Chapter Five
Chapter Five
5.0 INTRODUCTION
This chapter summarized the main overview of the study, all the processes and
procedures used in gathering data, the research methodology and the result.
Conclusions about the research were also drawn. Recommendations for future use
of the study were also stated.
5.1 Summary
Chapter one is the introduction of the proposed project. It covers the project details
such as problem statement, scope and limitation of the study, aim and objectives,
significance of the study. The problem statement describes the issue faced by the
user in the current system and the development of the project. While the objectives
explain the study target which is expected to be accomplish by the of the
development phases. Lastly, the study scope will list out the limitation of the
project to be developed.
Chapter two has presented the overview of the broad context and research within
which this study is based, and also narrows down to the more specific context of
the study. The chapter has also provided and overview of the conceptual. The
chapter also presented a review of the related literatures or past related works as
well as their shortcomings upon which this project is trying to improve.
This chapter three has presented the methodology adopted in conducting this
research and reasons behind the choice of the methodology. It also provided, in
advance, the method used in collecting data as well as the justification for doing
so.
5.2 Conclusion
The identification of security challenges and mitigation techniques in Cloud
Computing is challenged by considering the large number of services. Most of the
responses from survey, noted that Cloud Computing will place dominant and
expandable information transactions. Because it offers many flexible services,
provides easy, individualized and instant access control to the services and
information where they are for the users. In the process of identification from the
research methods SLR and Survey, we have identified satisfactorily number of
challenges and mitigation techniques in current and future Cloud Computing.
From the analysis of results from survey we have identified the following security
challenges
REFERENCES
Ahmed S, Raja M. (2010) 'Tackling Cloud security issues and forensics model',
High Capacity Optical Networks and Enabling technologies (HONET) , 19-21
Dec, pp. 190-195.
Ahuja R. (June 2011) 'SLA Based Scheduler for Cloud storage and Computational
Services', International Conference on Computatonal Science and Applications
(ICCSA), 258-262.
B. lagesse. (Mar.2011) 'Challenges in Securing the Interface between the cloud and
Pervasive Systems', 2011 IEEE International Conference on Pervasive Computing
and Communications Workshops, 106-110.
Brenner Michel, Wiebelitz Jan. (may 31, 2011) 'Secret program execution in the
Cloud applying homomorphic encryption', Digital Ecosystems and Technologies
Conference (DEST), 5th IEEE International Conference 2011, 114-119.
C.C Ragin. (1997) 'Turning the tables: How case - oriented research challenges
variable oriented research', Comparative social research, vol. 16, pp. 27-42.
C.C Ragin. (2000) Fuzzy set science, Chicago: The University of Chicago.
Chang Lung Tsai, Uei –Chin Lin. (Aug 2010) 'Information Security issue of
enterprises adopting the application of Cloud Computing', 6th International
Conference on Networked Computing and Advanced Information Management
(NCM), 645-649.
Chenguang Wang, Huaizhi Yan. (Dec 2010) 'Study of Cloud Computing security
based on Private Face Recognition', International Conf. on Computational
Intelligence and Software Engineering, 1-5.
Cong Wang, Kui ren. (2010) 'Toward publicly auditable secure cloud data storage
services', Network, IEEE, vol. 24, no. 4, July, pp. 19-24.
Cong Wang, Qian Wang. (March 2010) 'Privacy Preserving Public Auditing for
Data storage security in Cloud Computing', INFOCOM 2010, IEEE, 1-9.
Cong Wang, Qian Wang. (2009) 'Ensuring data storage security in Cloud
Computing', International Workshop on Quality of Service, 1-9.
Ford R.B. (2011) 'Information Security in the Cloud', Network Security, vol. 2011,
no. 4, April, pp. 15-17.
Huimei Wang, Ming Xian. (May 2011) 'Cloud Evaluation method of Network
Attack resistance Ability', Network Computing and Information Security (NCIS),
239-243.
Jia Weiwei Zhu, Haojin Cao. (10-15 April, 2011) 'A Secure data service
mechanism in mobile Cloud Computing', Computer Communications Wrokshops
(INFOCOMWKSHPS), IEEE Conference 2011, 1060 - 1065.
Jin Li, Gansen Zhao. (2010) 'Fine-Grained Data Access Control Systems with User
Accountability in Cloud Computing', 2nd International Conference on Cloud
Computing Technology and Science, 89-96.
Jun Feng, Yu Chen. (Jan 2010) 'Bridging the Missing link of Cloud data storage
security in AWS ', 7th IEEE conf. on Consumer Communications and Networking
Conference (CCNC), 1-2.
Jun Feng, Yu Chen. (Jan 2011) 'Enhancing Cloud storage security against rool-
back attacks with a new fais multi party non-repudation protocol', Consumer
Communications and Networking Conference (CCNC), IEEE conference 2011,
521522.
Zhang Jianhong, Chen Hua. (Sept 2010) 'Security storage in the Cloud Computing:
A RSA based assumption data integrity check without original data', International
Conf. on Educational and Information technology (ICEIT), 143-147.
Zhidong Shen, Qiang Tong. (July 2010) 'The Security of Cloud Computing System
enabled by trusted Computing Technology', 2nd International Conference on
Signal Processing Systems (ICSPS), 11-15.
Zhidong Shen, Li Li. (May 2010) 'Cloud Computing System Based on Trusted
Computing Platform', Intelligent Computation Technology and Automation
(ICICTA), 942-945.