The transition towards paperless offices and increasing adoption of electronic transfer of information through emails and other web based content has prompted organizations to have a system which would manage their documents effectively. A cloud based document management system provides a hassle free classification and identity system that tags documents with information. Electronic documents are considered to be the most valuable information assets in enterprises. As the cloud security era is coming, the existing systems need to be upgraded with most cost-effective measures, so a document security management system suitable for cloud security is also designed. With more documents being integrated electronically and transferred as knowledge points, organizations see document management system as an integral tool to handle growing surge of data and respond to audits without heavy burdens to the business.

Cloud  Computing  is  a  flexible,  cost-effective,  and  proven  delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security issues, which we discuss here, identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.


Title page                                                                           i Certification                                                                     ii Dedication                                                                                                                                                                iii Acknowledgment                                                                                                                                                        iv Abstract                                                                             v


  1. Introduction                                                                              
    1. Background of the study                                                              
    1. Statement of problem                                                                   
    1. Aims and Objectives                                                                   
    1. Significance of the study                                                             
    1. Limitations of the work                                                               
    1. Organization of the work                                                             
    1. Definition of terms                                                                    


  1. Introduction                                                                             
    1. Security in the SPI model                                                            

2.2       Software-as-a-service security issues —————————————–

  1. Application security                                                                          
    1. Multi-tenancy                                                                           
    1. Data security                                                                             
    1. Accessibility                                                                             

2.3       Platform-as-a-service security issues —————————————–

  • Third-party relationship                                                                       
  • Development life cycle                                                               

2.3.3    Underlying infrastructure security ——————————————–

2.4       Infrastructure-as-a-service security issues ————————————

2.4.1    Virtualization                                                                            

2.5       Analysis of security issues in cloud computing ——————————


  • Existing System                                                                      
    • Proposed System                                                                   
    • System design                                                                        
    • Data Flow Diagram/ Use Case/ Flow Diagram ————————–


  1. Implementation                                                                                  
    1. Main modules                                                                                      
    1. Hardware requirements                                                                                 
    1. Software requirements                                                                                  
    1. System testing                                                                                     
      1. Types of test                                                                                      


  • Summary                                                                                       
    • Recommendation                                                                            
    • Conclusion                                                                                     





  1. Introduction

Cloud Computing is a new paradigm of computing which has evolved in recent times, it’s a platform where hardware and software are delivered to users in a manner that resembles the way utilities such as electricity are delivered to households today (Flanagan, 2002). Cloud computing is an online form   of   computing   where   users   can   access   applications   (especially, Web-Based Applications) via a web-browser, while the application is installed and stored on a data center which comprises several servers.

               Background of Study

Cloud  in  computing  domain  describes  the  use  of  a  collection  of  services, applications,  information,  and  infrastructures  which  comprises  pools  of virtualization  technology,  disk  storage,  inexpensive  servers,  and  network. These  components  can  be  rapidly  orchestrated,  provisioned,  implemented, commissioned and scaled up or down providing for an on-demand utility-like model of allocations and consumption. As the users increasingly demand to satisfy their immediate information needs, the cloud has become a preferred platform  to  deliver  such  information.  However,  in  cloud  computing,  cloud does not just only include data pipes, routers, and servers, it also involves providing services and capabilities to build applications. The importance of cloud computing has emerge as the bedrock of modern information system which can neither be overemphasized nor overlooked. An enterprise cloud computing  is  a  controlled,  internal  place  that  offers  rapid  and  flexible provisioning of compute power, storage, software, and security services.

In  these  age  of  complex  business  intelligence  and  big-data  enterprise, enterprise cloud computing has corroborate with enterprise web applications which now serves as core business model that manages full-fledged collaborative  workflow-based  applications,  spanning  multiple  individuals,

small scale business, IT inclined and non-inclined large scale businesses as well as organizations. Cloud enables enterprises to unleash their potential for innovation through greater intelligence, creativity, flexibility and efficiency, all at reduced cost.

               Statement of Problem

Cloud computing as a new innovation and ultimate solution for utility and distributed computing on Web Applications has been used by billions of users across the globe since its inception. Its implementation and impact cut across   several   fields,   disciplines   and   businesses   across   the   globe. Nevertheless, cloud computing have been bedeviled by certain obstacles, the goal of this research study is to discern the factors affecting performance and provide some solutions or guidelines to cloud users that might run into performance problems:

  1. Integrity and protection of information deployed or stored in the cloud domain as oppose the traditional approach of information storage.
  2. Ability to transform data from diverse sources into intelligence and deliver intelligence information to right users and systems.
  3. The need for load balancing and traffic control when multiple users access the cloud service.
  4. Need to address the scalability issue: Large scale data, high performance computing, automaton, response time, rapid prototyping, and rapid time to production.
  5. Security, privacy and trust issues from the end users of cloud services.
  6. Adopting cloud as a platform to enhance a vibrant business intelligence environment.

               Aim and Objectives

The aim of the research work is to design a cloud based document management and resource sharing system that provides solution to factors

affecting performance, security and reliability in the cloud computing domain. This research study has the following objectives:

  1. To offer a controlled approach for the problem of security, privacy and trust issues from the end users of cloud services.
  2. To offer benchmark for the amount of resources users can store in the cloud service which solves the problem of scalability and load balancing.
  3. To offer provision of on-demand utility to users of the cloud service at a quick response time.