Tuesday, May 5, 2020

International Of Electronics Engineering †Myassignmenthelp.Com

Question: Discuss About The International Of Electronics Engineering? Answer: Introducation The report will discuss in detail about the concept of cloud computing and various issues surrounding it. The concept of cloud computing has completely changed the way IT is managed as well as consumed in the organizations. It promises improved level of cost effectiveness, elevated level of innovation, quicker time to market the product and the capacity to be able to scale applications based on demand. The concept got popular in 2008 and further continued making a major impact through various models and the advantages seemed to be substantia (Chen Zhao, 2012). But with the emergence of cloud computing and development which was rapid in conceptual terms and, as well, there were number of legal, service quality, economic, security and privacy based challenges in the market needed to address. Summary of two peers research paper on cloud computing The important security and privacy issues in cloud computing are discussed in detail below: Network and data: there are number of phases in security network as well as data security discussed in detail below: - Data confidentiality: the concept of data confidentiality is a prominent issue which is required to be considered especially when highly confidential data is outsourced to the cloud. It can be accomplished via encrypting the data but there are number of critical issues in the process because of distribution as well as management of keys (Sen, 2013). Data integrity: the process of integrity is based on verifying the data and it further ensures the overall quality of data. In this model, integrity of data storage is a crucial and significant need since it proves in consistency, validity and regularity. With cloud based service needs and rise in it, the CSP requires to scale up the overall storage systems and this further may lead to high possibility of loss in data, corruption of data, failure of disk and many more. Data availability: the services are developed for the users and must be made available to them whenever required. At the same time, there are number of situation that are present in which data availability is not properly guaranteed. For instance, in unavoidable case like natural disasters, it is important to gain knowledge about the way data is used, verified as well as recovered by the owner of the data (Sen, 2013). Governance, compliances and legal issues: the physical place of the server based farm and cloud based infrastructure must be confidential by nature since the physical security of the infrastructure is also very crucial. The concept of CSP should have a process to save the customer data if there is any kind of suspected threat. In addition, this should be shared with the customers on request. Moreover, the purifying of the stored data in the cloud is a critical challenge which is needed to be discussed (Sen, 2013). The users of cloud must be assured that data will always be safe even when the cloud based service providers will collapse or gained by another organization. The cloud based users should also understand on how they can get the data back. Communication interface and virtual security: the users of cloud have an integral part to play in making sure that cloud services are secure. This is primarily because of the nature of connections as well as devices utilised by the users of cloud to connect to the cloud and has its own set of implications in security (Sen, 2013). Security and Security and Privacy Issues in Cloud Computing The report addressed the various security and privacy based issues in cloud computing. There are number of issues in security for cloud computing since it passes many level of technologies consisting network, operating system, databases, resource based scheduling, balancing of loads, concurrency control and management of memory. Thus, security issues for many such systems as well as technologies can be applied to cloud computing as well. For instance, the network that can interconnect with the system in cloud must be safe. In addition, the virtualization based paradigm in cloud computing further leads to many security issues. For instance, cases like mapping the current virtual machinery for the physical level machines must be carried out in safe manner (Awodele et al, 2017). The process of data security consists of encryption the data along with making sure that right policies are applied for data sharing. Moreover, resource allocation and management of memory related to algorithms must be secured as well. In the end, the process data mining methods must also be applied for the detection of malware in the system based on the approach which is adopted normally in IDSs also called intrusion detection system. There are six principal areas in cloud computing issues where tools and software are needed for substantial level of security attention. These six areas are securing data at rest, securing it at transit, authentication procedure, robust separation based on data belong to different consumers, regulatory issues and incident based response (Awodele et al, 2017). Issues not addressed in the discussion There is no are in ICT which is not touched by Cloud computing. Two important issues in security as well as privacy issue are: Losing control over data Dependency on the provider of cloud computing The above-mentioned issues can result in