Please use this identifier to cite or link to this item:
https://repository.sustech.edu/handle/123456789/4829
Title: | A Model for Securing Data in a Cloud Computing Environment |
Other Titles: | نموذج لتأمين البيانات في بيئة الحوسبة السحابية |
Authors: | Shamsalola, Ebtihal Nooreldeen Supervisor - Awad Mohamed Awadelkarim |
Keywords: | Securing Data Cloud Computing |
Issue Date: | 28-Jul-2013 |
Publisher: | Sudan University of Science and Technology |
Citation: | Shamsalola,Ebtihal Nooreldeen .A Model for Securing Data in a Cloud Computing Environment/ Ebtihal Nooreldeen Shamsalola ؛ Awad Mohamed Awadelkarim .-Khartoum : sudan university of science and technology, computer science,2013.-74p:ill;28cm.-M.Sc. |
Abstract: | Cloud computing has many features such as low cost and ease of access to services, but nevertheless has deficiencies related to security and privacy which must be taken into account. Cloud computing represents a repository to store data, so data must be protected. Protection of data by securing the environment surrounding the data results on loss of control by the data owner, furthermore, the data move from one place to another and from one environment to another, which means must secure these environments, as well as to secure data as they move from place to another, and that there is the same mechanism of protection in every environment the data move to it, this seems impossible or difficult, which means that the protection through the surrounding environment of the data is ineffective. This research presents a model for securing data in the cloud computing by focusing on the data itself rather than securing the surrounding environment. Protection by focusing on data solve the loss of control problem in the cloud computing because the protection mechanism would determined by the data owner, also the protection of data is achieved at all stages of the data due to the protection mechanism is embedded with the data, this model is based on a set of security requirements of cloud computing, which was derived from a set of security risks of cloud computing that has a been derived from previous studies, but the validity and consistency of the model has been left for future work due to the scope of this thesis. |
Description: | Thesis |
URI: | http://repository.sustech.edu/handle/123456789/4829 |
Appears in Collections: | Masters Dissertations : Computer Science and Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A Model for Securing ....pdf Restricted Access | Research | 1.25 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.