Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/326063
Title: | Cloud Computing Security Threats and their Mitigation Mechanism |
Researcher: | Vaishali Singh |
Guide(s): | Santosh Kumar Pandey |
Keywords: | Computer Science Computer Science Cybernetics Engineering and Technology |
University: | Jagannath University, Jaipur |
Completed Date: | 2019 |
Abstract: | It is not customary, though, to include preface in a Ph.D. thesis, however I newlinethink it is important to shed light on the intentions and commence the research study newlinetitled Cloud Computing Security Threats and their Mitigation Mechanism . The newlinepresent study was primarily intended to strength cloud security through efficient newlinemitigation mechanism of related threats. Cloud security threats are fertile area of newlineresearch under the concern of Cloud Security environment. newlineThe research work provided an overview of major security threats under newlinevarious categories, which has served as an initial step towards a development of newlineontology. For the presentation of interrelated concepts in the field of security newlineknowledge, Cloud Security Ontology (CSO) was proposed and evaluated. newlineIn order to address security concern for cloud infrastructure with respect newlineto related threat/s an integrated and innovative approach to provide countermeasure newlinewas required. Accordingly, Cloud Security Assurance Framework (CSAF) based on newlinechecklist/s for Cloud threats has been proposed. After developing the above newlinechecklist/s under CSAF, it has been felt that each checkpoint may not be having newlineequal weight. Therefore, a rule based fuzzy logic approach has been used to find the newlineweight of each checkpoint. Each checkpoint s weight was determined using rule newlinebased fuzzy logic through which the overall risk tolerance/compliance of any project newlinewas calculated. newlineTo make the proposed framework, CSAF acceptable, an experimental newlinevalidation was carried out on eight live projects. The result outcomes obtained by newlineadopting CSAF has been also compared with the overall recommendation of the newlineproject s providers and existing contributions which was found to be highly similar newlinein nature. From these evidences and recognized facts, the effectiveness of CSAF is newlineautomatically validated up to a major extent. newlineThe present research has four main areas, Cloud Security Ontology (CSO), a newlineproposed framework, CSAF; validation through tryouts; and interpretation of results. newlineCloud Security Ontology (C |
Pagination: | |
URI: | http://hdl.handle.net/10603/326063 |
Appears in Departments: | Faculty of Engineering and Technology |
Files in This Item:
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: