Tuesday, May 5, 2020

Security and Privacy Cloud Computing †Free Samples to Students

Question: Discuss about the Security and Privacy for Cloud Computing. Answer: Introduction The cloud computing is for innovation with the list of all the benefits where the business and the governmental standards, small or the medium sized organisations can match with cutting down the costs and reducing the complexities of the infrastructural configurations. The issue is related to work on the emerging information with the enhancement of the different security standards. As per the analysis, there is a major loss which leads to the number of the security and the legal related patterns, identity management, and the control of access, risk management and the regulatory or the legislative compliance (Dinh et al., 2013). The issues are also related to the forms where the danger is mainly to let the control of the data out of the hands and then store the data in the cloud computing provider. The data must be compromised with the cloud computing which handles the lack of transparency for the customers on how, why and the data is processes. (Manvi et al., 2014). The issues are related to the deletion of the data along with handling the detection which is mainly related to data collections. The forms are related to the data protection and the privacy which includes the ability to work and take hold of the provider ability which includes the secured communications. The mobile devices are set with the limited storage and computing based on the services to make use of the software on the individual computers. The cloud computing is based on accessing with transfer line which includes the DNS spoofing, Denial of Denial attacks (Sultan, 2014). The computing provider, risk management and the compliance issues are based on the trust factor with the regulatory and legislative compliance which is also problematic. Relevant technology The technologies that included in this is set with the grid computing, VMWare with the utility standards to take hold of the easy storage with the easy transfer which depends on the accessing for the different requests. The forms are set with the operating systems where the users can easily access the servers with the enforcement of the mandatory standards which includes the data that is gathered and stored. The issues and the concern is related to the specific computing provider which includes the availability to go bankrupt and then stop providing the services. The cloud computing features are based on the computing with the elasticity, multitenancy with the potential for the maximised resource utilisation. The on-demand nature is set with the high levels of the virtualisation, automation, and easy accessibility with reliable intent which allows the scaling up and using the minimum resources(Aazam et al.,2014). The issues are related to the data control lack which includes the lack of the trust with the access, uncertainty about the status of data. The forms are set with the data protection with the data security that plays an important role with the computing environment where the encryption technology whether the data at rest or transmitted is set over the internet. The user control works on offering the control of the consumer data to the service provider with data visibility and control that is found to be limited. The forms are set with the legal issues which include offering the control to the consumer data with the data visibility and control is found to be limited (Erl et al., 2013). The data transparency is missing where the data exposure which could be for the possible data with law of accessing data. The employee training and knowledge woks on the unauthorised usage with the forms that include the data ranging from the targeted advertising with the re-sale of the data on the cloud. The issues are related to the availability with the zero maintenance, subscription based services. The cloud platform woks on allowing the consumers to deploy the applications which does not include the management or control of the infrastructure. It includes the IT resources, processing of the power with storage and the data centre space. The organisation need to set with the measures and then working over the cloud computing which is for the data management business that strengthen the client-side security. The web browsers are considered to take hold of the computing services which is for providing the consumers with the API and the other monitoring of the cloud services. As per the research paper, the details include the issues which include the information leakage and then working over the system standards. Here, the DDoS mitigation methods are used which focus on the evaluation of the performance with the affinity based victim service techniques. The forms are also related classification where the client side is set for the physical and the logical safety that is provided to the clients which is another big challenge. Hence, to maintain the security of the client organisations. There is a need to focus on the security practices with the employing and setting the factors to make sure of the security through the VPN to connect to the provider. Issues not addressed Mathew, (2012) has the possibility to look for the different measures which could be using COBIT 5 to handle the loss of the data. Through this, the network security concern and the EC2 cloud service and the modification of the security services need to be handled for the employees to include the contractors, organisational affiliate and then accessing to the organisation networks (Moreno et al., 2013). The public cloud services are set with the exposure to the data which is secured mainly using firewalls. The authentication process includes the confidence about storing the secured data patterns and then measures the forms which include the restricted user access. Abbas (2017), can focus on the different forms of the information assets with the security risks standards. Here, there is a need to make use of the system with the hardware attack, social engineering and handling the supply chain attacks. It works with the data leakage which needs to be controlled with handling the leakage of the data which is potential for the competitor. Impact of the above issues COBIT 5 could be helpful for controlling the access and then working over the system standards which could be easily set with the incorporate with the tests that are based on SaaS hosted applications. The enhancement methods are based on using the secured VPN with the use of the default vendor passwords and the firewalls. The security policies are also to take hold of the security forms with easy access to the restriction which could be important for the patch updates. Here, the providers also need to focus on handling the services which are being removed from the cloud. The resources are based on handling the risk management with the easy and well-defined standards (Xiao et al., 2013). It includes the services that need to be compliant with the regulation and the customer also need to follow which will enable the regulations based on the protection of the rules. The communication line is set with the cloud computing provider and then working over the confidentiality, integrity and the authentication control. Conclusion It includes the telecommunication network that will help in easy handling of the network devices which could easily be protected against any type of the malware (Khan et al., 2013). The adequate logging and the auditing is important for the strengthening and then working over the regulations to balance the power between the providers and the customers. The critical services are set with the guarantee and the liability forms which is the major part of the application. References Aazam, M., Khan, I., Alsaffar, A. A., Huh, E. N. (2014, January). Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. InApplied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on(pp. 414-419). IEEE. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Erl, T., Puttini, R., Mahmood, Z. (2013).Cloud computing: concepts, technology architecture. Pearson Education. Khan, A. N., Kiah, M. M., Khan, S. U., Madani, S. A. (2013). Towards secure mobile cloud computing: A survey.Future Generation Computer Systems,29(5), 1278-1299. Manvi, S. S., Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey.Journal of Network and Computer Applications,41, 424-440. Moreno-Vozmediano, R., Montero, R. S., Llorente, I. M. (2013). Key challenges in cloud computing: Enabling the future internet of services.IEEE Internet Computing,17(4), 18-25. Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges.International Journal of Information Management,34(2), 177-184. Xiao, Z., Xiao, Y. (2013). Security and privacy in cloud computing.IEEE Communications Surveys Tutorials,15(2), 843-859.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.