Design and Implementation of Security Policy for Public Cloud

dc.contributor.authorAlam, Jarrar
dc.contributor.supervisorChana, Inderveer
dc.date.accessioned2010-08-30T12:38:01Z
dc.date.available2010-08-30T12:38:01Z
dc.date.issued2010-08-30T12:38:01Z
dc.descriptionMEen
dc.description.abstractCloud computing has become a buzzword of today. Cloud computing is not a completely new concept; it has intricate connection to the established Grid Computing paradigm, and other relevant technologies such as utility computing, cluster computing and distributed systems in general. The term “cloud” is used as a metaphor for the Internet, based on how Internet is depicted in computer network diagrams. Cloud computing promises to cut operational and capital costs and, more importantly, let IT departments focus on strategic projects instead of keeping the datacenters running. Cloud computing is much more than the simple Internet. It is a construct that allows user to access applications that actually reside at a location other than user’s own computer or other Internet-connected devices, most often of a distant datacenter. There are numerous benefits of this construct. For instance, some other company hosts user application. This implies that they handle the cost of servers, they manage the software updates, and depending on contract, user pays less i.e. for the service only. People can simply log in and use their applications wherever they are, therefore cloud computing is convenient for telecommuters and travelling remote workers too. Cloud computing is becoming increasingly relevant, as it will enable companies involved in spreading this technology to open the doors to Web3.0. Cloud Computing has progressed a lot but still challenges like data security, data location, regulatory compliance, privileged user access etc need to be addressed. Amongst these, security and trust issues are major issues, since the user’s data has to be released to the Cloud and thus leaves the protection sphere of the data owner. In this thesis, security issues for Clouds have been analyzed. A user security policy has been designed. Further, a Cloud environment has been setup using Hadoop & the user authentication policy has been verified in this environment.en
dc.description.sponsorshipCSEDen
dc.format.extent1679468 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10266/1198
dc.language.isoenen
dc.subjectGrid Securityen
dc.subjectSecurity Policyen
dc.titleDesign and Implementation of Security Policy for Public Clouden
dc.typeThesisen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1198.pdf
Size:
1.59 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Item-specific license agreed upon to submission
Description: