Enhancing IoT Device Security by Leveraging Cloud-based Enterprise System

Verified

Added on  2019/10/18

|10
|3603
|148
Report
AI Summary
The provided content discusses the importance of implementing security solutions on IoT devices and networks to protect them from various types of attacks. The report also highlights the need for decentralized storage instead of centralized storage, as a single failure can lead to complete data loss. Additionally, it emphasizes the importance of big data distribution over the network in cloud-based enterprise systems. The content also touches upon the topic of cloud- based enterprise security systems and suggests that future work should focus on upgrading control systems and risk models to achieve better defense solutions.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CLOUD-BASED ENTERPRISE SYSTEMS

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
In recent years cloud computing plays a major role in the IT industry by introducing completely a
new concept as well as the enterprise system. The previous system is very old and a little bit
expensive as well as complex in implementation and use. To prevent this type of situation cloud-
based enterprise system is recently introduced to provide flexibility, scalability, and independence in
the infrastructure of IT. Due to lack of much research and literature, this area is still completely not
explored but nowadays it attracted high interest from the general user. This paper going to explain
about the challenges and advantages of cloud enterprise system as well as their potential to ease the
daily life of the user.
Enterprise system planning mainly provides huge benefits to the complete enterprise. It helps the
enterprise to share their data and information of enterprise across all the function of the network.
Implementation and running of ERP systems over the cloud provide great benefits and advantages
in spite of different types of challenges. Here in this paper, we are going to discuss the challenges
and benefits of executing ERP system across the cloud environment.
Keywords : Cloud computing, ES, Cloud ES , ES challenges
Document Page
Introduction
In the time of recent technology advancement, Enterprise system is integrated with the cloud system
which have a centralized database and supports the main business process across the organization.
Enterprise system collects, records, manages, the data and information across the cloud-based
system. A modern enterprise system is totally based on cloud technology. Cloud ERP is a method in
enterprise resource planning which mainly uses cloud-based computing platforms where they
provide business with flexible business processes. For some industry, the promise of cloud
computing is that it will provide business in a completely new concept. Nowadays almost all the ES
selection is done mainly on the basis of its functionalities, cost, user-friendly, and integration
abilities with the existing system.
Enterprise systems mainly process to link with other IT management processes like strategic
planning process, program and project management process. The services of business play a bigger
role in service based information system because they fill the gap between service-oriented
architecture and processes of the enterprise system.
Enterprise Systems and Cloud Computing
As we see that nowadays computing is a leading edge technology which increases the area of cloud
computing to the edge of the networks. So many IoT devices are still not safe for cloud computing
service because of inappropriate mobility support, and due to lack of awareness about these things.
Modern technology like cloud computing can be a useful tool for increasing accessibility,
transparency, sharing of information, and decreasing the price of ownership. There is also a very
urgent requirement to give training and education so that every user have developed the capability
to make use of ES services.
Enterprise System is going to win in the long term when they fix transparent policies, make a large
investment in ICT infrastructure, adopt different open platforms, and secure involvement from both
the public and private bodies with users. Those who go for the road have to go from many obstacles
like the attitude of bureaucracy and legacy of history, inertial institutions and delay regulations, time
and money problems. Yet those go for the roads will be awarded when they remove obstacles in the
transformation of society. For them, the travel might become a dream come true experience.
Literature Review
Document Page
Enterprise resource planning helps in identifying priorities of business and root level competition of
the business. It controls modification, services, and updated solution in cloud computing. It can
cover the complete area and decrease the number of security threats cause due to the adoption of the
cloud-based enterprise system. At the same time, it also increases the solution cost which reduces
the number of user acceptance. There is always the risk of vulnerabilities present in the security of
the enterprise system. Enterprise resource planning connects a member of the public, government,
private sector, and specific government organizations. Basically, the activities involve between them
are the exchange of electronic data and information to acquire or provide services & products.
Enterprise system services help in reducing operating costs and give direct communication medium
with the citizens, government bodies and different types of companies. They are also responsible for
secure communications between the government bodies, citizens and various business
organizations. Basically, the main benefits of ES are present in its planned complete approach of all
aspects of the enterprise.
