Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Muhammad Naeem, 01-241172-039 | |
dc.date.accessioned | 2024-05-30T10:59:18Z | |
dc.date.available | 2024-05-30T10:59:18Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | http://hdl.handle.net/123456789/17393 | |
dc.description | Supervised by Dr. Muhammad Imran Babar | en_US |
dc.description.abstract | Cloud computing is rapidly growing internet techno Logy that provides and facilitates several services to its consumers including big private companies such as Glide. amazon. IBM and Microsoft. There are several different models, techniques and approaches have been proposed. Increasing relevance of information assurance of cloud computing has forced governments) stakeholders companies, organizations and customers to turn their attention to security techniques and requirements certifications and standards of Information Technology. However, with the fast and rapidity development and effective offerings of cloud services several issues are associated with cloud computing technology that needs to be addressed. Cloud computing security techniques and requirements is an active area of research that needs to be addressed to avoid security attacks and threats that result in disaster for both service consumers and providers. Recent studies show that the security requirements and issues of cloud computing are considered as the major issues that are to be addressed' Objective: This research focuses on comparative analysis of security techniques, issues and security requirements. The purpose of given research work is to explore and identify the existing cloud security techniques and cloud issues to analyze impacts of these existing cloud security techniques Research methodology : in this research work, Systematic Literate Review (SLR) has been used to identify the existing security techniques and issues of cloud computing' Results: As a result 39 cloud security techniques have been identified with their impacts The security techniques are categorized on the base of their impacts' Collectively 58 security issues are identified from the existing literature and several mitigation techniques has been identified to prevent cloud systems from these issues' | en_US |
dc.language.iso | en | en_US |
dc.publisher | Software Engineering, Bahria University Engineering School Islamabad | en_US |
dc.relation.ispartofseries | MS-SE;T-2690 | |
dc.subject | Software Engineering | en_US |
dc.subject | Scrutiny | en_US |
dc.subject | Cloud Computing | en_US |
dc.title | Security Requirements in Cloud and Knowledge Management | en_US |
dc.type | Thesis | en_US |