0% found this document useful (0 votes)
47 views7 pages

Chapter Five

This chapter summarizes the main points of the study, including the research methodology and results. It draws conclusions about the research questions. It provides recommendations for future use of the study. The chapter reviews each chapter of the document. For the three research questions, it outlines security challenges identified and mitigation techniques. It recommends focusing on specific areas like regulatory issues and guidelines to address future challenges in cloud security.

Uploaded by

uthmannazir2627
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views7 pages

Chapter Five

This chapter summarizes the main points of the study, including the research methodology and results. It draws conclusions about the research questions. It provides recommendations for future use of the study. The chapter reviews each chapter of the document. For the three research questions, it outlines security challenges identified and mitigation techniques. It recommends focusing on specific areas like regulatory issues and guidelines to address future challenges in cloud security.

Uploaded by

uthmannazir2627
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.0 INTRODUCTION
This chapter summarized the main overview of the study, all the processes and
procedures used in gathering data, the research methodology and the result.
Conclusions about the research were also drawn. Recommendations for future use
of the study were also stated.

5.1 Summary
Chapter one is the introduction of the proposed project. It covers the project details
such as problem statement, scope and limitation of the study, aim and objectives,
significance of the study. The problem statement describes the issue faced by the
user in the current system and the development of the project. While the objectives
explain the study target which is expected to be accomplish by the of the
development phases. Lastly, the study scope will list out the limitation of the
project to be developed.

Chapter two has presented the overview of the broad context and research within
which this study is based, and also narrows down to the more specific context of
the study. The chapter has also provided and overview of the conceptual. The
chapter also presented a review of the related literatures or past related works as
well as their shortcomings upon which this project is trying to improve.

This chapter three has presented the methodology adopted in conducting this
research and reasons behind the choice of the methodology. It also provided, in
advance, the method used in collecting data as well as the justification for doing
so.

Chapter four considered as result of the research.

5.2 Conclusion
The identification of security challenges and mitigation techniques in Cloud
Computing is challenged by considering the large number of services. Most of the
responses from survey, noted that Cloud Computing will place dominant and
expandable information transactions. Because it offers many flexible services,
provides easy, individualized and instant access control to the services and
information where they are for the users. In the process of identification from the
research methods SLR and Survey, we have identified satisfactorily number of
challenges and mitigation techniques in current and future Cloud Computing.

5.2.1 For Research Question: 1


In the case of some part of local network data placed in the Cloud the security
challenges and mitigation techniques were discussed in a method. Most of the
security challenges and techniques that are being used in current Cloud Computing
environment are listed in appendix. Few of the popular security techniques that are
identified are Identity based authentication, Service Level Agreement (SLA), Third
party auditor, Message authentication codes, Role based access control
mechanism, Proof of retrievability, time bound ticket-based authentication scheme.
The impact of these security techniques includes on Confidentiality, Integrity,
Availability and security. If you need to exchange sensitive or confidential
information between a browser and a web server, Encryption is an obvious tool to
protect communication. Proper encryption of data and encryption of transmission
is necessary.

The mitigation techniques identified from the survey is as follows:

 SSL (Secure Socket layer)


 VPN (Virtual Private Network)
 IPSec (Internet Protocol Security)
 A proper use of encryption can give good protection against active
attacks.
 In order to protect against Man-in-the-middle attacks, one should observe
if there are any delayed response times, in order to detect if there is any
“Middleman”.
 A proper use of encryption can give good protection against eaves
dropping. Traffic analysis is harder, but on the other hand, not only that
many need protection against this kind of threat.

5.2.2 For Research Question: 2


We have identified the security techniques that are used in the case of when data
resides in the Cloud in Systematic process. The identified challenges, mitigation
techniques and compromised attributes are described in Appendix section. The few
popular security methods are Secure Socket Layer (SSL) Encryption; Multi
Tenancy based Access Control, Intrusion Detection System, Novel Cloud
dependability model, Hadoop Distributed File System and Hypervisor.

