Cristian Montero - cmontero (647640)
Elisa Mena - emena (633144)
Santiago Villagomez - svillagomez (649887)
COMP90043 Cryptography and Security
September 12, 2014
1
Aims
The main contribution of this paper is to describe possible threats in cloud computing environments as well as security solutions using cryptography. To accomplish our main aim we define three specific objectives which are described as follows:
• Problem Analysis. Describe threats and risks related with cloud computing environment security issues.
• Possible solutions. Find out best solutions for problems as well as their advantages and disadvantages to keep information safe and available in real-time considering users
QoS requirements.
• Success story Show a practical scenario where a solution meet its purpose.
2
Task on the project
This project requires team work approach to accomplish formerly specified aims and the deadline.
All members will be involved in every stage of the project providing information and ideas to add value to our work. The main tasks we will develop are described as follows.
• Literature Review: Obtain all the information required for better comprehension of the topic. This task includes reading research papers, books, articles, magazines, etc.
• Discussion: Once we have information about problems, it would be required to discover and suggest solutions to those problems.
• Paper writing: All ideas and solutions collected will be discussed, and the most relevant will be included in the final document.
References
[1] C. Ji, Y. Li, W. Qiu, U. Awada, and K. Li, “Big data processing in cloud computing environments,” in Pervasive Systems, Algorithms and Networks (ISPAN), 2012 12th International
Symposium on. IEEE, 2012, pp. 17–23.
1
[2] R. Van den Bossche, K. Vanmechelen, and J. Broeckhove, “Cost-optimal scheduling in hybrid iaas clouds for deadline constrained workloads,” in Cloud Computing (CLOUD),
2010 IEEE 3rd International Conference on. IEEE, 2010, pp. 228–235.
[3] N. Sadashiv and S. D. Kumar, “Cluster, grid and cloud computing: A detailed comparison,” in Computer Science & Education (ICCSE), 2011 6th International Conference on. IEEE,
2011, pp. 477–482.
[4] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility,”
Future Generation computer systems, vol. 25, no. 6, pp. 599–616, 2009.
[5] N. I. of Standards and Technology, “NIST Cloud Computing http://www.nist.gov/itl/cloud/, 2011, [Online; accessed 07-April-2014].
Program,”
[6] R. Buyya, C. Vecchiola, and S. T. Selvi, Mastering Cloud Computing: Foundations and
Applications Programming.