Conceptual deployment models to secure cloud computing / Hajar Ziglari
Cloud computing is a choice of raising the capacity or adding extra capabilities with no new infrastructure investment to train new personnel, or get licence for new software. Cloud computing is growing fast in the IT industry, but while more information from the individuals and companies are stored...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/63023/1/63023.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uitm-ir.63023 |
---|---|
record_format |
uketd_dc |
spelling |
my-uitm-ir.630232022-08-03T04:14:35Z Conceptual deployment models to secure cloud computing / Hajar Ziglari 2012 Ziglari, Hajar Information technology. Information systems Cloud computing is a choice of raising the capacity or adding extra capabilities with no new infrastructure investment to train new personnel, or get licence for new software. Cloud computing is growing fast in the IT industry, but while more information from the individuals and companies are stored in cloud, concerns are growing about safety. Security is the main issue which decreases the cloud growth and complications with data availability, data migration, data integrity and confidentiality continue to plague the market. Objectives contain identifying data security attributes and threats for cloud, discovering some strategies to recover the cloud computing service delivery to business performance and customers and developing a new model to cover some security issues. Deployment models will be analyzed to address users' security concerns with cloud computing based on inter-cloud interaction and with multiple clouds to cooperate. The result was evaluated by three experts named Bharat Tank, Colin Frankham and Dr. Ekatarina Yadova to see the effectiveness of the models. The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part. 2012 Thesis https://ir.uitm.edu.my/id/eprint/63023/ https://ir.uitm.edu.my/id/eprint/63023/1/63023.pdf text en public masters Universiti Teknologi MARA Faculty of Computer and Mathematical Sciences Yahya, Saadiah (Prof. Dr.) |
institution |
Universiti Teknologi MARA |
collection |
UiTM Institutional Repository |
language |
English |
advisor |
Yahya, Saadiah (Prof. Dr.) |
topic |
Information technology Information systems |
spellingShingle |
Information technology Information systems Ziglari, Hajar Conceptual deployment models to secure cloud computing / Hajar Ziglari |
description |
Cloud computing is a choice of raising the capacity or adding extra capabilities with no new infrastructure investment to train new personnel, or get licence for new software. Cloud computing is growing fast in the IT industry, but while more information from the individuals and companies are stored in cloud, concerns are growing about safety. Security is the main issue which decreases the cloud growth and complications with data availability, data migration, data integrity and confidentiality continue to plague the market. Objectives contain identifying data security attributes and threats for cloud, discovering some strategies to recover the cloud computing service delivery to business performance and customers and developing a new model to cover some security issues. Deployment models will be analyzed to address users' security concerns with cloud computing based on inter-cloud interaction and with multiple clouds to cooperate. The result was evaluated by three experts named Bharat Tank, Colin Frankham and Dr. Ekatarina Yadova to see the effectiveness of the models. The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Ziglari, Hajar |
author_facet |
Ziglari, Hajar |
author_sort |
Ziglari, Hajar |
title |
Conceptual deployment models to secure cloud computing / Hajar Ziglari |
title_short |
Conceptual deployment models to secure cloud computing / Hajar Ziglari |
title_full |
Conceptual deployment models to secure cloud computing / Hajar Ziglari |
title_fullStr |
Conceptual deployment models to secure cloud computing / Hajar Ziglari |
title_full_unstemmed |
Conceptual deployment models to secure cloud computing / Hajar Ziglari |
title_sort |
conceptual deployment models to secure cloud computing / hajar ziglari |
granting_institution |
Universiti Teknologi MARA |
granting_department |
Faculty of Computer and Mathematical Sciences |
publishDate |
2012 |
url |
https://ir.uitm.edu.my/id/eprint/63023/1/63023.pdf |
_version_ |
1783735283569655808 |