Friday, December 6, 2019
Information Security Privacy Issues in Cloud Computing
Question: Discuss about theInformation Security for Privacy Issues in Cloud Computing. Answer: Brief Supportive Description about Future Generation Computer System According to the context of the report the chosen topic for analysing the impact of the information security system is: security and privacy issues in cloud computing. In contrast with this topic, this report is elaborating the review of one article: Future Generation Computer System. Challenges In contrast with the issues of security within cloud computing characteristics of singular infrastructure of cloud base there are several distinguishable security threats and challenged involved within the system (Beloglazovet al. 2012). These are mainly concerned with the software, hardware and data resources. These challenges introduced by cloud computing should be resolved in order to get an effective and secured system set up. Problems There are three core areas to be concerned about: security of hardware, software and data. Security perspectives of these three are discussed with respect to the virtual level, application level and physical level (Zissis and Lekkas 2012). These are not secured enough with the cloud computing base as there are several security issues within the system. These problems are discussed as follows: Level Service level Users Security requirements Threats Application level SaaS End client sends signal to the cloud provider who is accountable for that usages of the cloud Privacy set up in multitenant environment Data protection Software security Interception Interruption of data Privacy breaches Session hijacking Virtual level PaaS Developer is the user here. The moderator applies for deploying the software Access control Security of the applications Security of data Modification of the software Interrupt detection of software Impersonation Physical level Physical Datacenter Owners are user here Network protection Reliability of the hardware Protection of the network resources DDOS Flooding of the connection Theft of the hardware Natural disasters Figure 1: Categorization of threats in cloud computing (Source: Garg et al. 2013, pp-1012) Relevant Technologies There are several technologies as well as service models within cloud-based system. These are: SaaS, IaaS, PaaS, big data analytics, Disaster recovery technologies etc. In case of IaaS, the consumer has control over the operating system and storage (Dinhet al. 2013). In case of PaaS, the consumer has the capability to deploy into the cloud base. In case of SaaS, the consumer can use the providers application. Applications of the Technologies IaaS allows the automated deployment of servers. PaaS allows increment of developer productivity ad SaaS replaces tradition on- device software and the application of other technologies are discussed as follows: IaaS and PaaS: The option of using IaaS based cloud model the companies can safe a huge amount of money on pay- per- use policy (Garget al. 2013). This can helps in managing the IT infrastructure. In case of the PaaS, it also helps to reduce the time used for operating any application. The main application of PaaS is that it offers the consumer to deploy the platform of cloud. Figure 2: IaaS and PaaS (source: Fernandoet al.2013, pp- 84) Hybrid and private cloud: Among all the cloud based application most of the organizations are willing to use the public cloud in order to improvise their organizational structure (Li et al. 2013). However, in case of development and test this aspect may be of limited to time. In this scenario, application of hybrid cloud can be improvise he situation. Big data analytics: Most effective application of the cloud computing is that, it can store both the structured and unstructured data within the cloud. This aspect affects the storage capability of the system used in business operations as well as for daily usages (Zissis and Lekkas 2012). The excess amount of stored data about the customers as well as about the products they have to manufacture and sell in the competitive market. In addition to this, social media also take advantage while storing user data in to the cloud. Figure 3: Big Data (Source: Li et al. 2013, pp- 131) Disaster recovery (SAN to SAN, hot site DR): Cloud based system is the most effective in recovering any lost or corrupted data within the information system (Fernando et al. 2013). Cloud based system provides cost effectiveness in providing the disaster recovery solutions. The cloud based systems uses SAN- to- SAN replication and hot site DR are used as technological backups. Clarify Vague Areas In the concerned paper, the applications of relevant technologies are not elaborated properly. There are various technologies and service models that are being used explicitly in cloud computing. These are big data analytics, disaster recovery technologies, IaaS, SaaS, PaaS etc. several applications of these technologies are discussed previously in the part of application of technologies used in cloud computing. In addition to this, there are several advantages of these technologies. These are explained as follows: Advantages of Big data: Big data analytics is such a platform that can store numerous numbers of data (Erl et al. 2013). It improvises the capability of the storage cloud base. Advantages of IaaS, PaaS and SaaS: IaaS provides the capability to the customer for accessing the storage, networks etc (Dinh et al. 2013). PaaS provides the consumer to be capable of deploying the software platform and SaaS provides the consumer to run the applications within the cloud infrastructure. Advantages of disaster recovery technologies: SAN-to-SAN and hot site DR are two technologies that provides the capability of recovering the lost and corrupted data to the cloud computing (Beloglazov et al. 2012). This aspect makes the cloud computing more advantageous in comparison with other technological advancements. Advantages of hybrid and private cloud: Hybrid and private cloud ensures the consumers a chance to share their data publically and make their information system more compatible with the evolving situations. Research Questions What are security threats related to cloud computing? What are the key reasons of Security and Privacy Issue in Cloud Computing? What are the Relevant Technologies and Applications available in cloud computing? References Beloglazov, A., Abawajy, J. and Buyya, R., 2012. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing.Future generation computer systems,28(5), pp.755-768. Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), pp.1587-1611. Erl, T., Puttini, R. and Mahmood, Z., 2013.Cloud computing: concepts, technology, architecture.Pearson Education. Fernando, N., Loke, S.W. and Rahayu, W., 2013. Mobile cloud computing: A survey.Future Generation Computer Systems,29(1), pp.84-106. Garg, S.K., Versteeg, S. and Buyya, R., 2013. A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), pp.1012-1023. Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), pp.131-143. Rittinghouse, J.W. and Ransome, J.F., 2016.Cloud computing: implementation, management, and security.CRC press. Zissis, D. and Lekkas, D. 2012.Future Generation Computer Systems. [online] Ac.els-cdn.com. Available at: https://ac.els-cdn.com/S0167739X10002554/1-s2.0-S0167739X10002554-main.pdf?_tid=1725d6d4-7cd6-11e6-a141-00000aacb35dacdnat=1474117143_bc37784043211990c3f525d06cbc35d7 [Accessed 17 Sep. 2016].
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.