Security Requirements in Cloud and Knowledge Management

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Muhammad Naeem, 01-241172-039
dc.date.accessioned 2024-05-30T10:59:18Z
dc.date.available 2024-05-30T10:59:18Z
dc.date.issued 2019
dc.identifier.uri http://hdl.handle.net/123456789/17393
dc.description Supervised by Dr. Muhammad Imran Babar en_US
dc.description.abstract Cloud computing is rapidly growing internet techno Logy that provides and facilitates several services to its consumers including big private companies such as Glide. amazon. IBM and Microsoft. There are several different models, techniques and approaches have been proposed. Increasing relevance of information assurance of cloud computing has forced governments) stakeholders companies, organizations and customers to turn their attention to security techniques and requirements certifications and standards of Information Technology. However, with the fast and rapidity development and effective offerings of cloud services several issues are associated with cloud computing technology that needs to be addressed. Cloud computing security techniques and requirements is an active area of research that needs to be addressed to avoid security attacks and threats that result in disaster for both service consumers and providers. Recent studies show that the security requirements and issues of cloud computing are considered as the major issues that are to be addressed' Objective: This research focuses on comparative analysis of security techniques, issues and security requirements. The purpose of given research work is to explore and identify the existing cloud security techniques and cloud issues to analyze impacts of these existing cloud security techniques Research methodology : in this research work, Systematic Literate Review (SLR) has been used to identify the existing security techniques and issues of cloud computing' Results: As a result 39 cloud security techniques have been identified with their impacts The security techniques are categorized on the base of their impacts' Collectively 58 security issues are identified from the existing literature and several mitigation techniques has been identified to prevent cloud systems from these issues' en_US
dc.language.iso en en_US
dc.publisher Software Engineering, Bahria University Engineering School Islamabad en_US
dc.relation.ispartofseries MS-SE;T-2690
dc.subject Software Engineering en_US
dc.subject Scrutiny en_US
dc.subject Cloud Computing en_US
dc.title Security Requirements in Cloud and Knowledge Management en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account