• Computer Cloud Security System

  • CHAPTER ONE -- [Total Page(s) 4]

    Page 3 of 4

    Previous   1 2 3 4    Next
    • 1.3 Objective of the Study

      Due to the issue of security and privacy on cloud computer the researcher objectives to this study are as fellows.

      1. Design an encryption system attached to the system that will enable any user before sending data to the cloud be encrypted with security key

      2. Device a means of sharing data in a more secure and reliable manner over the cloud system.

      3. Create the awareness of the security threats in cloud computer to the people so as the alert them on how to secure there information.


      1.4 Motivation/Research Thoughts

      The question focus was to identify the most relevant issues in Cloud Computing which consider vulnerabilities, threats, risks, requirements and solutions of security for Cloud Computing. This question had to be related with the aim of this work; that is to identify and relate vulnerabilities and threats with possible solutions. Therefore, the research question addressed by our research was the following: What security vulnerabilities and threats are the most important in Cloud Computing which have to be studied in depth with the purpose of handling them? The keywords and related concepts that make up this question and that were used during the review execution are: secure Cloud systems, Cloud security, delivery models security, SPI security, SaaS security, Paas security, IaaS security, Cloud threats, Cloud vulnerabilities, Cloud recommendations, best practices in Cloud. This lead into this research work by the researcher.


      1.5 Significance of the Study

      Enlighten the people, the users of cloud computer on the security challenges and how to resolve this issues. Enhance the use and the effectiveness of the cloud computing among the people. Remove the fear of using cloud computing from the people since the research will come up with a new design that will solve the issue of privacy and third party


      1.6 Abbreviation/Definition

      OOPS Object Oriented Programming Concepts

      TCP/IP Transmission Control Protocol/Internet Protocol

      JDBC Java Data Base Connectivity

      EIS Enterprise Information Systems

      BIOS Basic Input/Output System

      RMI Remote Method Invocation

      JNDI Java Naming and Directory Interface

      ORDBMS Object Relational Database Management System

      CSP Cloud Service Provider (CSP)

      J2ME Java 2 Micro Edition

  • CHAPTER ONE -- [Total Page(s) 4]

    Page 3 of 4

    Previous   1 2 3 4    Next
    • ABSRACT - [ Total Page(s): 1 ]Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security ... Continue reading---