Show simple item record

dc.contributor.authorTikwang, Iriale Fabiano
dc.date.accessioned2017-11-17T11:25:13Z
dc.date.available2017-11-17T11:25:13Z
dc.date.issued2017
dc.identifier.urihttp://hdl.handle.net/11071/5605
dc.descriptionThesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Computer-Based Information Systems (MSIS) at Strathmore Universityen_US
dc.description.abstractCloud computing has ushered in an era whereby small and medium sized companies enjoy computing power which was usually a preserve for big corporations. Despite these benefits, the present cloud data confidentiality techniques are still evolving, and as they evolve so are the threats, hence posing security and privacy challenges, thus becoming an impediment to cloud adoption. Currently, cases have been cited where hackers have stolen stored cloud data, later to appear in social media embarrassing the firms. Among the key vulnerabilities attributed to loss of cloud data include: account hijacking, malicious insider breaches, data breaches attributed to weak Identity and access management, phishing, SQL injection, among others. Several research articles have been reviewed with some proposed solutions but these solutions have fallen short of addressing account hijacking and malicious insider threats. In addition, the online survey conducted highlighted that insider breaches are among the main form of vulnerability to cloud data. These challenges within the cloud storage informed the basis for the design of a scheme for improving data confidentiality in the cloud computing environment. The data confidentiality is achieved by implementing authentication login which triggers a six digit code to be sent to a client mobile or e-mail for further authentication, thus, enabling situational awareness of data breaches in real-time. This approach will enhance reliability and trust of cloud services enabling users to maximize on potential benefits offered by the cloud environment.en_US
dc.language.isoenen_US
dc.publisherStrathmore Universityen_US
dc.subjectCloud Data Security Modelsen_US
dc.subjectCloud Security Architecturesen_US
dc.subjectCloud Security Algorithmsen_US
dc.subjectCloud Authorization Accessen_US
dc.titleA Scheme for improving data confidentiality in the cloud computing environmenten_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record