-3430DiVA, id: diva2:830736
Uppsok
Technology
Supervisors
Available from: 2015-04-22 Created: 2012-01-26 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(1559 kB)47677 downloads
File information
File name FULLTEXT01.pdfFile size 1559 kBChecksum SHA-512
fd9aeb2832dee7cd990b8bf0b16d57186e39c796e840099c970fb44854285d82aa534444b9b57b65d911f2392d60fb0722badcccde1c430310991baba5aebf8d
Type fulltextMimetype application/pdf

By organisation
School of Computing
Computer SciencesTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 47679 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 1490 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf