Cybersecurity and Identity Management in IoT
VerifiedAdded on 2020/03/13
|15
|4102
|54
AI Summary
This assignment delves into the crucial intersection of cybersecurity and identity management within the context of the Internet of Things (IoT). It examines various security threats that IoT systems face, such as unauthorized access, data breaches, and device manipulation. The assignment further explores strategies for mitigating these risks through robust authentication mechanisms, encryption protocols, and secure communication channels. Additionally, it discusses the importance of establishing clear identity management frameworks to ensure accountability and control over IoT devices and their data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD PRIVACY AND SECURITY
Cloud privacy and security
Name of the student
Name of the university
Authors note
Cloud privacy and security
Name of the student
Name of the university
Authors note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CLOUD PRIVACY AND SECURITY
Table of Contents
Task 1:........................................................................................................................................2
Implications for privacy of the Singapore Government’s Smart Sensor Network....2
From the perspective of a visitor to Singapore......................................................2
From the perspective of a Resident of Singapore..................................................3
Task 2.........................................................................................................................................4
Security and sensitive data issues for the sensitive data in the network....................4
From the perspective of visitor to Singapore.........................................................4
From the Perspective of resident of Singapore......................................................6
In case of the user device consist of sensitive information which is not to be
shared.................................................................................................................................6
Task 3.........................................................................................................................................8
Use of a digital identity to maintain and protect privacy...........................................8
Task 4.......................................................................................................................................10
Steps can be taken in order to ensure the security and privacy of digital identity...10
Advantages and disadvantages of the steps.........................................................12
References................................................................................................................................13
Table of Contents
Task 1:........................................................................................................................................2
Implications for privacy of the Singapore Government’s Smart Sensor Network....2
From the perspective of a visitor to Singapore......................................................2
From the perspective of a Resident of Singapore..................................................3
Task 2.........................................................................................................................................4
Security and sensitive data issues for the sensitive data in the network....................4
From the perspective of visitor to Singapore.........................................................4
From the Perspective of resident of Singapore......................................................6
In case of the user device consist of sensitive information which is not to be
shared.................................................................................................................................6
Task 3.........................................................................................................................................8
Use of a digital identity to maintain and protect privacy...........................................8
Task 4.......................................................................................................................................10
Steps can be taken in order to ensure the security and privacy of digital identity...10
Advantages and disadvantages of the steps.........................................................12
References................................................................................................................................13
2CLOUD PRIVACY AND SECURITY
Task 1:
Implications for privacy of the Singapore Government’s Smart Sensor Network
The use of the sensors and cameras on the public places in the Singapore city can
help the government of the organization to collect and use those collected in efficient
execution of the different regulatory operations. The collected data through this sensor
networks helps in measuring the traffic flow on the routes, in scanners that are helpful for the
police officers in the city in order to locate stolen vehicles, or tracking crimes in the specific
regions. In order to make a smart city the sensor networks are considered as the integral part
of the city. The reason behind this can be sated as, the sensor networks are helpful in the
collection of highly detailed information about different aspect of city life and its citizen
(Weglein, Rein & Cernese, 2013). This collected data from the large sensor networks is
usually connected to the citizens or the individuals and thus leading to develop detailed
profiles of the residents of the city.
From the perspective of a visitor to Singapore
Smart sensor network program of government can have sever implications on the
privacy of the visitors whose data will be collected by the sensor networks. This technique is
also under question mark the grounds that they are particularly not quite the same as
compared to the traditional data/information collection programs about the citizens or the
visitors in the city. Average data collection programs vary in three noteworthy ways from
smart sensor networks used in the data collection: 1) The data in this scenario is collected in
same time intervals that are maintained by the authorities 2) The government agencies inform
the people about the data collection programs and the consent of the person from which the
data is to be collected, and at the end 3) all the collected data/ information is either
anonymized before it is released publically (Shrier, Wu & Pentland, 2016). The traditional
Task 1:
Implications for privacy of the Singapore Government’s Smart Sensor Network
The use of the sensors and cameras on the public places in the Singapore city can
help the government of the organization to collect and use those collected in efficient
execution of the different regulatory operations. The collected data through this sensor
networks helps in measuring the traffic flow on the routes, in scanners that are helpful for the
police officers in the city in order to locate stolen vehicles, or tracking crimes in the specific
regions. In order to make a smart city the sensor networks are considered as the integral part
of the city. The reason behind this can be sated as, the sensor networks are helpful in the
collection of highly detailed information about different aspect of city life and its citizen
(Weglein, Rein & Cernese, 2013). This collected data from the large sensor networks is
usually connected to the citizens or the individuals and thus leading to develop detailed
profiles of the residents of the city.
