The term cloud computing is talked about a lot nowadays since it holds a great future in information infrastructure and has gained so much attention of both academics and enterprises as well. With cloud computing implementation, network’s prominent area, including data, applications and systems is under the control of third party service providers. This means that security responsibilities will be shared between the cloud service provider and the customer. Therefore, it is very crucial that the customer very well understands security offered by the cloud service provider and the security that should be maintained by them. The research will provide the understanding of security responsibility distribution on the cloud service provider and the customer. Cloud security can be implemented in several levels which only cover cloud infrastructure, namely: network security, physical security, application security and system security. Security can also take place at higher level: on processes, duties and people.
The manner in which security controls are implemented in cloud computing is similar to those of traditional IT environments, however due to the nature of asset distribution, security risks differ depending on the type of assets used, who manages those assets and how, and control mechanisms used.
This project will have the following research objectives:
The researcher should answer the following questions:
What are the scenarios that clouds data integrity should be considered?
How can the security of data in the cloud attained?
What are the benefits of cloud security
What are the risks associated with cloud computing?
ENISA. (2009). Cloud Computing Benefits, risks and recommendations for information security. Accessed 25 June 2015 from
Glenn B. & Rich M. (2009). Security Guidance for Critical Areas of Focus in Cloud Computing, Version 2.1. Accessed 25 June 2015 from
Peter M. & Tim G. (2009). The NIST Definition of Cloud Computing, Version 15. Accessed 25 June 2015 from