Khan, Afnan Ullah (2014) Data Confidentiality and Risk Management in Cloud Computing. EngD thesis, University of York.
Abstract
Cloud computing can enable an organisation to outsource computing resources to gain economic benefits. Cloud computing is transparent to both the programmers and the users; as a result, it introduces new challenges when compared with previous forms of distributed computing. Cloud computing enables its users to abstract away from low level configuration (configuring IP addresses and routers). It creates an illusion that this entire configuration is automated. This illusion is also true for security services, for instance automating security policies and access control in the Cloud, so that companies using the Cloud perform only very high- level (business oriented) configuration. This thesis identifies research challenges related to security, posed by the transparency of distribution, abstraction of configuration and automation of services that entails Cloud computing. It provides solutions to some of these research challenges. As mentioned, Cloud computing provides outsourcing of resources; the outsourcing does not enable a data owner to outsource the responsibility of confidentiality, integrity and access control as it remains the responsibility of the data owner. The challenge of providing confidentiality, integrity and access control of data hosted on Cloud platforms is not catered for by traditional access control models. These models were developed over the course of many decades to fulfil the requirements of organisations which assumed full control over the physical infrastructure of the resources they control access to. The assumption is that the data owner, data controller and administrator are present in the same trusted domain. This assumption does not hold for the Cloud computing paradigm. Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organisation would be taking while hosting data and services on the Cloud. Furthermore, the identification of risk would be the first step, the next step would be to develop the mitigation strategies. As part of the thesis, two main areas of research are targeted: distributed access control and security risk management.
Metadata
Supervisors: | Oriol, Manuel and Azvine, Ben and Dimitrakos, Theo |
---|---|
Keywords: | Cloud Computing, Risk Management, Access Control, Data Confidentiality |
Awarding institution: | University of York |
Academic Units: | The University of York > Computer Science (York) |
Identification Number/EthosID: | uk.bl.ethos.692450 |
Depositing User: | Mr Afnan ullah Khan |
Date Deposited: | 15 Aug 2016 08:14 |
Last Modified: | 08 Sep 2016 13:34 |
Open Archives Initiative ID (OAI ID): | oai:etheses.whiterose.ac.uk:13677 |
Download
Engineering Doctorate Thesis Afnan Ullah Khan
Filename: Thesis_Final_Afnan_27072016_EngD.pdf
Description: Engineering Doctorate Thesis Afnan Ullah Khan
Licence:
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License
Export
Statistics
You do not need to contact us to get a copy of this thesis. Please use the 'Download' link(s) above to get a copy.
You can contact us about this thesis. If you need to make a general enquiry, please see the Contact us page.