Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/326063
Title: Cloud Computing Security Threats and their Mitigation Mechanism
Researcher: Vaishali Singh
Guide(s): Santosh Kumar Pandey
Keywords: Computer Science
Computer Science Cybernetics
Engineering and Technology
University: Jagannath University, Jaipur
Completed Date: 2019
Abstract: It is not customary, though, to include preface in a Ph.D. thesis, however I newlinethink it is important to shed light on the intentions and commence the research study newlinetitled Cloud Computing Security Threats and their Mitigation Mechanism . The newlinepresent study was primarily intended to strength cloud security through efficient newlinemitigation mechanism of related threats. Cloud security threats are fertile area of newlineresearch under the concern of Cloud Security environment. newlineThe research work provided an overview of major security threats under newlinevarious categories, which has served as an initial step towards a development of newlineontology. For the presentation of interrelated concepts in the field of security newlineknowledge, Cloud Security Ontology (CSO) was proposed and evaluated. newlineIn order to address security concern for cloud infrastructure with respect newlineto related threat/s an integrated and innovative approach to provide countermeasure newlinewas required. Accordingly, Cloud Security Assurance Framework (CSAF) based on newlinechecklist/s for Cloud threats has been proposed. After developing the above newlinechecklist/s under CSAF, it has been felt that each checkpoint may not be having newlineequal weight. Therefore, a rule based fuzzy logic approach has been used to find the newlineweight of each checkpoint. Each checkpoint s weight was determined using rule newlinebased fuzzy logic through which the overall risk tolerance/compliance of any project newlinewas calculated. newlineTo make the proposed framework, CSAF acceptable, an experimental newlinevalidation was carried out on eight live projects. The result outcomes obtained by newlineadopting CSAF has been also compared with the overall recommendation of the newlineproject s providers and existing contributions which was found to be highly similar newlinein nature. From these evidences and recognized facts, the effectiveness of CSAF is newlineautomatically validated up to a major extent. newlineThe present research has four main areas, Cloud Security Ontology (CSO), a newlineproposed framework, CSAF; validation through tryouts; and interpretation of results. newlineCloud Security Ontology (C
Pagination: 
URI: http://hdl.handle.net/10603/326063
Appears in Departments:Faculty of Engineering and Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File493.76 kBAdobe PDFView/Open
02_candidate declaration.pdf1.3 MBAdobe PDFView/Open
03_certificate of the supervisor.pdf1.15 MBAdobe PDFView/Open
04_acknowledgment.pdf198.87 kBAdobe PDFView/Open
06_contents.pdf205.85 kBAdobe PDFView/Open
07_list of tables.pdf146.94 kBAdobe PDFView/Open
08_list of figures.pdf156.73 kBAdobe PDFView/Open
09_liist of abbreviations.pdf159.04 kBAdobe PDFView/Open
10_ chapter-1.pdf401.18 kBAdobe PDFView/Open
11_chapter-2.pdf972.02 kBAdobe PDFView/Open
12_chapter-3.pdf2.62 MBAdobe PDFView/Open
13_chapter-4.pdf2.28 MBAdobe PDFView/Open
14_chapter-5.pdf813.46 kBAdobe PDFView/Open
16_references.pdf419.48 kBAdobe PDFView/Open
17_glossary.pdf238.72 kBAdobe PDFView/Open
19_list of publications.pdf288.38 kBAdobe PDFView/Open
20_reprint of research papers.pdf2.03 MBAdobe PDFView/Open
21_annexures.pdf19.23 MBAdobe PDFView/Open
80_recommendation.pdf376.02 kBAdobe PDFView/Open
thesis information - vaishali singh.pdf50.72 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: