Security and Privacy in Cloud Computing

Primary supervisor

Additional information

Contact admissions office

Other projects with the same supervisor

Funding

  • Competition Funded Project (Students Worldwide)
This research project is one of a number of projects at this institution. It is in competition for funding with one or more of these projects. Usually the project which receives the best applicant will be awarded the funding. Applications for this project are welcome from suitably qualified candidates worldwide. Funding may only be available to a limited set of nationalities and you should read the full department and project details for further information.

Project description

Cloud computing, or computing as a utility, is a new computing paradigm. It allows third party service providers (i.e. cloud service providers) to provide a centralized pool of configurable computing resources to end-users. The end-users (individuals and enterprises) could make on-demand accesses to these resources and use them to implement their services according to their ever-changing requirements. In this way, the end-users do not need to deploy and manage their own computing services thus enabling fast deployment and minimum operational and management overheads.

While Cloud computing brings promising benefits, it also introduces some challenging security and privacy issues1. These issues include how data owners (i.e. entities which have outsourced their data) could be assured that their data are used in an authorized manner, how the confidentiality of outsourced data be protected while still allowing legitimate accesses of data, or allowing computations being performed on the data, how the trustworthiness of service metering be assured so that end-users are not charged unfairly, etc.

In this project, you will have the opportunity to research for effective solutions to address any one of these challenging security and privacy issues.

1. Kui Ren, Cong Wang and Qian Wang, "Security Challenges for the Public Cloud", Internet Computing, IEEE, Vol. 16, No. 1. (January 2012), pp. 69-73 2011, pp 69-73.

Person specification

For information

Essential

Applicants will be required to evidence the following skills and qualifications.

  • You must be capable of performing at a very high level.
  • You must have a self-driven interest in uncovering and solving unknown problems and be able to work hard and creatively without constant supervision.

Desirable

Applicants will be required to evidence the following skills and qualifications.

  • You will possess determination (which is often more important than qualifications) although you'll need a good amount of both.
  • You will have good time management.

General

Applicants will be required to address the following.

  • Discuss your final year Undergraduate project work - and if appropriate your MSc project work.
  • How well does your previous study prepare you for undertaking Postgraduate Research?
  • Comment on your transcript/predicted degree marks, outlining both strong and weak points.
  • Why do you believe you are suitable for doing Postgraduate Research?
▲ Up to the top