Masters Theses


"Security continues to be a major challenge for cloud computing, and it is one that must be addressed if cloud computing is to be fully accepted. Most technological means of securing non-cloud computing systems can be either applied directly or modified to secure a cloud; however, no integrated model-based methodology is yet available to analyze cloud security requirements and develop policy to deal with both internal and external security challenges. This work proposes just such a methodology and demonstrates its application with specific cases. Cloud assets are represented by high order object models, and misuse cases together with malactivity swimlane diagrams are developed to assess security threats hierarchically. Cloud security requirements are then specified, and policies are developed to meet them. Examples show how the methodology can be used to elicit, identify, analyze, and develop cloud security requirements and policies using a structured approach, and a case study evaluates its application by a cloud service provider. Finally, the work shows how the prevention and mitigation security policies presented here can be conveniently incorporated into the normal functionality of a cloud computing system"--Abstract, page iii.


Liu, Xiaoqing Frank

Committee Member(s)

Yu, Vincent (Wen-Bin)
Madria, Sanjay Kumar


Computer Science

Degree Name

M.S. in Computer Science


University of Mines and Technology, Ghana


Missouri University of Science and Technology

Publication Date

Fall 2010


vii, 50 pages

Note about bibliography

Includes bibliographical references (pages 110-112).


© 2010 Kenneth Kofi Fletcher, All rights reserved.

Document Type

Thesis - Open Access

File Type




Subject Headings

Cloud computing -- Security measures
Computer networks -- Case studies -- Security measures
Object-oriented programming (Computer science)

Thesis Number

T 9726

Print OCLC #


Electronic OCLC #