Enterprise architecture mainly processes to link with other IT management processes like strategic
planning process, program and project management process. Information system of any enterprise
should be developed in such a way that the exchange of data and information should take place
between customers and the company in a more secure way. It mainly consists of procedures, ICT
infrastructure, problems related to business like the process of business or excellence, transfer of
internal and external information. In the current scenario, cloud computing is the very best option
for the design and implementation of different innovative government services for their citizens and
business enterprise.
Cloud-based ES is one of the latest domains in the market and now this becomes a must-have in the
highly competitive technology driven in the open market. Cloud-based ES always ensures that
business assets should be regularly valued in good faith according to market condition and provide
good industry standards for each activity and exchanges or transactions operated in related to the
Enterprise system.
Case Study
As we discuss earlier that cloud computing mainly offers a centralized computing system, flexible
data storage and different type of scalable services. The proposed cloud-based enterprise system is
flexible and integrated environment due to which it will connect with a different type of processes.
But nowadays by using different approaches like the use of waste products, Waste Electrical and
Electronic Equipment (WEEE) in the manufacturing of cloud-based enterprise systems.
In the case study of A cloud-based production system for information and service integration: an
internet of things case study on waste electronics (BY Xi Vincent Wang and Lihui Wang) we see
that WEEE is taken as an example of IoT which show how by using old problems we can approach
with new threats. Cloud services recycle and recovery capabilities make them more useful in cloud-
based enterprise systems. But as time passes the waste material amount is increases day by day. In
America recently 3 million ton WEEE is discarded without any proper treatment. As the amount of
big data increase the breach in privacy with people data and information are also increases. Big data
always require high computational and big storage power that make people use distributed systems
to manage their large amount of data. Distributed systems mainly consist of so many different
parties which increase the risk of privacy among the users.
Multiple types of sources are responsible for the generation of data nowadays. Both machine and
human are responsible for the huge generation of data. Due to the huge amount of data generation,

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
which is complex and diverse in nature, it is tough to handle them with the previous design. Here
the big problem nowadays for a user to how they protect their data from the third party who want to
take their data at any cost and by using any methods. User can reduce privacy risk during the data
generation phase by using Data Falsifying and access restriction methods.
In all parts of the world, the electronic information
sources for cloud-based enterprise system are
becoming very efficient and more effective. The
overall goal of this system is very similar to that of
others to provide a contribution to scientific
knowledge by offering alternate solutions which
mainly rely on existing data. In the coming future, a
big amount of data being collected, achieved by
researchers across the globe are becoming more
easily accessible. (Alys Woodward,2018)
Service model topology of cloud ES
Cloud computing is the capability to acquire large resources easily and quickly according to the
need and the user charge for this on the basis of usage. It is a model for enabling user-friendly on-
demand service of network access to shared resources like servers, storage, which can be easily
available and have low management effort in maintenance. These are the main characteristics of
cloud computing: a) pooling of resource b) on demand network and other services c) elasticity and
calculated service. As complete we can say that cloud computing mainly based upon two things first
is cloud services and the second one is cloud platforms. In the platform of the cloud, the provider of
service creates a development environment according to the operating system where user required
application is executed or develop according to the demand of the user. Nowadays the most famous
cloud platforms are google app engine, Microsoft Azure, and Amazon elastic cloud computing.
The cloud-based environment helps in reducing the high workload from the mobile. It basically
boosts the operations of the network, access of data and speeds up the computation process. Due to
this many of the work can be completed at a very fast rate on a large scale. Cloud computing
Document Page
environment provides the best virtual environment on the same server at a very cheap cost. Here
we can say that the when virtual network run in a public cloud, it is very important to protect the
data and information of the user with end to end secure network. Very strong encryption and
authentication method are used for storing private information and during the exchange of data.
Advantages of Cloud-based Enterprise System
In a today modern world, a big amount of data are being archived and collected by researchers and
companies all over the world. Nowadays utilizing existing data for research purpose become more
prevalent. Analysis and review of cloud-based enterprise system give a cost-effective way of
handling problems, conducting cross analysis, fixing the direction and magnitude of change
trends.following are the main benefits of Cloud-based enterprise system:
a) Development, integration, and deployment at a continuous rate
b) Availability of containerized infrastructure
c) Specific application-centric management
d) Automatically scalable infrastructure
e) Environment consistency all over production and development testing
f) Less bonded infrastructure, where every component can act as a different unit
g) Higher rate of resource utilization
One of the key components of a cloud-based enterprise system is predictable infrastructure, where
it can run the application on clusters of physical and virtual machine infrastructure. It has also the
ability to run applications on the cloud. It helps in migrating from host-centric infrastructure to
container-centric infrastructure.