From the analysis of results from survey we have identified the following security
challenges

 Secure identification of users (authentication, e.g. with smart cards or


passwords)
 Secure communication (e.g. encryption)
 Secure IT-infrastructure at the vendor site (e.g. secure domains, firewalls,
virus control, etc...)
 Secure personnel (e.g. security screening)
 Secure audit (e.g. security logs)
 Separation of users (e.g. different virtualized zones)
 Secure administrative routines for system administration (e.g. separation
of duties)
 Security education of all IT personnel.
 Agreements specifying security rules (between vendor and customer)
 Information classification and “Need-to-know”.
If you are pertained about storing sensitive or confidential data in the Cloud, you
should encrypt the data before keeping it to the Cloud.

5.2.3 For Research Question: 3


As the security technology has to improve continuously, in order to meet new
security threats. People in common have to be more risk aware and security aware,
in order to protect their own information and their company’s information. The
security challenges have to be faced in future are:

 Virtual machine security


 Trusted transaction
 Risk of multiple Cloud tenants
 Smart phone data slinging
 Hypervisor viruses
 Abuse and nefarious use of Cloud Computing
 Insecure application programming interfaces
 Malicious insiders
 Shared technology vulnerabilities
 Service and traffic hijacking
 Security requirements are complex to specify – When data and services
are moved to the Cloud it becomes even more crucial to be able to
specify the security requirements.
Information about the security levels of information systems is necessary for
efficacious risk management. Security assessment is difficult since the concept of
security is vague and cannot be directly measured. Instead other properties and
effects of systems have to be measured and combined in order to illustrate the
security levels and create the desired information about security. When data and
services are moved to the Cloud, security assessment becomes even more
challenging since more parties are involved and the systems become more
complex.
5.3 Recommendation
In the future, the people will access and share their software applications through
online and access information by using the remote server networks instead of
depending on primary tools and information hosted in their personal computers
because of flexibility in Cloud Computing. The security issues in Cloud
Computing are always one of the main research topics for researchers and
developers to investigate the appropriate solutions every time. From the
perspective of this thesis, we suggest that to find an optimum and appropriate
security solutions for the specific services in the Cloud. There is a scope to propose
the guidelines to overcome the future challenges like physical security, espionage,
transparency, data ownership, hypervisor viruses and malicious insiders in Cloud
security. To concentrate on more specific areas like regulatory and compliance
issues, jurisdiction laws, etc...

REFERENCES

Ahmed S, Raja M. (2010) 'Tackling Cloud security issues and forensics model',
High Capacity Optical Networks and Enabling technologies (HONET) , 19-21
Dec, pp. 190-195.

Ahuja R. (June 2011) 'SLA Based Scheduler for Cloud storage and Computational
Services', International Conference on Computatonal Science and Applications
(ICCSA), 258-262.

Albeshri A, Caelli W. (Sept 2010) 'Mutual Protection in a Cloud Computing


Environment', 12th IEEE International Conference on High performance
Computing and Communications (HPCC), 641-646.

Almulla S, Chon Yeob Yeun. (March 2010) 'Cloud Computing Security


management ', 2nd International Conference On Engineering Systems Management
and Its Applications, 1-7.

B. lagesse. (Mar.2011) 'Challenges in Securing the Interface between the cloud and
Pervasive Systems', 2011 IEEE International Conference on Pervasive Computing
and Communications Workshops, 106-110.

Brenner Michel, Wiebelitz Jan. (may 31, 2011) 'Secret program execution in the
Cloud applying homomorphic encryption', Digital Ecosystems and Technologies
Conference (DEST), 5th IEEE International Conference 2011, 114-119.

C.C Ragin. (1997) 'Turning the tables: How case - oriented research challenges
variable oriented research', Comparative social research, vol. 16, pp. 27-42.

C.C Ragin. (2000) Fuzzy set science, Chicago: The University of Chicago.
Chang Lung Tsai, Uei –Chin Lin. (Aug 2010) 'Information Security issue of
enterprises adopting the application of Cloud Computing', 6th International
Conference on Networked Computing and Advanced Information Management
(NCM), 645-649.

Chenguang Wang, Huaizhi Yan. (Dec 2010) 'Study of Cloud Computing security
based on Private Face Recognition', International Conf. on Computational
Intelligence and Software Engineering, 1-5.

Cong Wang, Kui ren. (2010) 'Toward publicly auditable secure cloud data storage
services', Network, IEEE, vol. 24, no. 4, July, pp. 19-24.

