Contents & References of Examining, comparing and simulating security solutions in cloud computing
List:
Abstract 1
Chapter One: Introduction
1-1-Definition. 3
1-1-1-mobile cloud computing. 3
1-1-2- intrusion detection systems in cloud computing. 4
1-1-3- Security in cloud computing. 4
1-1-4-digital signature. 5
1-2- Research methodology. 5
1-3- specific objectives of the research. 5
1-4- The achievement of the project 6
1-5- The importance and necessity of conducting research. 7
1-5-1- SOAP package attack (Wrapping Attack) - platform layer as a service. 9
1-5-2- Attack through malicious codes (Malware-Injection) - Application software layer. 10
1-5-3-Flooding Attack - Platform layer as a service. 11
1-5-4- Information theft - (Data Stealing) Platform layer as a service. 11
1-6- The aspect of newness and innovation in research. 11
Chapter Two: Background of the research
2-1- Description of the research. 14
2-2- History of research. 14
2-2-1- History of cloud computing research. 14
2-2-1-1-Advantages and strengths of Cloud Computing. 14
2-2-1-1-1-lower costs. 14
2-2-1-1-2-more speed. 15
2-2-1-1-3-scalability. 15
2-2-1-1-4- Fast and permanent software update. 15
2-2-1-1-5-Storage of information. 15
2-2-1-1-6-Global access to documents. 16
2-2-1-1-7-independent of hardware. 16
2-2-1-2-weaknesses of cloud computing. 16
2-2-1-2-1-need for permanent internet connection. 16
2-2-1-2-2-doesn't work with slow internet connections. 16
2-2-1-2-3-limitation of features 17
2-2-1-2-4-lack of data security 17
2-2-1-3-types of cloud. 17
2-2-1-3-1-Public cloud. 17
2-2-1-3-2-Private cloud 17
2-2-1-3-3-Community cloud. 17
2-2-1-3-4-Hybrid cloud 17
2-2-1-4- Introduction of cloud diagrams and architectures. 18
2-2-1-4-1-Single "All-in-one" Server 18
2-2-1-4-2-Non-Redundant 3-Tier Architecture. 18
2-2-1-4-3-Multi-Datacenter architecture 19
2-2-1-4-4-Autoscaling architecture. 20
2-2-1-4-5-scalable architecture with Membase. 20
2-2-1-4-6-scalable multilayer architecture with Memcached. 21
2-2-1-4-7 Scalable Queue-based Setups. 21
2-2-1-4-8 internal hybrid architecture. 22
2-2-1-4-9-Scalable alarm-based and queue-based architecture. 22
2-2-1-4-9-Hybrid Cloud Site Architectures. 22
2-2-1-4-10-multi-cloud scalable architecture. 22
2-2-1-4-11-multi-cloud failover architecture 23
2-2-1-4-12-multi-cloud disaster recovery architecture. 23
2-2-1-4-12- cloud architecture and dedicated hosting. 23
2-2-2-Research history of intrusion detection and prevention systems in cloud computing. 24
2-2-2-1- Conclusion from the history of intrusion detection and prevention systems research. 25
2-2-2-1- 1- Classification of intrusion detection and prevention systems. 25
2-2-2-1-2- The challenges of developing detection and prevention systems. 30
2-2-2-1-3- intrusion prevention detection systems in cloud computing. 30
2-2-2-1-4- Security issues in cloud computing. 31
2-2-2-1-5- The challenges of deploying detection systems and preventing intrusions in cloud computing environments. 31
2-2-2-1-6- intrusion detection and prevention systems based on cloud computing. 32
2-2-2-1-7- Requirements for intrusion detection and prevention systems. 34
2-2-3-Research history of creating security in cloud computing. 35
2-2-3-1- The concept of privacy in cloud computing. 35
2-2-3-2-Types of information requiring protection. 36
2-2-3-3- Data life cycle 36
2-2-3-3-1-Generation 37
2-2-3-3-2- Use (Use) 37
2-2-3-3-3-Transfer 37
2-2-3-3-4-Transformation (Transformation) 37
2-2-3-3-5-Storage 37
2-2-3-3-6-Archive 38
2-2-3-3-7-Destruction 38
2-2-3-4-Privacy issues and its challenges. 38
2-2-3-4-1-Access 38
2-2-3-4-2-Compliance 38
2-2-3-4-3-Storage 38
2-2-3-4-4-Retention38
2-2-3-4-1-Access 38
2-2-3-4-2-Compliance 38
2-2-3-4-3-Storage 38
