Cloud Computing is an evolving computing paradigm which aims at delivering computing resources dynamically with minimal manual intervention. To be economically feasible, the resources have to be shared. To the users, it offers the economies of scale and the advantages of smoothing the variation in the demand without unnecessary investment in infrastructure which may be used only sporadically. The success of this paradigm almost entirely rests on addressing one central issue which is the security of user data. A number of investigators have proposed various techniques for securing user data. Each one of their proposed techniques, however, addresses only some aspect of the security. Some suggest techniques for securing data at rest at user’s premises or at provider’s premises. Others have proposed techniques for securing data in transit through internet. Some have argued that the current techniques available for database systems and internet are sufficient and with suitable policies and procedures adequate data security can be provided. There is, however, a downside to this piece-meal approach to data security. This approach does not ensure consistency, may leave security gaps in between security system components, and may make the overall system inefficient. We have proposed an integrated approach to data security which we aim at being free from these drawbacks. In other words, we have proposed an approach to providing end-to-end security. We have incorporated some of the existing techniques which have been tried and tested and have been in use for a number of years. They, however, are only parts of our proposed integrated approach. Some of the cloud security organizations, such as Cloud Security Alliance (CSA), have started thinking along these lines. We have, however, not found any published work, which proposes an integrated approach such as ours.
July 27, 2016
The right to download or print any of the pages of this thesis (Material) is granted by the copyright owner only for personal or classroom use. The author retains all proprietary rights, including copyright ownership. Any reproduction or editing or other use of this Material by any means requires the express written permission of the copyright owner. Except as provided above, or any use beyond what is allowed by fair use (Title 17 Section 107 U.S.C.), you may not reproduce, republish, post, transmit or distribute any Material from this web site in any physical or digital form without the permission of the copyright owner of the Material. Inquiries regarding any further use of these materials should be addressed to Administration, Jernigan Library, Texas A&M University-Kingsville, 700 University Blvd. Kingsville, Texas 78363-8202, (361)593-3416.