Enhanced authentication protocol for cloud computing / Fayza Rekaby AbuBakr ; Supervised Hesham Ahmed Hefny , Abdelaziz Ahmed Abdelaziz , Nermin Hamza
Material type: TextLanguage: English Publication details: Cairo : Fayza Rekaby AbuBakr , 2016Description: 209 Leaves : photographs ; 30cmOther title:- تعزيز بروتكول المصادقة للحوسبة السحابية [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Thesis | قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2016.Fa.E (Browse shelf(Opens below)) | Not for loan | 01010110072764000 | |||
CD - Rom | مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2016.Fa.E (Browse shelf(Opens below)) | 72764.CD | Not for loan | 01020110072764000 |
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Research - Department of Computer and Information Sciences
Cloud computing has been a mainstream topic recently. It has led to emerging different cloud computing eras. The first cloud era started with a private cloud, and public, hybrid, and federated cloud eras will be following this in turn. As described in this thesis, currently cloud-computing security has many issues, which scares away several potential users. Until a proper security module is not in place, potential users will not be able to leverage the true benefits of this technology. This security module should cater to all the issues arising from all directions of the cloud. In a cloud, where there are heterogeneous systems having a variation in their asset value, a single security system would be too costly for certain applications and if there is less security then the vulnerability factor of some applications like financial and military applications will shoot up. If the cloud has a common security methodology in place, it will be a high-value asset target for hackers because of the fact that hacking the security system will make the entire cloud vulnerable to attack. In this thesis, a new model a SaaS Security Model (SSM) is proposed is assessing and enhancing security in each layer of a SaaS service model. A security problem in a hybrid cloud is that it is consisting of multiple service providers, which are much more difficult, especially for key distribution; due to the user has multiple digital identities. However, there is a limitation for a single-provider cloud to cooperate with other cloud systems to maximize the function of available resources
Issued also as CD
There are no comments on this title.