2-2-3-4-4-Retention 39
2-2-3-4-5-Destruction 39
2-2-3-5-Audit & Monitoring 39
2-2-3-6-Privacy Breaches 39
2-2-3-7-Common techniques to protect privacy. 39
2-2-3-7-1- Encryption Model 39
2-2-3-7-2-Access Control Mechanism. 40
2-2-3-General research history in the investigation of security solutions in cloud computing. 40
2-2-3-1-causes of cloud computing security failure. 42
2-2-4-Digital signature research record. 42
2-2-4-1- What is digital signature and digital security? 42
2-2-4-2- What is a digital certificate? 43
2-2-4-3-Register for a digital certificate. 43
2-2-4-4-Distribution of digital certificate. 43
2-2-4-5-Different types of digital certificates. 44
2-2-4-6-digital signature from the perspective of programming. 44
2-2-4-7-How to create a digital signature. 45
2-2-4-8-how a digital signature works. 46
2-2-4-9-how to create and use keys 47
2-2-4-10-possible attacks against digital signatures. 47
2-2-4-11-What is the certification center? 47
2-2-4-12-What is cryptography? 48
2-2-4-13-identification through digital signature. 49
2-2-4-14- Digital signature underlying the security of electronic exchanges. 49
2-2-4-15-What is meant by digital signature? 50
2-2-4-16- To what extent does the use of digital signature guarantee the security of exchanging financial and confidential documents? 50
2-2-4-17-What is SSL? 52
2-2-4-17-1- What is InstantSSL? 53
2-2-4-17-2- Advanced authentication technology 53
2-2-4-17-3- Online access to your profile in the cloud. 53
2-2-4-18-Encryption concepts. 54
2-2-4-18-1-Introduction and terms. 54
2-2-4-18-2- Algorithms 55
2-2-4-18-3- Public key encryption. 55
2-2-4-18-4-Hash value. 56
2-2-4-18-5- Are you authentic? 57
2-2-4-18-6-symmetric key systems. 59
2-2-4-18-7-Asymmetric key systems. 60
2-2-4-19- The structure and initial process of establishing a secure connection. 63
2-2-4-20-similar protocols. 64
2-2-4-21-concept of certificate in SSL protocol. 64
2-2-4-22-certification centers. 65
2-2-4-23- The general steps of establishing and creating secure communication on the web. 65
2-2-4-24-Notes on certificates 66
2-2-4-25-Identification. 67
2-2-4-26- WEP security services - Authentication. 67
2-2-4-27- Authentication without encryption. 68
2-2-4-28- Authentication with RC4 encryption. 69
2-2-4-29- Confidentiality and security. 70
2-2-4-30- Integrity. 71
2-2-4-31-The primary security weaknesses of WEP. 72
2-2-4-32-Dangers, attacks and security requirements. 74
2-2-4-33-problems and disadvantages of SSL. 76
2-2-4-33-1-Security problem in SSL. 76
2-2-4-33-2-problems of electronic commerce in Iran. 77
Chapter three: research method
3-1-tools used in simulation. 79
3-2-Installing NS-2 in Fedora Linux. 79
Chapter Four: Conclusion
Conclusion. 83
4-1- Suggested possible solutions for cloud computing security solutions attacks. 84
4-2- Comparison criteria used in simulation and the relationship of each of them to cloud security separately. 86
4-2-1- Delay Time criterion. 86
4-2-2- Throughput Security criterion. 86
4-2-3- Response Time criterion. 87
4-2-4- Traffic Ratio criterion. 87
4-3- The results obtained from the simulation of security solutions with NS2 software. 87
4-3-1- Delay Time (Sec) 87
4-3-1-1- Conclusion from the simulation of Delay Time criteria. 88
4-3-2- Throughput Security (Kb) 89
4-3-2-1- Conclusion from the simulation of Throughput Security measure. 90
4-3-3- Response Time (Sec) 90
4-3-3-1- Conclusion from the simulation of Time Response criteria. 91
4-3-4- Packet Traffic Ratio (%). 92
4-3-4-1- Conclusion from the simulation of the Traffic Ratio criterion. 93
4-4- General conclusion from the simulation and comparison of cloud security solutions. 93
Chapter Five: Conclusion and Suggestions
Conclusion.