"I applied to the University Scholars Program to get the opportunity to conduct research and have my work published. I also wanted to get access to the resources the Scholars program provides us to further my understanding of academic research. I hope to learn more about the academic research process in preparation for graduate study and to gain a deep understanding of the topic of my research."
Computer Engineering - Software
Computer programming, software design, cloud computing, and security
Academic and Other Awards
- University Scholars Program Scholarship (2011-2012)
- Florida Academic Scholar
- National Merit Scholar
- Thomas J. Watson Scholar
- Palm Beach County
- Gator Club Scholar
- Summa Cum Laude Honors
- Association for Computing Machinery
- UF Programming Team
Ronald McDonald House.
Hobbies and Interests
- Algorithmic programming competitions, anime, manga, tennis and reading.
A Survey of Security Issues in Cloud Computing
As information and data requirements grow exponentially and consumption of IT resources burgeons, effective management and delivery of these resources becomes an important challenge that drives the IT industry. Cloud computing provides a model for managing and delivering IT resources efficiently and flexibly. However, there are many factors that inhibit consumers from adopting cloud computing models. These include a lack of standardization among cloud offerings, concern about reliability and availability, concern about secure access, concern about data privacy and integrity, unclear value proposition, and legal issues pertaining to ownership and use of cloud offerings. There is also considerable concern about hosting private information off-site and the ability of cloud providers to monitor user activity. The highest on this list of concerns is security. The security issue with cloud computing is multifold. Cloud offerings hold issues with physical security, protection against auditing, information encryption, data integrity, data privacy, secure communication, and session hijacking. As clouds are accessed primarily through the Internet, cloud offerings are vulnerable to the same attacks as other Internet services. Security vulnerabilities also exist in the domain of virtual machines and virtual networks, a core component of cloud computing – monitoring and regulation of virtual network access poses many difficulties. The goal of this project is to research security issues within cloud computing and their relationship to hesitance in the adoption of the cloud. I will comprehensively identify the security hotspots within the context of the cloud environment through a survey of the techniques that are currently being used. I will research the appropriateness of these techniques within the cloud environment, and analyze their shortcomings. I will research approaches to overcome these shortcomings to facilitate adoption of the cloud environment. I will also identify areas in which further research can be done within the area of cloud security.