Project Proposal and Plan - Cloud Security

Added on - 07 Mar 2020

  • 12

    Pages

  • 2096

    Words

  • 107

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 12 pages
[Student Name]Project proposaland plan - CloudSecurity
Project proposal and plan - Cloud SecurityTable of ContentsIntroduction......................................................................................................................3Rationale...........................................................................................................................3Problem domain..........................................................................................................................3Purpose and justification............................................................................................................3Sponsor or Supervisor recommendation..........................................................................3Research Questions...........................................................................................................3Conceptual or Theoretical Framework.............................................................................4Introduction to Cloud Computing..............................................................................................4Innovation in Security Systems...................................................................................................4Cloud Computing Security Framework.....................................................................................5Methodology.....................................................................................................................6Research and Systems Development method.............................................................................6Data collection.............................................................................................................................6Ethical Issues...............................................................................................................................6Compliance Requirements..........................................................................................................6Analysis of data...........................................................................................................................6Project PlanDeliverables...........................................................................................................7Work breakdown structure (WBS)............................................................................................7Risk Analysis...............................................................................................................................8Duration......................................................................................................................................9Gantt chart......................................................................................................................10References.......................................................................................................................112
Project proposal and plan - Cloud SecurityIntroductionThis paper explores the challenges in the cloud security so that a plan for the enhancement ofsecurity can be formulated. The report explains the key security issues and challenges facedin cloud based systems, explore the theoretical framework for development of a methodologyfor exploration, methods used for data collection, and work break down structure highlightingkey tasks in the research.RationaleProblem domainAdoption of cloud solutions for business management and other personal uses is increasingday by day and on the other side, there also exposed to increasing number of security risksthat are raising concern. While security professionals have come up with several securitymeasures, attacks are also becoming sophisticated in their approaches and have developednew strategies to attack data on cloud. There are a number of dimensions on which securityof the cloud can be compromised including integrity, privacy, availability, confidentiality,authenticity and non-repudiation. With these challenges, it has become essential to keepenhancing the security systems so that cloud users can be better protected[ CITATION DrQ08 \l 16393 ].Purpose and justificationThe aim of this research is to explore the problem of cloud security and the innovations incloud security space to overcome these problems. As the cloud adoption is increasing day byday with many companies also using cloud for their critical infrastructure management, it hasbecome a precursor to explore and mitigate the security risks these platforms are faced with.A range of security risks are faced by cloud platforms such as intellectual property theft,compliance violation, contractual breaches, data breaches, and so on[ CITATION OEC081 \l16393 ].Sponsor or Supervisor recommendationSupervisor has recommended exploring the security threats to cloud security as well as thesolutions used for protection.3
Project proposal and plan - Cloud SecurityResearch QuestionsWhat security threats are faced by cloud computing technologies?What cloud security solutions are available and how do they work?What latest technologies are used for protection of cloud platforms?What are the best practices in cloud security enhancement?[ CITATION Opt16 \l 16393 ]Conceptual or Theoretical FrameworkIntroduction to Cloud ComputingCloud computing is a rapidly growing technology that gives on demand access to a sharedpool of computing resources to users such as servers, storage, networks, and services. Thereare four deployment models in cloud and these include public, private, community, andhybrid, and three services models including SaaS, PaaS, and IaaS[ CITATION MYO161 \l16393 ].Innovation in Security SystemsThere are several security standards that are available for the protection of cloud basedplatforms such as XML encryption, XML key management, Security Assertions, TransportLayer Security, and so on. TLS provides security through the use of authentication andconfidentiality in the transport layer of the application architecture. It is a very old protocolthat was used for internet security. However, the history has shown that there have beensecurity violations despite this protocol such as breaches, truncation, padding, andrenegotiation[ CITATION Var11 \l 16393 ].By 2002, XML encryption came that involved encryption of documents as well as dataelements through the use of algorithms such as AES, DES, and RSA[ CITATION Sec14 \l4
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document