logo

Project Proposal and Plan, Cloud Security - ITC 568

12 Pages2096 Words1387 Views
   

Charles Sturt University

   

Cloud Security and Privacy (ITC 568)

   

Added on  2020-03-07

About This Document

This paper explores the challenges in cloud security so that a plan for the Enhancement of Security can be formulated. The report explains the key Security Issues and Challenges faced in cloud-based systems and explores the theoretical framework for the development of a methodology for exploration, methods used for data collection, and work breakdown structure highlighting key tasks in the research.

Project Proposal and Plan, Cloud Security - ITC 568

   

Charles Sturt University

   

Cloud Security and Privacy (ITC 568)

   Added on 2020-03-07

ShareRelated Documents
[Student Name]Project proposaland plan - CloudSecurity
Project Proposal and Plan, Cloud Security - ITC 568_1
Project proposal and plan - Cloud SecurityTable of ContentsIntroduction......................................................................................................................3Rationale...........................................................................................................................3Problem domain..........................................................................................................................3Purpose and justification............................................................................................................3Sponsor or Supervisor recommendation..........................................................................3Research Questions...........................................................................................................3Conceptual or Theoretical Framework.............................................................................4Introduction to Cloud Computing..............................................................................................4Innovation in Security Systems...................................................................................................4Cloud Computing Security Framework.....................................................................................5Methodology.....................................................................................................................6Research and Systems Development method.............................................................................6Data collection.............................................................................................................................6Ethical Issues...............................................................................................................................6Compliance Requirements..........................................................................................................6Analysis of data...........................................................................................................................6Project PlanDeliverables...........................................................................................................7Work breakdown structure (WBS)............................................................................................7Risk Analysis...............................................................................................................................8Duration......................................................................................................................................9Gantt chart......................................................................................................................10References.......................................................................................................................112
Project Proposal and Plan, Cloud Security - ITC 568_2
Project proposal and plan - Cloud SecurityIntroductionThis paper explores the challenges in the cloud security so that a plan for the enhancement ofsecurity can be formulated. The report explains the key security issues and challenges facedin cloud based systems, explore the theoretical framework for development of a methodologyfor exploration, methods used for data collection, and work break down structure highlightingkey tasks in the research.RationaleProblem domainAdoption of cloud solutions for business management and other personal uses is increasingday by day and on the other side, there also exposed to increasing number of security risksthat are raising concern. While security professionals have come up with several securitymeasures, attacks are also becoming sophisticated in their approaches and have developednew strategies to attack data on cloud. There are a number of dimensions on which securityof the cloud can be compromised including integrity, privacy, availability, confidentiality,authenticity and non-repudiation. With these challenges, it has become essential to keepenhancing the security systems so that cloud users can be better protected [ CITATION DrQ08 \l 16393 ].Purpose and justificationThe aim of this research is to explore the problem of cloud security and the innovations incloud security space to overcome these problems. As the cloud adoption is increasing day byday with many companies also using cloud for their critical infrastructure management, it hasbecome a precursor to explore and mitigate the security risks these platforms are faced with.A range of security risks are faced by cloud platforms such as intellectual property theft,compliance violation, contractual breaches, data breaches, and so on[ CITATION OEC081 \l16393 ]. Sponsor or Supervisor recommendationSupervisor has recommended exploring the security threats to cloud security as well as thesolutions used for protection.3
Project Proposal and Plan, Cloud Security - ITC 568_3
Project proposal and plan - Cloud SecurityResearch QuestionsWhat security threats are faced by cloud computing technologies?What cloud security solutions are available and how do they work?What latest technologies are used for protection of cloud platforms?What are the best practices in cloud security enhancement?[ CITATION Opt16 \l 16393 ]Conceptual or Theoretical FrameworkIntroduction to Cloud ComputingCloud computing is a rapidly growing technology that gives on demand access to a sharedpool of computing resources to users such as servers, storage, networks, and services. Thereare four deployment models in cloud and these include public, private, community, andhybrid, and three services models including SaaS, PaaS, and IaaS [ CITATION MYO161 \l16393 ]. Innovation in Security SystemsThere are several security standards that are available for the protection of cloud basedplatforms such as XML encryption, XML key management, Security Assertions, TransportLayer Security, and so on. TLS provides security through the use of authentication andconfidentiality in the transport layer of the application architecture. It is a very old protocolthat was used for internet security. However, the history has shown that there have beensecurity violations despite this protocol such as breaches, truncation, padding, andrenegotiation[ CITATION Var11 \l 16393 ].By 2002, XML encryption came that involved encryption of documents as well as dataelements through the use of algorithms such as AES, DES, and RSA[ CITATION Sec14 \l4
Project Proposal and Plan, Cloud Security - ITC 568_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
E-commerce Security - Research Proposal
|10
|1714
|93

Cloud Computing-based Security Solution
|12
|2602
|63

Cyber Security Project Plan and Implementation
|14
|2637
|186

ITC571 - Emerging Technologies and Innovation - IoT Security Application
|10
|1654
|177

Development of Cloud based ERP system
|14
|2665
|171

Cloud Migration in Cloud Computing - Emerging Technologies and Innovation
|16
|2723
|253