It is responsible for the development of two new industry like microservices and hybrid cloud. It is
work as the brain of distributed container deployment. Almost every clustering software of cloud-
based enterprise system can make these types of scheduling decisions, operating at the level of
individual services is not ideal. Applications in comparison to different services should still be
managed as a single application in almost every cases. It gives a layer over the infrastructure to
permit for this type of management. It is very portable, self-healing and extensible in nature. It is
capable to implements different functional improvements on top of the clustered infrastructure.
Whereas other technologies do a job at handling the clustering aspects, cloud-based enterprise
system mainly aims to offer the best management system.
Cloud Based Enterprise System Challenges
There are so many different types of ethical issues are present. They are normally divided into
four categories and generally known as acronym PAPA. Here PAPA stands for Privacy,
Accuracy, Property, and Accessibility.
a) Lack of monitoring: Due to the lack of active network monitoring, it is very tough to detect
suspicious activities, potential threats, and quick reaction to cyber-attacks.
b) Insecure remote connections: Nowadays modems and wireless technology used in every
cloud-based enterprise system and network. This new technology mainly used for remote
diagnostics, maintenance of the system security status. If in this process secure encryption or
authentication mechanisms are not present, then the integrity and security of the transmitted
information and data are vulnerable and at greater risk.
Document Page
c) Slow updates: In the present time smart systems become more advanced, at the same time
they also become more vulnerable to the new attacks. Due to the large system and the
network, it is very tough work to do Regular maintenance of firmware and software updates.
But it is very useful for providing maximum protection.
d) The control systems of the network: Many organizations have increased their organization
networks and control systems by using integration connectivity. Due to this security breaches
in an organization system arise from both ends.
e) Authentication holes: The authentication process is mainly used to keep away the wrong
person from accessing the IoT system. But nowadays, it can be also easily broken. The reason
behind this is very general mistakes like bad passwords, username sharing, and weak
authentication.
f) Technical information availability: Organization data and information about their control
systems and infrastructures are easily in the hand of potential hackers nowadays. The Design
and maintenance systems of every IoT system is easily available over the internet. So it creates
a great threat to overall security.
Hardware Issues :
1. Energy and Computational Constraint: Different cloud-based enterprise system has different
capabilities regarding energy consumption and their computing ability. If the CPU uses high
power then energy consumption of the device is increasing at a high rate.
2. Tamper Resistant IoT: Nowadays all of the cloud-based enterprise systems come with
tamper-resistant facility because IoT device which installed or used remotely have higher
chances of physical tampering. Due to this, it becomes more vulnerable and attacked get a
chance to use unauthorized data and modify them according to their requirements. So, the use
of tamper resistants in IoT device is very necessary to protect them from various types of
attacks.
3. Due to mobile in nature these IoT devices can easily join the network anytime from
anywhere. It is very hard to use the previous model which do not protect the devices from
current threats.
Different type of IoT devices uses the IP protocol for the host to host communications which
causes a problem in communication with multiprotocol instead of using traditional protocol
system.
Future Research in Cloud-Based Enterprise System
As we see that, In today time cloud-based enterprise system have so many vulnerabilities, threats,
and risks. They also have their own hardware and software weakness and vulnerabilities. Due to the
increasing rate of security threats cloud ES owners should change their networks and devices with
an upgraded one to secure their systems. These changes need to be specific in a different area so it
is easy to keep the systems maintained a base on specific standards. According to the vulnerabilities
and attacks on cloud-based enterprise system network, there are few prevention methods like
penetration testing, Attack mitigation, IoT honeynet systems, and preventative systems.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
To protect cloud-based enterprise system from online threats we use IoT honeynet systems. In this
method, we create fake id instead of reality in which work as a trick for the attackers or online
threats. According to the assumption, online threats attack the fake IoT device and get caught red-
handed by the security administrators. These attacks help in understanding the problems after that
we analyze and implement the security solutions on real IoT devices. In present time there are so
many preventative tools and software like Anti Viruses, IDS and IPS, it can be mainly used in IoT
devices and networks, so that they can easily protect the IoT networks from both sides of the
traffics.