From the perspective of a visitor to Singapore
Smart sensor network program of government can have sever implications on the
privacy of the visitors whose data will be collected by the sensor networks. This technique is
also under question mark the grounds that they are particularly not quite the same as
compared to the traditional data/information collection programs about the citizens or the
visitors in the city. Average data collection programs vary in three noteworthy ways from
smart sensor networks used in the data collection: 1) The data in this scenario is collected in
same time intervals that are maintained by the authorities 2) The government agencies inform
the people about the data collection programs and the consent of the person from which the
data is to be collected, and at the end 3) all the collected data/ information is either
anonymized before it is released publically (Shrier, Wu & Pentland, 2016). The traditional
3CLOUD PRIVACY AND SECURITY
data collections programs utilize consent policies in order to get the data from people. In
addition to that, back-end dataset anonymization is used to secure the privacy of an individual
whereas, the smart sensor network collects the user’s data without their consent. Moreover, if
any hacker is expert enough then they can connect the available data about an individual by
accessing or breaching the sensor network implemented by the government. Notwithstanding,
this technique breaks down despite sensor innovation, modern re-identification systems, and
prescient, examination (Weglein, Rein & Cernese, 2013). As the consent of the individual is
not computerized components, and the smart sensor network is introduced that collects data
without any request to acquire consent before collecting the information through the use of
the smart sensors. The visitors who are unaware of the facts that the data collected by the
sensors and about their use by the authorities that they are being followed as they travel
through the city sor the country.
From the perspective of a Resident of Singapore
From the perspective of the resident of Singapore city, it is important for them to
protect the collected data by using the sensor network in the different parts of the city.
Sensors are the main elements for gathering data, and any cybercriminal can access the
sensitive data about the citizens (personal or financial) by either accessing the stored
information by the sensor information or by using the eavesdropping technique in the
network. This data can be utilized by them indeed, even the apparently harmless information
about a citizen can be used to harm the citizen badly in the event that they know how to
associate various sensor inputs and collected data about them (Weglein, Rein & Cernese,
2013). For instance, someone who has accesses to the stored data by the sensors of an
individuals, then the attackers or adversaries can get and exploit their financial data in order
to harm or access their bank accounts and in this manner can economically harm the citizen
through the exploitation of the collected data while breaching their privacy.
data collections programs utilize consent policies in order to get the data from people. In
addition to that, back-end dataset anonymization is used to secure the privacy of an individual
whereas, the smart sensor network collects the user’s data without their consent. Moreover, if
any hacker is expert enough then they can connect the available data about an individual by
accessing or breaching the sensor network implemented by the government. Notwithstanding,
this technique breaks down despite sensor innovation, modern re-identification systems, and
prescient, examination (Weglein, Rein & Cernese, 2013). As the consent of the individual is
not computerized components, and the smart sensor network is introduced that collects data
without any request to acquire consent before collecting the information through the use of
the smart sensors. The visitors who are unaware of the facts that the data collected by the
sensors and about their use by the authorities that they are being followed as they travel
through the city sor the country.
From the perspective of a Resident of Singapore
From the perspective of the resident of Singapore city, it is important for them to
protect the collected data by using the sensor network in the different parts of the city.
Sensors are the main elements for gathering data, and any cybercriminal can access the
sensitive data about the citizens (personal or financial) by either accessing the stored
information by the sensor information or by using the eavesdropping technique in the
network. This data can be utilized by them indeed, even the apparently harmless information
about a citizen can be used to harm the citizen badly in the event that they know how to
associate various sensor inputs and collected data about them (Weglein, Rein & Cernese,
2013). For instance, someone who has accesses to the stored data by the sensors of an
individuals, then the attackers or adversaries can get and exploit their financial data in order
to harm or access their bank accounts and in this manner can economically harm the citizen
through the exploitation of the collected data while breaching their privacy.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4CLOUD PRIVACY AND SECURITY
In case of the smart sensor networks if someone can get access to the private date of
the citizens by observing the data transmissions between the different nodes (Shrier, Wu &
Pentland, 2016). As an example the, a couple of smart sensors set outside a house may be
capable to screen and observe the temperature and light readings of any house, that
consequently uncovering point by point data about the inhabitants of the house and their daily
activities in the house and there inhabitants (Ko & Choo ,2015). Sensor networks sends the
data in encrypted format that helps in solving some of the issues however it requires an
improved distribution scheme for the data transmission.
Task 2
Security and sensitive data issues for the sensitive data in the network
Personal data is as important as the corporate information, aside from that the
unapproved utilization of this sensitive personal data straightforwardly impacts the person or
the user of the devices which is connected through the internet via the sensors. This sensors
are used to collect the data from the device that incorporates contacts, character data,
wellbeing data, money related information, locations and data about relatives, the
accumulation of which can prompt pantomime or even data fraud. Too, get to data is
available, including secret key stores, and applications that auto login as the client, for
example, email, logbook and web-based social networking. Secret word databases can give
proposals to passwords utilized as a part of different settings (Weglein, Rein & Cernese,
2013). An additional difficulty is that personal data may incorporate data about shared
qualifications, so the trade-off of one information source may prompt effect on other relatives
or associates.
In case of the smart sensor networks if someone can get access to the private date of
the citizens by observing the data transmissions between the different nodes (Shrier, Wu &
Pentland, 2016). As an example the, a couple of smart sensors set outside a house may be
capable to screen and observe the temperature and light readings of any house, that
consequently uncovering point by point data about the inhabitants of the house and their daily
activities in the house and there inhabitants (Ko & Choo ,2015). Sensor networks sends the
data in encrypted format that helps in solving some of the issues however it requires an
improved distribution scheme for the data transmission.
Task 2
Security and sensitive data issues for the sensitive data in the network
Personal data is as important as the corporate information, aside from that the
unapproved utilization of this sensitive personal data straightforwardly impacts the person or
the user of the devices which is connected through the internet via the sensors. This sensors
are used to collect the data from the device that incorporates contacts, character data,
wellbeing data, money related information, locations and data about relatives, the
accumulation of which can prompt pantomime or even data fraud. Too, get to data is
available, including secret key stores, and applications that auto login as the client, for
example, email, logbook and web-based social networking. Secret word databases can give
proposals to passwords utilized as a part of different settings (Weglein, Rein & Cernese,
2013). An additional difficulty is that personal data may incorporate data about shared
qualifications, so the trade-off of one information source may prompt effect on other relatives
or associates.
5CLOUD PRIVACY AND SECURITY
From the perspective of visitor to Singapore
As the number of smart phone users are increasing day by day, thus it is important to
find a way in which the data traffic can be reduced from the existing telecommunication
network infrastructure, thus the development of a new heterogeneous network infrastructure
will enable the users to seamlessly connect to the internet network without the use of the
mobile data.
WiFi offloading appears the most suitable solution in this scenario. Building more
Wi-Fi hotspots is altogether less expensive than building out the new telecommunication
infrastructure. In this way a greater part of data transactions is diverted through Wi-Fi
systems, then the data traffic congestion on the networks will be reduced and the performance
will be enhanced (Shrier, Wu & Pentland, 2016). Given that there are as of now a boundless
sending of Wi-Fi systems, Wi-Fi offloading addresses the "time-tocapacity" issue for the
present need of extra network capacity.
Open Access through the Wi-Fi hotspots eliminates the effect of interference and
gives a superior performance from the perspective of throughput and QoS, in light of the fact
that every single accessible asset are shared between clients.
User privacy on the shared network is related to the safeguard the user’s information
like, name, address, interests and employment. This are further classes them into five sub-
categories: social privacy, identity privacy, personal privacy, financial privacy.
Identity privacy: It refers to an individual’s name, driver permit number and other
data that can distinguish who the individual is. Area security incorporates a client's area
follows, for example, where he is, the place he has been, and what put he as often as possible
goes to.
From the perspective of visitor to Singapore
As the number of smart phone users are increasing day by day, thus it is important to
find a way in which the data traffic can be reduced from the existing telecommunication
network infrastructure, thus the development of a new heterogeneous network infrastructure
will enable the users to seamlessly connect to the internet network without the use of the
mobile data.
WiFi offloading appears the most suitable solution in this scenario. Building more
Wi-Fi hotspots is altogether less expensive than building out the new telecommunication
infrastructure. In this way a greater part of data transactions is diverted through Wi-Fi
systems, then the data traffic congestion on the networks will be reduced and the performance
will be enhanced (Shrier, Wu & Pentland, 2016). Given that there are as of now a boundless
sending of Wi-Fi systems, Wi-Fi offloading addresses the "time-tocapacity" issue for the
present need of extra network capacity.
Open Access through the Wi-Fi hotspots eliminates the effect of interference and
gives a superior performance from the perspective of throughput and QoS, in light of the fact
that every single accessible asset are shared between clients.
User privacy on the shared network is related to the safeguard the user’s information
like, name, address, interests and employment. This are further classes them into five sub-
categories: social privacy, identity privacy, personal privacy, financial privacy.
Identity privacy: It refers to an individual’s name, driver permit number and other
data that can distinguish who the individual is. Area security incorporates a client's area
follows, for example, where he is, the place he has been, and what put he as often as possible
goes to.
6CLOUD PRIVACY AND SECURITY
Economic data security is related to the economic condition of an individual, for
example, his/her online transactions, his/her stocks and other economic data.
Social security incorporates a client's social data, for example, relationship and
closeness with his companions, relatives, associates, or club individuals.
Individual security is the sort of data that can reflect a user’s personal life traits. For
instance, the place where he grew up, marriage status, propensities and side interests,
political perspectives, sexual orientation, identity and other individual data.
From the Perspective of resident of Singapore
If the user is a visitor or a tourist in Singapore then, this heterogeneous network of
sensors and Wi-Fi hot spots will enable the users to have flexibility to get the cloud based
resources for internet connectivity in the city/country (Shrier, Wu & Pentland, 2016). Since
in this type of open and unsecured networks the users does not have any influence or control
over their transmission path as well as on the security mechanisms that are used for the
secured transmission of the user data thus there is always a risk of data breach or theft of
sensitive data via accessing the device. In case there is no or weak protection (encryption
technique) are used then the chances of user data being accessed, stolen or modified by any
third party or the hackers gets increased. Migrating the sensitive data, economic data
becomes publically accessible via the backdoors of the smart sensor network that is going to
be implemented by the government of Singapore (Weglein, Rein & Cernese, 2013). Thus,
due to the lack of assurance for the security of the data in the user devices the visitor to the
Singapore will hesitate to leverage the benefits of this heterogeneous network that helps them
to seamlessly switch between the mobile data and the Wi-Fi network for their smart devices.
Economic data security is related to the economic condition of an individual, for
example, his/her online transactions, his/her stocks and other economic data.
Social security incorporates a client's social data, for example, relationship and
closeness with his companions, relatives, associates, or club individuals.
Individual security is the sort of data that can reflect a user’s personal life traits. For
instance, the place where he grew up, marriage status, propensities and side interests,
political perspectives, sexual orientation, identity and other individual data.
From the Perspective of resident of Singapore
If the user is a visitor or a tourist in Singapore then, this heterogeneous network of
sensors and Wi-Fi hot spots will enable the users to have flexibility to get the cloud based
resources for internet connectivity in the city/country (Shrier, Wu & Pentland, 2016). Since
in this type of open and unsecured networks the users does not have any influence or control
over their transmission path as well as on the security mechanisms that are used for the
secured transmission of the user data thus there is always a risk of data breach or theft of
sensitive data via accessing the device. In case there is no or weak protection (encryption
technique) are used then the chances of user data being accessed, stolen or modified by any
third party or the hackers gets increased. Migrating the sensitive data, economic data
becomes publically accessible via the backdoors of the smart sensor network that is going to
be implemented by the government of Singapore (Weglein, Rein & Cernese, 2013). Thus,
due to the lack of assurance for the security of the data in the user devices the visitor to the
Singapore will hesitate to leverage the benefits of this heterogeneous network that helps them
to seamlessly switch between the mobile data and the Wi-Fi network for their smart devices.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7CLOUD PRIVACY AND SECURITY
In case of the user device consist of sensitive information which is not to be shared
The proposed Wi-Fi is easily accessible and convenient for the users on the go and
thus helps the people to be connected with the internet using the public hotspots throughout
the country as proposed by the Singapore government. The Wi-Fi networks uses radio
wavesf for connectivity to connect with the user devices.
Even though the firewalls and antivirus are generally used for user’s online safety but
unfortunately this tools are not able to protect sensitive user data while operating in a shared
network or from the hackers in a public hotspot (Weglein, Rein & Cernese, 2013). Antivirus
and Firewalls are helpful in preventing the attacks of the different Trozans, spyware, Ad-
wares as well as controlling the data flow or data communication from the device to the
access points.
Use of personal VPN: In this scenario in order to access and get the sensitive from
the users it is important to sniff in the data communication between the aces point and the
user device thus use of a personal VPN in order to encrypt all the data transmission from the
device will help in protecting the data communication and consequently leading to the
secured sensitive data on the device.
In case of the user device consist of sensitive information which is not to be shared
The proposed Wi-Fi is easily accessible and convenient for the users on the go and
thus helps the people to be connected with the internet using the public hotspots throughout
the country as proposed by the Singapore government. The Wi-Fi networks uses radio
wavesf for connectivity to connect with the user devices.
Even though the firewalls and antivirus are generally used for user’s online safety but
unfortunately this tools are not able to protect sensitive user data while operating in a shared
network or from the hackers in a public hotspot (Weglein, Rein & Cernese, 2013). Antivirus
and Firewalls are helpful in preventing the attacks of the different Trozans, spyware, Ad-
wares as well as controlling the data flow or data communication from the device to the
access points.
Use of personal VPN: In this scenario in order to access and get the sensitive from
the users it is important to sniff in the data communication between the aces point and the
user device thus use of a personal VPN in order to encrypt all the data transmission from the
device will help in protecting the data communication and consequently leading to the
secured sensitive data on the device.
8CLOUD PRIVACY AND SECURITY
Figure 1: Personal VPN
(Source: Holt & Malčić, 2015)
Storage encryption of the mobile devices: presently most of the mobile devices are
equipped with the ability to encrypt phone data storage that may play a significant role in
securing the stored sensitive data on the device (Ko & Choo, 2015). Some of these devices do
it by default seamlessly without asking for users consent and makes all the data inaccessible
by the intruders and hence secures all the sensitive data.
Task 3
Use of a digital identity to maintain and protect privacy
The digital identity for a user is the specific data that distinctively describes a user’ or
a person and contains information about its relationship with other entities in the cyberspace.
In other words the social identity that a user establishes in the cyberspace through digital
identities is referred to online identity for any user.
The digital identity can act naturally pronounced, the individual makes it and utilizes
it as they observes it fit, or, then again approved by different third parties , making the
identity more secure and broadening its level of confide in electronic data exchanges (Shrier,
Wu & Pentland, 2016). A trusted personality is given by an ordinarily perceived, trusted
outsider that creates, oversees and approves personalities through an arrangement of security
works on including both on the web and disconnected procedures.
Personal data of any user is at present stored over multiple Internet services. In the
given scenario of the smart sensor networks, the main issue is protection and management of
the shared information over the sensor network and the lack of security mechanisms
Figure 1: Personal VPN
(Source: Holt & Malčić, 2015)
Storage encryption of the mobile devices: presently most of the mobile devices are
equipped with the ability to encrypt phone data storage that may play a significant role in
securing the stored sensitive data on the device (Ko & Choo, 2015). Some of these devices do
it by default seamlessly without asking for users consent and makes all the data inaccessible
by the intruders and hence secures all the sensitive data.
Task 3
Use of a digital identity to maintain and protect privacy
The digital identity for a user is the specific data that distinctively describes a user’ or
a person and contains information about its relationship with other entities in the cyberspace.
In other words the social identity that a user establishes in the cyberspace through digital
identities is referred to online identity for any user.
The digital identity can act naturally pronounced, the individual makes it and utilizes
it as they observes it fit, or, then again approved by different third parties , making the
identity more secure and broadening its level of confide in electronic data exchanges (Shrier,
Wu & Pentland, 2016). A trusted personality is given by an ordinarily perceived, trusted
outsider that creates, oversees and approves personalities through an arrangement of security
works on including both on the web and disconnected procedures.
Personal data of any user is at present stored over multiple Internet services. In the
given scenario of the smart sensor networks, the main issue is protection and management of
the shared information over the sensor network and the lack of security mechanisms
9CLOUD PRIVACY AND SECURITY
encompassing it, i.e. the way information is circulated over this smart sensor network and
overseen by a few identity providers and put away on individual devices.
Using the smart sensor networks, the data about the visitors are gathered and this data
can be separated into two classes: 1) information that is provided by the person or collected
with their consent when they use any kind of services provided by the government; and 2)
information that is taken without their consent or from their devices and their browsing
history (Weglein, Rein & Cernese, 2013). The previous can incorporates address, name,
telephone number, email, and other basic information.
Use of the digital identity makes a user anonymous in the cyber space or the data
collected by the smart sensor network in the city. If the users strategically uses their different
browsers, email addresses, devices, credit cards for their different activities on the web using
the internet network provided by the government of the Singapore then it makes the access to
the data by the cyber criminals or the hackers more difficult to collect one cohesive data set
about any specific person in the city or the country.
So as to safeguard the user privacy who are operating their devices in the smart sensor
network and is connected to the government implemented Wi-Fi hot spots, it fundamentally
needs to guarantee that collected data is limited to the sensor network and is exposed just to
approved authorities so that the data about an individual can be connected and consequently
cannot be intercepted by the hackers or the cyber criminals (Shrier, Wu & Pentland, 2016).
Along with this, individuals must be waned and being engaged to control how their own data
is acquired, prepared, circulated, and utilized by any authority in the country. In any case, the
limited impression of protection as mystery and get to control cannot cover the different of
issues that fall under the security of the privacy using the digital identity.
encompassing it, i.e. the way information is circulated over this smart sensor network and
overseen by a few identity providers and put away on individual devices.
Using the smart sensor networks, the data about the visitors are gathered and this data
can be separated into two classes: 1) information that is provided by the person or collected
with their consent when they use any kind of services provided by the government; and 2)
information that is taken without their consent or from their devices and their browsing
history (Weglein, Rein & Cernese, 2013). The previous can incorporates address, name,
telephone number, email, and other basic information.
Use of the digital identity makes a user anonymous in the cyber space or the data
collected by the smart sensor network in the city. If the users strategically uses their different
browsers, email addresses, devices, credit cards for their different activities on the web using
the internet network provided by the government of the Singapore then it makes the access to
the data by the cyber criminals or the hackers more difficult to collect one cohesive data set
about any specific person in the city or the country.
So as to safeguard the user privacy who are operating their devices in the smart sensor
network and is connected to the government implemented Wi-Fi hot spots, it fundamentally
needs to guarantee that collected data is limited to the sensor network and is exposed just to
approved authorities so that the data about an individual can be connected and consequently
cannot be intercepted by the hackers or the cyber criminals (Shrier, Wu & Pentland, 2016).
Along with this, individuals must be waned and being engaged to control how their own data
is acquired, prepared, circulated, and utilized by any authority in the country. In any case, the
limited impression of protection as mystery and get to control cannot cover the different of
issues that fall under the security of the privacy using the digital identity.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10CLOUD PRIVACY AND SECURITY
Individuals would be able to utilize their digital identities, contingent upon the
specific situation and with whom they are they are interacting (Shrier, Wu & Pentland, 2016).
They ought to approach dependable, secure, privacy-by-design, dependable digital identities
for online data transaction, especially those including the sensitive personal information
(financial, personal and medical data) or other private data. At a principal level, these are the
attributes that will support a safe, dependable and secure environment for protecting the
privacy of the user.
The Digital identities need not be officially issued by the government authorities to be
a reliable one. However, governments ought to consider offering electronic distinguishing
proof for more-secure access to the data transactions that are transmitted through the smart
senor networks that require an abnormal state of validation (Weglein, Rein & Cernese, 2013).
This would contribute to value-based security for every one whether it is the citizen of the
country or visitor to the country.
Task 4
Steps can be taken in order to ensure the security and privacy of digital identity
Use of two factor authentication process: The residents or the visitors in the city
should utilize two-factor verification/authentication mechanism whenever conceivable.
Regardless of the use of the strong passwords, presently the hackers and the used algorithms
are efficient enough in breaking them to access the private data (Ko & Choo ,2015). Use of
the two-factor authentication mechanism not only expect and ask the user to enter their
password but also can be thought as the second form identity check on the online platform,
for example, a unique finger impression or content informed code for unique physical identity
making it significantly harder for programmers to get in and collect the data and breach the
privacy of the users data.
Individuals would be able to utilize their digital identities, contingent upon the
specific situation and with whom they are they are interacting (Shrier, Wu & Pentland, 2016).
They ought to approach dependable, secure, privacy-by-design, dependable digital identities
for online data transaction, especially those including the sensitive personal information
(financial, personal and medical data) or other private data. At a principal level, these are the
attributes that will support a safe, dependable and secure environment for protecting the
privacy of the user.
The Digital identities need not be officially issued by the government authorities to be
a reliable one. However, governments ought to consider offering electronic distinguishing
proof for more-secure access to the data transactions that are transmitted through the smart
senor networks that require an abnormal state of validation (Weglein, Rein & Cernese, 2013).
This would contribute to value-based security for every one whether it is the citizen of the
country or visitor to the country.
Task 4
Steps can be taken in order to ensure the security and privacy of digital identity
Use of two factor authentication process: The residents or the visitors in the city
should utilize two-factor verification/authentication mechanism whenever conceivable.
Regardless of the use of the strong passwords, presently the hackers and the used algorithms
are efficient enough in breaking them to access the private data (Ko & Choo ,2015). Use of
the two-factor authentication mechanism not only expect and ask the user to enter their
password but also can be thought as the second form identity check on the online platform,
for example, a unique finger impression or content informed code for unique physical identity
making it significantly harder for programmers to get in and collect the data and breach the
privacy of the users data.
11CLOUD PRIVACY AND SECURITY
Avoiding the open Wi-Fi and hotspots: Even though the open Wi-Fi and hotspots
implemented in the city can be incredible for reduction in the charges for the data usage and
advantageously helps in completing their work on the go (Weglein, Rein & Cernese, 2013).
This kind of access points are likewise very uncertain, and cyber criminals can undoubtedly
utilize their backdoors to perceive and collect any user’s personal data on the web and get
their records. It is observed that more than 40 percent of individuals neglect to take this
fundamental safety effort, for which there is high probability that their digital identity can be
compromised by the hackers or intruders through the smart sensor network implemented in
the city
Keeping the devices updated: In case the device software is not updated then it
becomes easier for the intruders to hack into the stored database of the device. Thus it is
important for the users (citizens or the visitors to update the programs used in their devices.
However downloading the most updated versions of the software’s will protect the users to
have the latest security mechanisms at place (Shrier, Wu & Pentland, 2016). When accessing
the web, it is important for the users to go for the sites that uses “https” protocol on the Web,
in order to affirm that that webpage is secure and the data through the smart sensor network
will be transmitted in encrypted format with lesser probability of intrusion.
Avoiding the open Wi-Fi and hotspots: Even though the open Wi-Fi and hotspots
implemented in the city can be incredible for reduction in the charges for the data usage and
advantageously helps in completing their work on the go (Weglein, Rein & Cernese, 2013).
This kind of access points are likewise very uncertain, and cyber criminals can undoubtedly
utilize their backdoors to perceive and collect any user’s personal data on the web and get
their records. It is observed that more than 40 percent of individuals neglect to take this
fundamental safety effort, for which there is high probability that their digital identity can be
compromised by the hackers or intruders through the smart sensor network implemented in
the city
Keeping the devices updated: In case the device software is not updated then it
becomes easier for the intruders to hack into the stored database of the device. Thus it is
important for the users (citizens or the visitors to update the programs used in their devices.
However downloading the most updated versions of the software’s will protect the users to
have the latest security mechanisms at place (Shrier, Wu & Pentland, 2016). When accessing
the web, it is important for the users to go for the sites that uses “https” protocol on the Web,
in order to affirm that that webpage is secure and the data through the smart sensor network
will be transmitted in encrypted format with lesser probability of intrusion.
12CLOUD PRIVACY AND SECURITY
Advantages and disadvantages of the steps
Two step authentication advantages
This authentication process helps in protecting sensitive data of the user data and
prevents the access of attackers or the cyber criminals.
This process can be amazingly easy and straightforward for the end users use, as it
does not require any high level technical knowledge or any obscure information.
Two step authentication disadvantages
Even though this process reduces the risk of intruders gaining access to sensitive data
stored on the user device, on the contrary this process is not completely resistant to card-
reader skimming and malware attacks on the devices.
Advantages and disadvantages of the steps
Two step authentication advantages
This authentication process helps in protecting sensitive data of the user data and
prevents the access of attackers or the cyber criminals.
This process can be amazingly easy and straightforward for the end users use, as it
does not require any high level technical knowledge or any obscure information.
Two step authentication disadvantages
Even though this process reduces the risk of intruders gaining access to sensitive data
stored on the user device, on the contrary this process is not completely resistant to card-
reader skimming and malware attacks on the devices.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13CLOUD PRIVACY AND SECURITY
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information Sciences, 305, 357-383.
Atick, J. (2016). Digital Identity: The Essential Guide1. ID4Africa Identity Forum.
Boutsis, I., & Kalogeraki, V. (2013, March). Privacy preservation for participatory sensing
data. In Pervasive Computing and Communications (PerCom), 2013 IEEE
International Conference on (pp. 103-113). IEEE.
Cho, V., & Jimerson, J. B. (2016). Managing digital identity on Twitter: The case of school
administrators. Educational Management Administration & Leadership,
1741143216659295.
Connolly, I. (2016). Self and identity in cyberspace. An introduction to cyberpsychology, 45-
57.
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE
Transactions on Wireless Communications, 8(3), 1086-1090.
De Judicibus, D., Leopardi, S., Modeo, L., & Pergola, N. (2013). U.S. Patent No. 8,583,499.
Washington, DC: U.S. Patent and Trademark Office.
Garcia, L. G., Hernandez, A. H., Garcia, J. E. L., & Organero, P. L. M. (2013). U.S. Patent
No. 8,448,257. Washington, DC: U.S. Patent and Trademark Office.
Gope, P., & Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system
using body sensor network. IEEE Sensors Journal, 16(5), 1368-1376.
