What are the security techniques used to prevent unauthorized access?

Publish By: Admin,
Last Updated: 10-Jul-23
Price: $120

"Analysis and evaluation ofsecurity challenges in cloud computing"-Risks and threats affecting cloud adopting decision

Research aim

The aim of this project is to analyse and evaluate the security challenges in the context of cloud computing and techniques to be used in order to avoid security risks, as well as a guidance of actual top cloud service providers ( AWS, Microsoft, Google, IBM, Oracle).This analysis will be carried out using open source cloud comparison tool "Rightscale".

Research Objectives

The main objectives of these project will be:

To conduct a research to understand in-depth the vulnerability and security issues, as well as the techniques used in today`s world of Cloud Computing to mitigate those issues.

To identifying actual security challenges and expected challenges in the future of Cloud Computing.

To determinate the countermeasures for resolving the security concerns in context of cloud computing.

Research questions

1: what are the security techniques used by leading cloud computing providers to prevent data attacks when data is transferred between a local to the cloud network?

2: What are the security techniques used to prevent unauthorized access?

3: What are the major security challenges encountered in Cloud Computing and how canthey be avoided?