Ph.D Guidance In Cloud Security

The explosive growth of Cloud computing technology has led to the enterprise cloud vendors become a lucrative industry. The huge volume of data stored in the cloud not only improves the profit of the cloud vendors but also, creates the opportunity for cybercriminals. Hence, modeling the Cloud security is a pivotal concern to secure the sensitive information and infrastructure of cloud computing. Cloud security involves a set of policies, regulations, and technologies to protect data and applications belongs to the cloud. To secure cloud data, Cloud security measures widely involve encryption management and authentication or access control.

As Cloud computing offers virtual services, local hardware, and low-cost services to users over the Internet, the users store everything in the cloud. In consequence, maintaining security becomes crucial to keep the stored data safely. Over the past few years, security breaches and technological attacks have increased exponentially in the cloud environment. Both the business organizations and personal users necessitate the cloud security as an essential element to know that the businesses have legal obligations to protect the user data and to recognize that their information is secure respectively.

  • Research Proposal in Cloud Security
  • Problem Identification in Cloud Security
  • Research Methodology
  • Mathematical Model / Formulation
  • Literature Survey in Cloud Security
  • System Design and Implementation
  • Performance Analysis and Results
  • Writing Services: Journal Papers, Synopsis and Thesis

Courses

  • Ph.D – Computer Science and Engineering, Computer Science, Computer Application, Information Technology and Computer Networks.
  • M.E/M.Tech/M.S – Computer Science and Engineering, Computer Science, Computer Application, Information Technology and Computer Networks.

Research Topics

  • Cloud data security
  • Security architecture for cloud computing
  • Data logging in cloud security
  • Secure cryptographic cloud communication
  • Artificial Intelligence (AI) for Cloud security
  • Machine learning based Cloud security solution
  • Cloud security through deep learning
  • Secure outsourcing of Big data in Cloud
  • Security protocols for cloud computing
  • Risk management in a cloud environment
  • Cryptographic protocols against internal attacks in clouds

Tools and Technologies

  • Java/CloudSim
  • Netbeans 7.0
  • Eclipse 4.3
  • Tomcat 7.0
  • Glass Fish 4.0
  • My-SQL 5.5
  • Apache Axis2
  • ArgoUML
  • Java Database Connectivity (JDBC)
  • Java Server Pages (JSP)
  • Servlets
Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit