Chapter 9 1. How does the source of your software code affect the overall security of the system? Justify your position for a general system. 2. What protections can you….
Software Security in Cloud computing
Theproject report will discuss about the software security in cloud computing The report will also describe software security concept, operation, trends and best practice in cloud computing including how to build the security, operation,and what tools can be used for softwaresecurity. The project will also describe Security Design Principles in cloud computing, good practices and approaches in security. A sample code set “A private key corresponds to a single string” will be provided in this report.
The table of contents:
Reasons for insecure software in cloud computing
Software Security tools
Security Design in Cloud Computing
The following references will be used for this project.
- G. Hoglund and G. McGraw, 2004 Exploiting Software: How to Break Code, Addison-Wesley.
2. J. Viega and G. McGraw, 2001, Building Secure Software, Addison-Wesley;
3. M. A. Morsy, J. Grundy and Müller I. 2010 , “An Analysis of the Cloud Computing Security Problem” In PROC APSEC 2010 Cloud Workshop. 2010.