GR Semicolon EN

Show simple item record

dc.contributor.author
Bania, Areti
en
dc.date.accessioned
2015-06-24T08:15:17Z
dc.date.available
2015-09-27T05:58:43Z
dc.date.issued
2015-06-24
dc.identifier.uri
https://repository.ihu.edu.gr//xmlui/handle/11544/511
dc.rights
Default License
dc.title
Security Classification of Data for Cloud Environments
en
heal.type
masterThesis
heal.keyword
Cloud computing
en
heal.keyword
Cloud computing--Security measures
en
heal.keyword
Computer security
en
heal.keyword
Data protection
en
heal.keyword
Dissertations, Academic
en
heal.language
en
heal.access
free
el
heal.license
http://creativecommons.org/licenses/by-nc/4.0
heal.recordProvider
School of Science and Technology, MSc in Information & Communication Technology Systems
heal.publicationDate
2013-11
heal.bibliographicCitation
Bania Areti, 2013, Security classification of data for cloud environments, Master's Dissertation, International Hellenic University
en
heal.abstract
This dissertation was written as a part of the MSc in ICT Systems at the International Hellenic University. Specifically, this master thesis focuses on describing what cloud computing is and addresses the top security risks and threats while adopting a cloud provider. Besides analyzing in general the security risks and threats, it further examines data security in the cloud during the different stages of the data life cycle and, taking these aspects into consideration, a comparison of different cloud providers is presented. Finally, the last part of the master thesis, describes the development of a wizard that can help a stakeholder to choose a cloud provider based on his needs and the provided security features. I would like to express my gratitude to my supervisor Prof. Vasileios Katos for his useful comments, remarks and help throughout this period. Furthermore, I would like to thank Dr. Efstratios Kontopoulos. Without his supervision and constant help this dissertation would not have been possible. Last but not least, I would like to thank my family for always being on my side.
en
heal.tableOfContents
ABSTRACT ................................................................................................................................. III CONTENTS .................................................................................................................................. 1 1. INTRODUCTION .................................................................................................................... 3 2. CLOUD COMPUTING ........................................................................................................... 6 2.1. WHAT IS CLOUD COMPUTING ....................................................................................... 6 2.1.1. Five essential characteristics ............................................................................ 8 2.1.2. Three service models ......................................................................................... 9 2.1.3. Deployment Models ......................................................................................... 13 2.2. CLOUDS SECURITY OBJECTIVES AND SERVICES ............................................................... 15 2.2.1. Cloud Security Objectives ................................................................................ 15 2.2.2. Cloud Security Services ................................................................................... 16 2.3. SECURITY RISKS AND THREATS IN CLOUD COMPUTING ..................................................... 16 2.3.1. Top Security Risks ........................................................................................... 17 2.3.2. Top Threats in Cloud Computing ..................................................................... 21 2.4. SUMMARY ...................................................................................................................... 27 3. DATA SECURITY IN THE CLOUD ..................................................................................... 28 3.1. THE DATA SECURITY LIFECYCLE ..................................................................................... 28 3.2. DATA SECURITY DURING CREATE PHASE ......................................................................... 31 3.2.1. Data Classification ........................................................................................... 31 3.2.2. Rights management-Assign rights ................................................................... 35 3.3. DATA SECURITY DURING STORE PHASE ........................................................................... 36 3.3.1. Access Management ....................................................................................... 37 3.3.2. Data encryption ................................................................................................ 39 3.4. DATA SECURITY DURING USE PHASE ............................................................................... 41 3.5. DATA SECURITY DURING SHARE PHASE ........................................................................... 42 3.6. DATA SECURITY DURING MAINTAIN PHASE ....................................................................... 42 3.7. DATA SECURITY DURING DESTROY PHASE ..................................................................... 43 3.8. RISK ASSESSMENT OF DATA SECURITY ............................................................................ 44 3.9. SUMMARY ...................................................................................................................... 49 4. CHOOSING A CLOUD PROVIDER .................................................................................... 51 2 4.1. FURTHER ANALYSIS OF THE THREE SERVICE MODELS ...................................................... 52 4.1.1. Software as a Service (SaaS) .......................................................................... 53 4.1.2. Platform as a Service (PaaS) ........................................................................... 56 4.1.3. Infrastructure as a Service (IaaS) .................................................................... 57 4.2. THE CLOUD WIZARD ........................................................................................................ 59 4.2.1. A general approach of the Cloud Wizard ......................................................... 59 4.2.2. The Implementation of the Cloud Wizard ......................................................... 65 4.2.3. SUMMARY .......................................................................................................... 73 5. CONCLUSIONS ................................................................................................................... 74 5.1. FUTURE WORK ............................................................................................................... 76 5.2. FINAL REMARKS ............................................................................................................. 77 BIBLIOGRAPHY ........................................................................................................................ 78 APPENDIX A: Service Model Questions ................................................................................ 82 APPENDIX B: SaaS Providers ................................................................................................. 92 APPENDIX C: PaaS Providers ............................................................................................... 103 APPENDIX D: IaaS Providers ................................................................................................ 112
en
heal.advisorName
Katos, Prof. Vasileios
en
heal.committeeMemberName
Katos, Prof. Vasileios
en
heal.committeeMemberName
Papadopoulos, A.
en
heal.committeeMemberName
Kontopoulos, Dr. E.
en
heal.academicPublisher
School of Science &Technology, Master of Science (MSc) in Information and Communication Systems
en
heal.academicPublisherID
ihu
heal.numberOfPages
124
heal.fullTextAvailability
true


This item appears in the following Collection(s)

Show simple item record

Related Items