number of legal as well as security based concerns associated with infrastructure, management of identity, access based control, management of risk, regulatory based legal compliance, logging and auditing, control in integrity along with cloud computing concepts based on risks (Jansen, 2011). Following is the overall impact of above-mentioned issues: - There are number of consumers that are aware of the danger of helping the data control out of the hand as well as storing data with an external cloud based computing provider. Data must be compromised by the system provider or other organization in competition where customers with similar cloud computing provider will help. The transparency is also lacking for the number of customers on how, why, when and where the current data processing can happen (Takabi et al, 2010). This is in complete opposite of the data protection needs that customers must know about the happening with the data. There are number of cloud computing providers that can work on data mining tools to evaluate user based data. This is a very sensitive activity and since the users are normally storing as well as processing data which is sensitive by nature while usage of cloud based services. This is specifically right for various social media application that motivate the user to share a lot of their personal lives (Walia, 2017). Mobile device, specifically with the restricted storages as well as computing capacities are the main drivers for holding services as provided by the cloud computing despite the usage of software on single computers. In fact, the data that can be transferred from one mobile machine to another, are usually transferred through the cloud and when cloud based application on mobile device are integral part. Therefore, users usually put everything at risks without noticing the changes since they automatically assume that the data can be transferred (Abbas et al, 2017). Cloud computing is presented in a form of service, it must be accessed in remote areas. The overall connection that exist between the provider of cloud computing and customers is not always rightly saved. There are number of security risks that also threatens the transfers that consist of eavesdropping or spoofing of DNS and many other kinds of attacks. The overall shift in cloud computing ensures the usage of traditional management of risk approaches that are hard sometimes. Even though can control the data transfer to the cloud providers, along with risk management and compliance with issues can split between the cloud based provider (Tatwani Tyagi, 2015) Important lesson from the discussion It is important to consider following points in case of cloud computing issues: - Risk management and legal based issues should be defined rightly in the contract between the provider and the customers. There must be transparency about the process and storing of the data. This way, the overall trust between the provider and consumer will be gain some strength (Saha et al, 2014). The service provider must complaint in regulatory and legislative cell, when the consumers require to follow and consumers must have the power to complaint with respective system. The issues as well as the risks associated with it can impact data protection guidelines in Europe and must be considered rightly when cloud computing platforms are rightly located on servers. The line of communication that exist between the provider as well as the consumer must be rightly saved to make sure the process of confidentiality, authentication, integrity and moreover to reduce the risk of denial of service based attacks. An open platform with clear instructions related to measurements that ensure the security of interaction line that is obligatory by nature for any provider and must be based on open as well as transparent standards with technologies (Subashini Kavitha, 2011). The concept of cloud computing provider must also be obliged to make sure that there is data confidentiality. There are number of important deletion of data that must be inculcated into potential regulation of various cloud computing services and it must not depend on too much. The reason that there is no full proof guarantee with complete deletion of data must be considered when data is collected as well as stored. Reference Abbas, H., Maennel, O., Assar, S. (2017). Security and privacy issues in cloud computing. Awodele, O., Adebayo, A. O., Tayo, O. O. (2017). Security and Privacy Issues in Cloud Computing.Communications,7, 14-17. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Jansen, W. A. (2011, January). Cloud hooks: Security and privacy issues in cloud computing. InSystem Sciences (HICSS), 2011 44th Hawaii International Conference on(pp. 1-10). IEEE. Saha, T., Sen, P., Datta, A. (2014). Security and Privacy Issues In Cloud Computing.Communication, Cloud and Big Data: Proceedings of CCB 2014. Sen, J. (2013). Security and privacy issues in cloud computing.Architectures and Protocols for Secure Information Technology Infrastructures, 1-45. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), 1-11. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments.IEEE Security Privacy,8(6), 24-31. Tatwani, L. N., Tyagi, K. R. (2015). Security and Privacy issues in Cloud Computing.International Research Journal of Computer and Electronics Engineering (IRJCEE, USA), ISSN. Walia, S (2017). Security and Privacy issues in Cloud Computing.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.