
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>doi: 10.2139/ssrn.1989519
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive information to a public cloud environment, security concerns are a big challenge. Recent study has shown that security, privacy and legal issues are the main obstacles to the adoption of cloud services. This thesis looks at how a cloud service user can constantly place a check on the cloud service provider with respect to data security and in cases where there has been a breach of security agreement, how these breach can be traced using forensic tools by the provider. We implement a virtual environment to showcase our proposed solution and configure security and test out deployment using a forensic tool (Forensic Tool Kit).
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
