Tuesday, May 5, 2020
Fog Computing Paradigm Scenarios Security ââ¬Myassignmenthelp.Com
Question: Discuss About The Fog Computing Paradigm Scenarios Security? Answer: Introduction The standards for the cloud computing is completely based on working over the demands where the network need to handle the access of the different shared pools with the easy configuration of the different resources. the provisioning is based on working over the management of the efforts with the cloud providers taking hold of the interaction. The cloud computing is mainly considered to be emerging with the major privacy concerns that are also related to the security measures (Hashizume et al., 2013). There are zero investments for the infrastructure development of the IT which has been the major concern for the cloud computing Security issues for the cloud computing As per the research, there are different issues related to the data loss of control with the dependency standards set for the cloud commuting. The challenge is also related to the data mining techniques where the functions, storing and the processing is depending upon the sensitivity of the day with the services that are related to work on the services for the cloud computing. The devices are set to take hold of the storage of the data with the computation which includes that there is a need to drive the services which could be important for the transfer from one to the other devices (Almorsy et al, 2016). The cloud computing measures are depending upon the access to the different measures which includes the eaves dropping, DNS spoofing and then setting the Denial of Service attacks as well. Problems The issues are also related to the system measures which includes the deletion of the data and then working over the concerns which includes the detection of the copies with the different levels of the data collection (Modi et al, 2013). The protection of the data is based on the privacy which includes the reliability measures with the secured forms of the communication. The computing is depending upon the measures where the availability and the approach is depending upon the utilities and how it can take hold of the changes related to the functionality and the pricing auditing liability factors. Technologies To take hold of the different technologies, it includes the grid computing, virtualisation and the VMWare setup which is important for the procurement and taking hold of the easy storage of the data or the charges. This depends on the transferring of the data and then set the access which is dependent on handling the questions which are related to the issues of the use of network. The forms are also related to the operating methods which includes how it is easy to access the different measures and the behaviour which could easily access to the system with the storage that is mainly without the specific details. The virtualisation layer is mainly to take forms which include how the execution and the work can compute the resources with the easy access to the different resources. (Stojmnovic et al, 2014) Applications set for this There are different measures that includes the computation of the resources and then work over the execution forms that include the processing of the software. The different programs are related to the processing which includes the handling of the customisation programs of the computer systems. It is also related to the working of the system which leads to the monitoring of the system and then working over the processes which could easily be set with the remote information of the computer. The forms are related to the corporations which also completely reply on the system working with the different rights that are important for the achievement of the goals. The system processes are related to the working in the corporations with the focus on the processing of the power and then working over the different patterns of the back-end access with the speeding of the different calculations. Clarification on the vague areas It includes the measures for the different resources which includes the storage and the easy handling of the processes with the handling of the system space with the services and the compliance. The standards are also set to take hold of the safety patterns and then work over the alignment of the privacy and security forms. (Hashem et al., 2015) Research Questions Q1: What are some of the measures which needs to be taken case for the security standards which are based on the confidential issues? Q2: How is it possible to work on the different cloud services which include the denial of the service attacks? Summary of the issues Mathew, A. (2012). Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework.International Journal of Multidisciplinary Research,2(4). The issues are related to the system process which includes the patterns related to the control of the data. This also works with the forms which related to the forms of the network security and the other forms of the public cloud services. The provider of the cloud also need to take hold of the forms which works with the easy access of the systems which includes the security breach and handling the control of the data over the setup where some of the customers tend to lack the control on the system patterns. Abbas, H., Maennel, O., Assar, S. (2017). Security and privacy issues in cloud computing. The issues are related to the working with the cloud assisted systems which includes the information leakage and the work is on how the user can handle the classification of the data with the different privacy issues. The data is then transmitted with the over with the forms that includes the art research and development. The forms include the services and how the DDoS mitigation is set with the performance based on the victim service resizing forms. The security measures are depending upon the security and the attacks which are related to the cloud business environments. Issues not addressed Mathew (2012), could have included the handling of the COBIT 5 which is important for the transparency and storing the data in an effective manner. The control is set with the risks to ensure the confidentiality of the system, integrity and the authentication control in a proper manner. The obligatory standards are also depending upon the management, contracts and the other enforcements which are legal. Abbas et al., (2017), can focus on the service oriented structures which includes the handling of the in-house managed enterprise. It includes the capability and the working through easy emergence of the security risks. (Khetri, 2013) The external tracking of the threats need to be handled with the attempt that includes the hardware attack and the social engineering. Impact of the above issues COBIT 5 could be for the IT governance and easy risks mitigation process. It is based on the different deployment models, where the computation is based on accessing the control and then working over the framework which includes the use of the SaaS hosted applications. The forms are set with the secured cloud computing works on the security challenges and then working over the functions related to providing the passwords and the host side firewalls. The security policies are related to the access of the restrictions with the security measures. The providers are also equipped with the easy handling of the services and the patch updates or the logs. Lesson Learnt The forms are related to the cloud computing where the scalability is based on measuring the management of the IT forms. (Puthal et al., 2015) Here, the resources are also related to work on the privacy and the security standards which includes how the consumers can work and follow the IT resources with the easy processing power and the storage, with service and the compliance. The organisation need to focus on the safety measures which are related to the alignment of the privacy requirements. Conclusion The cloud computing has been considered important to measure the physical and the logical safety measures. It works on the standards where the client works over the consideration of the VPN with the forms that include how the API can handle the monitoring and the working with easy control, monitoring and setting the cloud services. This is important with the API that includes the protection of the accidental forms with the different plugins that are related to the automatic updates which relates to the security concerns. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud accounting: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution.Telecommunications Policy,37(4), 372-386. Modi, C., Patel, D., Borisaniya, B., Patel, A., Engineering, M. (2013). A survey on security issues and solutions at different layers of Cloud computing.The Journal of Supercomputing,63(2), 561-592. Puthal, D., Sahoo, B. P. S., Mishra, S., Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. InComputational Intelligence and Networks (CINE), 2015 International Conference on(pp. 116-123). IEEE. Stojmenovic, I., Wen, S. (2014, September). The fog computing paradigm: Scenarios and security issues. InComputer Science and Information Systems (FedCSIS), 2014 Federated Conference on(pp. 1-8). IEEE.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.