Holt, J., & Malčić, S. (2015). The Privacy Ecosystem: Regulating Digital Identity in the
United States and European Union. Journal of Information Policy, 5, 155-178.
Ko, R., & Choo, R. (2015). The Cloud Security Ecosystem: Technical, Legal, Business and
Management Issues. Syngress.
Nakamura, L. (2013). Cybertypes: Race, ethnicity, and identity on the Internet. Routledge.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information Sciences, 305, 357-383.
Atick, J. (2016). Digital Identity: The Essential Guide1. ID4Africa Identity Forum.
Boutsis, I., & Kalogeraki, V. (2013, March). Privacy preservation for participatory sensing
data. In Pervasive Computing and Communications (PerCom), 2013 IEEE
International Conference on (pp. 103-113). IEEE.
Cho, V., & Jimerson, J. B. (2016). Managing digital identity on Twitter: The case of school
administrators. Educational Management Administration & Leadership,
1741143216659295.
Connolly, I. (2016). Self and identity in cyberspace. An introduction to cyberpsychology, 45-
57.
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE
Transactions on Wireless Communications, 8(3), 1086-1090.
De Judicibus, D., Leopardi, S., Modeo, L., & Pergola, N. (2013). U.S. Patent No. 8,583,499.
Washington, DC: U.S. Patent and Trademark Office.
Garcia, L. G., Hernandez, A. H., Garcia, J. E. L., & Organero, P. L. M. (2013). U.S. Patent
No. 8,448,257. Washington, DC: U.S. Patent and Trademark Office.
Gope, P., & Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system
using body sensor network. IEEE Sensors Journal, 16(5), 1368-1376.
Holt, J., & Malčić, S. (2015). The Privacy Ecosystem: Regulating Digital Identity in the
United States and European Union. Journal of Information Policy, 5, 155-178.
Ko, R., & Choo, R. (2015). The Cloud Security Ecosystem: Technical, Legal, Business and
Management Issues. Syngress.
Nakamura, L. (2013). Cybertypes: Race, ethnicity, and identity on the Internet. Routledge.
14CLOUD PRIVACY AND SECURITY
Shi, J., Meng, L., Striegel, A., Qiao, C., Koutsonikolas, D., & Challen, G. (2016, April). A
walk on the client side: Monitoring enterprise wifi networks using smartphone
channel scans. In Computer Communications, IEEE INFOCOM 2016-The 35th
Annual IEEE International Conference on (pp. 1-9). IEEE.
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data
security). Retrieved 27-11-16, from http://cdn. resources. getsmarter.
ac/wp-content/uploads/2016/06/MIT_Blockain_Whitepaper_PartThree. pdf.
Tzeng, S. F., Horng, S. J., Li, T., Wang, X., Huang, P. H., & Khan, M. K. (2017). Enhancing
Security and Privacy for Identity-Based Batch Verification Scheme in VANETs.
IEEE Transactions on Vehicular Technology, 66(4), 3235-3248.
Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005, March). Energy
analysis of public-key cryptography for wireless sensor networks. In Pervasive
Computing and Communications, 2005. PerCom 2005. Third IEEE International
Conference on (pp. 324-328). IEEE.
Weglein, J., Rein, D., & Cernese, F. (2013). U.S. Patent No. 8,528,068. Washington, DC:
U.S. Patent and Trademark Office.
Shi, J., Meng, L., Striegel, A., Qiao, C., Koutsonikolas, D., & Challen, G. (2016, April). A
walk on the client side: Monitoring enterprise wifi networks using smartphone
channel scans. In Computer Communications, IEEE INFOCOM 2016-The 35th
Annual IEEE International Conference on (pp. 1-9). IEEE.
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data
security). Retrieved 27-11-16, from http://cdn. resources. getsmarter.
ac/wp-content/uploads/2016/06/MIT_Blockain_Whitepaper_PartThree. pdf.
Tzeng, S. F., Horng, S. J., Li, T., Wang, X., Huang, P. H., & Khan, M. K. (2017). Enhancing
Security and Privacy for Identity-Based Batch Verification Scheme in VANETs.
IEEE Transactions on Vehicular Technology, 66(4), 3235-3248.
Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005, March). Energy
analysis of public-key cryptography for wireless sensor networks. In Pervasive
Computing and Communications, 2005. PerCom 2005. Third IEEE International
Conference on (pp. 324-328). IEEE.
Weglein, J., Rein, D., & Cernese, F. (2013). U.S. Patent No. 8,528,068. Washington, DC:
U.S. Patent and Trademark Office.
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.