Dissertation Abstract:
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive information to a public cloud environment, security concerns are a big challenge. Recent study has shown that security, privacy and legal issues are the main obstacles to the adoption of cloud services. This thesis looks at how a cloud service user can constantly place a check on the cloud service provider with respect to data security and in cases where there has been a breach of security agreement, how these breach can be traced using forensic tools by the provider. We implement a virtual environment to showcase our proposed solution and configure security and test out deployment using a forensic tool (Forensic Tool Kit)
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive information to a public cloud environment, security concerns are a big challenge. Recent study has shown that security, privacy and legal issues are the main obstacles to the adoption of cloud services. This thesis looks at how a cloud service user can constantly place a check on the cloud service provider with respect to data security and in cases where there has been a breach of security agreement, how these breach can be traced using forensic tools by the provider. We implement a virtual environment to showcase our proposed solution and configure security and test out deployment using a forensic tool (Forensic Tool Kit)