ABSTRACT
The transition towards paperless offices and increasing adoption of electronic transfer of information through emails and other web based content has prompted organizations to have a system which would manage their documents effectively. A cloud based document management system provides a hassle free classification and identity system that tags documents with information. Electronic documents are considered to be the most valuable information assets in enterprises. As the cloud security era is coming, the existing systems need to be upgraded with most cost-effective measures, so a document security management system suitable for cloud security is also designed. With more documents being integrated electronically and transferred as knowledge points, organizations see document management system as an integral tool to handle growing surge of data and respond to audits without heavy burdens to the business.
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security issues, which we discuss here, identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.
TABLE OF CONTENTS
Title page i Certification ii Dedication iii Acknowledgment iv Abstract v
CHAPTER ONE
- Introduction
- Background of the study
- Statement of problem
- Aims and Objectives
- Significance of the study
- Limitations of the work
- Organization of the work
- Definition of terms
CHAPTER TWO: LITERATURE REVIEW
- Introduction
- Security in the SPI model
2.2 Software-as-a-service security issues —————————————–
- Application security
- Multi-tenancy
- Data security
- Accessibility
2.3 Platform-as-a-service security issues —————————————–
- Third-party relationship
- Development life cycle
2.3.3 Underlying infrastructure security ——————————————–
2.4 Infrastructure-as-a-service security issues ————————————
2.4.1 Virtualization
2.5 Analysis of security issues in cloud computing ——————————
CHAPTER THREE: RESEARCH METHODOLOGY
- Existing System
- Proposed System
- System design
- Data Flow Diagram/ Use Case/ Flow Diagram ————————–
CHAPTER FOUR: IMPLEMENTATION TESTING AND INTEGRATION
- Implementation
- Main modules
- Hardware requirements
- Software requirements
- System testing
- Types of test
CHAPTER FIVE: SUMMARY, RECOMMENDATION AND CONCLUSION
- Summary
- Recommendation
- Conclusion
BIBLIOGRAPHY
References
Appendix
CHAPTER ONE
- Introduction
Cloud Computing is a new paradigm of computing which has evolved in recent times, it’s a platform where hardware and software are delivered to users in a manner that resembles the way utilities such as electricity are delivered to households today (Flanagan, 2002). Cloud computing is an online form of computing where users can access applications (especially, Web-Based Applications) via a web-browser, while the application is installed and stored on a data center which comprises several servers.
Background of Study
Cloud in computing domain describes the use of a collection of services, applications, information, and infrastructures which comprises pools of virtualization technology, disk storage, inexpensive servers, and network. These components can be rapidly orchestrated, provisioned, implemented, commissioned and scaled up or down providing for an on-demand utility-like model of allocations and consumption. As the users increasingly demand to satisfy their immediate information needs, the cloud has become a preferred platform to deliver such information. However, in cloud computing, cloud does not just only include data pipes, routers, and servers, it also involves providing services and capabilities to build applications. The importance of cloud computing has emerge as the bedrock of modern information system which can neither be overemphasized nor overlooked. An enterprise cloud computing is a controlled, internal place that offers rapid and flexible provisioning of compute power, storage, software, and security services.
In these age of complex business intelligence and big-data enterprise, enterprise cloud computing has corroborate with enterprise web applications which now serves as core business model that manages full-fledged collaborative workflow-based applications, spanning multiple individuals,
small scale business, IT inclined and non-inclined large scale businesses as well as organizations. Cloud enables enterprises to unleash their potential for innovation through greater intelligence, creativity, flexibility and efficiency, all at reduced cost.
Statement of Problem
Cloud computing as a new innovation and ultimate solution for utility and distributed computing on Web Applications has been used by billions of users across the globe since its inception. Its implementation and impact cut across several fields, disciplines and businesses across the globe. Nevertheless, cloud computing have been bedeviled by certain obstacles, the goal of this research study is to discern the factors affecting performance and provide some solutions or guidelines to cloud users that might run into performance problems:
- Integrity and protection of information deployed or stored in the cloud domain as oppose the traditional approach of information storage.
- Ability to transform data from diverse sources into intelligence and deliver intelligence information to right users and systems.
- The need for load balancing and traffic control when multiple users access the cloud service.
- Need to address the scalability issue: Large scale data, high performance computing, automaton, response time, rapid prototyping, and rapid time to production.
- Security, privacy and trust issues from the end users of cloud services.
- Adopting cloud as a platform to enhance a vibrant business intelligence environment.
Aim and Objectives
The aim of the research work is to design a cloud based document management and resource sharing system that provides solution to factors
affecting performance, security and reliability in the cloud computing domain. This research study has the following objectives:
- To offer a controlled approach for the problem of security, privacy and trust issues from the end users of cloud services.
- To offer benchmark for the amount of resources users can store in the cloud service which solves the problem of scalability and load balancing.
- To offer provision of on-demand utility to users of the cloud service at a quick response time.