• Login
    View Item 
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSc. CIS Theses and Dissertations
    • MSIS Theses and Dissertations (2017)
    • View Item
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSc. CIS Theses and Dissertations
    • MSIS Theses and Dissertations (2017)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A Scheme for improving data confidentiality in the cloud computing environment

    Thumbnail
    View/Open
    Fulltext thesis (2.254Mb)
    Date
    2017
    Author
    Tikwang, Iriale Fabiano
    Metadata
    Show full item record
    Abstract
    Cloud computing has ushered in an era whereby small and medium sized companies enjoy computing power which was usually a preserve for big corporations. Despite these benefits, the present cloud data confidentiality techniques are still evolving, and as they evolve so are the threats, hence posing security and privacy challenges, thus becoming an impediment to cloud adoption. Currently, cases have been cited where hackers have stolen stored cloud data, later to appear in social media embarrassing the firms. Among the key vulnerabilities attributed to loss of cloud data include: account hijacking, malicious insider breaches, data breaches attributed to weak Identity and access management, phishing, SQL injection, among others. Several research articles have been reviewed with some proposed solutions but these solutions have fallen short of addressing account hijacking and malicious insider threats. In addition, the online survey conducted highlighted that insider breaches are among the main form of vulnerability to cloud data. These challenges within the cloud storage informed the basis for the design of a scheme for improving data confidentiality in the cloud computing environment. The data confidentiality is achieved by implementing authentication login which triggers a six digit code to be sent to a client mobile or e-mail for further authentication, thus, enabling situational awareness of data breaches in real-time. This approach will enhance reliability and trust of cloud services enabling users to maximize on potential benefits offered by the cloud environment.
    URI
    http://hdl.handle.net/11071/5605
    Collections
    • MSIS Theses and Dissertations (2017) [9]

    Related items

    Showing items related by title, author, creator and subject.

    • Thumbnail

      A Framework to guide companies on adopting cloud computing technologies 

      Bitta, Maurice Nyaoro; Marwanga (Dr.), Reuben
      Cloud computing has emerged as a popular computing model in the Westem world. It is still not well understood by many companies in the developing world that may benefit from its pay-per-use models, and low hardware and ...
    • Thumbnail

      Cloud computing implementation framework: case study of directorate of e-government 

      Karimi, Paul Kabui (Strathmore University, 2013)
      Information Technology has gone through a continuous paradigm shifts. All these shifts are either driven by technological change and advancement or the requirements by the clients. Hence these shifts have made the IT ...
    • Thumbnail

      Energy-efficient resource utilization algorithms in cloud data-centre servers 

      Kenga, Derdus (Strathmore University, 2019-02-13)
      The use of cloud computing has increased exponentially in recent years to satisfy computing needs in both big and small organisations. However, cloud data-centres consume enormous amounts of energy. This raises their ...

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of SU+Communities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV