MAster assignment
Secure and Efficient Cloud Computing: Enhancing Security and Performance in Cloud-based Systems
TYPE : MASTER CS
Period: Start date: as soon as possible
Student: Unassigned
If you are interested please contact:
Abstract:
This master's thesis aims to address the critical challenges of security and performance in cloud computing systems. The research will investigate various aspects of cloud security, including encryption algorithms, secure data storage and transmission, and access control mechanisms. Simultaneously, it will assess the impact of security measures on the overall performance of cloud-based systems. The thesis aims to propose methodologies and tools that effectively enhance both security and performance, ensuring that cloud services maintain the required levels of confidentiality, integrity, availability, and performance.
Objective: The main objective of this research is to develop a comprehensive understanding of the trade-offs between security and performance in cloud computing systems. By analyzing encryption algorithms, secure storage techniques, access control mechanisms, and performance evaluation methods, this study aims to propose novel approaches that optimize both security and performance aspects. The research will explore various cloud service providers and evaluate their security features and performance characteristics, identifying potential vulnerabilities and areas for improvement.
Methodology:
1. Literature Review:
- Conduct an extensive review of existing literature and research papers on cloud computing security, encryption algorithms, secure storage mechanisms, access control, and performance evaluation methods.
- Identify key security challenges in cloud computing systems and performance evaluation metrics used in previous studies.
2. Security Analysis:
- Analyze the security vulnerabilities and threats in cloud computing systems, such as data breaches, insider attacks, and unauthorized access.
- Investigate encryption algorithms, key management, secure data storage, and transmission techniques used in cloud environments.
- Explore access control models, including role-based access control (RBAC) and attribute-based access control (ABAC), and evaluate their effectiveness in preventing unauthorized access.
- Assess the impact of security measures on system performance, such as encryption/decryption overhead, key generation, and access control decision-making.
3. Performance Evaluation:
- Design experiments to evaluate the performance of different cloud service providers or cloud deployment models (e.g., public, private, hybrid) under various workload scenarios.
- Measure response times, throughput, and resource utilization metrics (e.g., CPU, memory, network) to quantify the performance characteristics.
- Identify performance bottlenecks and analyze their relationship with security mechanisms, such as the impact of encryption on data transmission latency or access control policies on request processing time.
4. Trade-off Analysis:
- Identify the trade-offs between security measures and performance in cloud computing systems.
- Quantify the impact of different security mechanisms on performance metrics through comparative analysis.
- Analyze the relationships between security and performance parameters to identify optimization strategies that achieve a balance between security and performance requirements.
5. Tool Development:
- Develop a practical tool or framework that incorporates the proposed security enhancements while considering the performance requirements of cloud-based systems.
- The tool should facilitate the implementation and monitoring of secure and efficient cloud computing environments.
- Consider aspects such as encryption libraries, secure data storage mechanisms, access control frameworks, and performance monitoring components.
Expected Outcome:
The expected outcome of this research is a comprehensive understanding of the security and performance challenges in cloud computing systems. The thesis will propose practical methodologies and tools that enhance security while maintaining the required performance levels in cloud-based systems. The research findings will contribute to the development of secure and efficient cloud computing architectures and provide guidelines for practitioners and cloud service providers.
References:
- Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. NIST Special Publication, 800(145), 7.
- Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09) (pp. 199-212). DOI: 10.1145/1653662.1653687
- Wang, C., Ren, K., Lou, W., & Li, J. (2009). Toward Publicly Auditable Secure Cloud Data Storage Services. IEEE Network, 24(4), 19-24. DOI: 10.1109/MNET.2009.5234934
- Jin, X., Ling, Z., & Susilo, W. (2018). A Lightweight Attribute-Based Encryption Scheme for the Internet of Things. IEEE Transactions on Dependable and Secure Computing, 15(6), 1071-1084. DOI: 10.1109/TDSC.2016.2607463