Conclusion
The overall goal of the cloud-based enterprise system is very similar to that of others to provide a contribution to
scientific knowledge by offering alternate solutions which mainly rely on existing data. As the use of cloud-based
enterprise system increases day by day, it is quite not possible to develop future applications without
implementing and using various type of data algorithm.
In the above report, we discuss all the privacy issues in every stage of the cloud-based enterprise system and
explain its pro and con of existing IoT technology with big data applications. Successful IoT device analysis in a
cloud-based enterprise system mainly requires a systematic process which mainly recognizes the problem of
utilizing existing technology and explains the different characteristics of secondary analysis.
In all parts of the world, the electronic information sources for big data are becoming very efficient and more
effective. In the coming future, a big amount of data being collected, achieved by researchers across the globe are
becoming more easily accessible. As time passes, gradually all the personal data in IoT devices are going to stored
and collected on a centralized cloud server. But in centralized storage, a single failure leads to complete loss as a
whole. To prevent this most of the researchers suggested going for decentralized storage. For this, we need a
strong algorithm which able to work on big data distribution over the network in a different cloud-based enterprise
system. Cloud-based enterprise security systems is a very best and popular topic for future work.There are so
many organizations need to upgrade their cloud-based enterprise control systems and risk model to achieve the
best defense solutions for their systems. However, “what the future brings depends on two factors: available
technology and societal concern” (Bell, Dooling & Fouke, 1999).
Document Page
References
AberdeenGroup 2009, 'SaaS ERP: Trends and Observations', Analyst Inside,
<http://www.plex.com/download/AberdeenSaaSERPTrendsandObservations.pdf>.
Bayrak, E & Conley, JP 2011, 'The Economics of Cloud Computing'.
Beaubouef, B 2011, Cloud Can Bring Out the Best of ERP, 01022012,
<http://gbeaubouef.wordpress.com/2011/11/23/cloud-erp-advantage/>.
Buyya, R, Yeo, CS, Venugopal, S, Broberg, J & Brandic, I 2009a, 'Cloud computing and emerging
IT platforms: Vision, hype, and reality for delivering computing as the 5th utility', Future
Generation Computer Systems.
Buyya, R, Yeo, CS, Venugopal, S, Broberg, J & Brandic, I 2009b, 'Cloud computing and emerging
IT platforms: Vision, hype, and reality for delivering computing as the 5th utility', Future
Generation Computer Systems, vol. 25, no. 6, pp. 599-616.
Castellina, N 2011, 'SaaS and Cloud ERP Trends, Observations and Performance 2011', Analyst
Inside, <http://www.distributionerpdelivered.com/wp-content/uploads/Avanade-ERP-
AberdeenReport-SaaS-and-Cloud-ERP-Trends.pdf>.
Chen, F 2011, 'Privacy and integrity preserving computation in distributed systems', 3465404 thesis,
Michigan State University. djohnson 2010, 'Different Types of Cloud ERP, ' Erpcloudnews.com,
<http://erpcloudnews.com/2010/05/different-types-of-cloud-erp/>.djohnson 2011, 'Cloud ERP
Software Perceptions'.
Ellis, S 2010, 'Software-as-a-Service ERP Versus On-Premise ERP Through the Lens of Total Cost
of Ownership'.Epicor 'SaaS ERP: A Viable Model for Job Shops and Small Manufacturers ', Epicor
Manufacturing Express Edition, viewed
20/02/2012,<http://hosteddocs.ittoolbox.com/benefitsofsaaserp.pdf>.
Foster, I, Yong, Z, Raicu, I & Lu, S 2008, 'Cloud Computing and Grid Computing 360-Degree
Compared', paper presented to Grid Computing Environments Workshop, 2008. GCE '08, 12-16
Nov. 2008.
Hofmann, P 2008, 'ERP is Dead, Long Live ERP', IEEE.
Hofmann, P & Woods, D 2010, 'Cloud Computing: The Limits of Public Clouds for Business
Applications', IEEE Computer Society, vol. November/December 2010, pp. 90 – 3.
Karabek, DMR, Kleinert, J & Pohl, PDA 2011, 'Cloud Services for SMEs – Evolution or
Revolution?', Business + Innovation vol. 1
Document Page
Kern, J 2011, Giving SaaS ERP a Second Thought, viewed 21/02/2012,
<http://www.informationmanagement.com/news/ERP-SaaS-cloud-deployment-Aberdeen-
10021665-1.html >.
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]