question archive In 250-300 words outline your dissertation topic and goals for this semester as they relate to your dissertation course
Subject:Computer SciencePrice:15.86 Bought3
In 250-300 words outline your dissertation topic and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with.
create a topic related to Cloud Access & Security.
Cloud Cryptography
My dissertation topic is Cloud Cryptography. This focuses on the measures which have been put in place in the cloud to ensure that data and other resources shared within the cloud are secure. This dissertation will entail: Definition of cloud cryptography, how cryptography in the cloud works, how cloud data is secured by cryptography, how cryptography regulates the access of resources within the cloud, look at some of how attackers could exploit in gaining access to the cloud resources, the advantages and disadvantages of cloud cryptography, and recommendations on best ways to implement cloud cryptography. The main goals for this semester concerning my dissertation topic are to have a better and diverse understanding of cloud cryptography and its importance, to understand ways in which the resources within the cloud can be accessed with an attacker, and how these attackers can be prevented from accessing data within the cloud.
Some of the ways that could improve my dissertation are thorough research on the dissertation topic, Interaction with some of the security professionals who are more knowledgeable on this particular topic, and also performing the security analysis on various networks just to identify the vulnerabilities present and how possible these vulnerabilities could be solved. Some of the areas that I’m struggling with is in the analysis of various networks vulnerabilities that includes the use of the tools of analysis that will identify the vulnerabilities within a given network. Im also struggling with understanding the techniques in which this cloud security is being implemented but I'm sure with proper research and in-depth studies of this topic, I will be able to get a better understanding.