Cong Wang, Qian Wang. (March 2010) 'Privacy Preserving Public Auditing for
Data storage security in Cloud Computing', INFOCOM 2010, IEEE, 1-9.

Cong Wang, Qian Wang. (2009) 'Ensuring data storage security in Cloud
Computing', International Workshop on Quality of Service, 1-9.

C. Wohlin. (2000) Experimentation in Software engineering: an introduction, 6th


edition, International series in software engineering, Springer.

Dawei Sun, Guiran Chang. (Sept.2010) 'A Dependability Model to Enhance


Security of Cloud Environment Using System-Level Virtualization Techniques',
Pervasive Computing Signal Processing and Applications, 305-310.

Dawod W, Takouna I. (March 2010) 'Infrastucture as a service security: challenges


and solutions', 7th International Conference on Informatics and Systems (INFOS),
18.

Doelitzscher F, Reich C. (July 2010) 'Designing Cloud services adhering to


Government privacy Laws ', IEEE 10th International Conf. on Computer and
Information Technology, 930-935.

D.K. Mishra. (Sept.2010) 'Tutorial: Secure Multiparty Computation for Cloud


Computing Paradigm by Durgesh Kumar Mishra', Second International Conference
on Computational Intelligence, Modelling and Simulation, xxiv-xxv.

Ford R.B. (2011) 'Information Security in the Cloud', Network Security, vol. 2011,
no. 4, April, pp. 15-17.

Gul I, Rehman A. (June 2011) 'Cloud Computing Security Auditing', 2nd


International Conference on next Generation Information Technology (ICNIT),
143148.
Hao Z, Zhong S. (June, 2011) 'A Time-Bound Ticket-Base Mutual Authentication
Scheme for Cloud Computing', International Journal of Computers,
Communications and Control, vol. 6, no. 2, June, pp. 227-235.

Huimei Wang, Ming Xian. (May 2011) 'Cloud Evaluation method of Network
Attack resistance Ability', Network Computing and Information Security (NCIS),
239-243.

Jaatun M.G, Nyre A. A. (March 2011) 'An approach to confidentiality control in


the Cloud', Vehicular Technology, Information Theory and Arreospace and
Electronic systems Technology, 2nd International Conference on Wireless
Communication, 1-5.

Jensen M, Schwenk J. (Sept.2009) 'On Technical Security Issues in Cloud


Computing', IEEE International Conference on Cloud Computing, 109-116.

Jia Weiwei Zhu, Haojin Cao. (10-15 April, 2011) 'A Secure data service
mechanism in mobile Cloud Computing', Computer Communications Wrokshops
(INFOCOMWKSHPS), IEEE Conference 2011, 1060 - 1065.

Jin Li, Gansen Zhao. (2010) 'Fine-Grained Data Access Control Systems with User
Accountability in Cloud Computing', 2nd International Conference on Cloud
Computing Technology and Science, 89-96.

Jun Feng, Yu Chen. (Jan 2010) 'Bridging the Missing link of Cloud data storage
security in AWS ', 7th IEEE conf. on Consumer Communications and Networking
Conference (CCNC), 1-2.

Jun Feng, Yu Chen. (Jan 2011) 'Enhancing Cloud storage security against rool-
back attacks with a new fais multi party non-repudation protocol', Consumer
Communications and Networking Conference (CCNC), IEEE conference 2011,
521522.

Youngmin Jung, Mokdong Chung. (Feb 2010) 'Adaptive Security management


model in the Cloud Computing environment ', 12th International Conf. on
Advanced Communication technology, 1664-1669.

Zhang Jianhong, Chen Hua. (Sept 2010) 'Security storage in the Cloud Computing:
A RSA based assumption data integrity check without original data', International
Conf. on Educational and Information technology (ICEIT), 143-147.

Zhidong Shen, Qiang Tong. (July 2010) 'The Security of Cloud Computing System
enabled by trusted Computing Technology', 2nd International Conference on
Signal Processing Systems (ICSPS), 11-15.
Zhidong Shen, Li Li. (May 2010) 'Cloud Computing System Based on Trusted
Computing Platform', Intelligent Computation Technology and Automation
(ICICTA), 942-945.

You might also like