Project Title: Software Security in Cloud computing:
Theproject report will discuss about the software security in cloud computing The report will also describe software security concept, operation, trends and best practice in cloud computing including how to build the security, operation,and what tools can be used for softwaresecurity. The project will also describe Security Design Principles in cloud computing, good practices and approaches in security. A sample code set “A private key corresponds to a single string” will be provided in this report.
The table of contents:
Introduction
Reasons for insecure software in cloud computing
Building Security
Security Operation
Software Security tools
Security Design in Cloud Computing
Sample Code
Conclusion
The following references will be used for this project.
- G. Hoglund and G. McGraw, 2004 Exploiting Software: How to Break Code, Addison-Wesley.
2. J. Viega and G. McGraw, 2001, Building Secure Software, Addison-Wesley;
3. M. A. Morsy, J. Grundy and Müller I. 2010 , “An Analysis of the Cloud Computing Security Problem” In PROC APSEC 2010 Cloud Workshop. 2010.