Security and privacy issues Assignment PDF

Added on - 31 May 2021

  • 23

    Pages

  • 5627

    Words

  • 5

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 6 of 23 pages
Assignment
Executive Summary:Purpose:In this paper, we are looking forward to measure the security and privacy issueswhich exist with the cloud and fog domain to gain efficiency in the working of the real timeapplications.Scope:The scope of this paper is to focus on overview of cloud and fog domain, securityissues associated with them, and the security controls which are used for elimination andreducing their impact on the cloud and fog devicesMethod: The Qualitative approach of methodology is conducted on the analysing the securityissues which are associated with cloud and fog domain which are comprised of literaturereview, discussion, analysis of architecture, evaluation of use case, and summarizing.ResultsThe deployment of different methodologies and literature review helps in analyzingthe security concern and issues which are associated with the cloud and fog domainarchitecture. The study also helps in analyzing the countermeasures which are effective inreducing the impact of security issues on the cloud and fog premisesRecommendation:It is recommended that for minimizing and eliminating the impact ofsecurity issues on the cloud and fog domain can be effectively done by developing proactivesecurity architecture for managing the potential issues.ConclusionIt can be concluded that the extensively growth of big data through the inclusionof IOT environment give rise to the fog domain architecture. The increasing growth of bigdata is cope up with the data management issues which ultimately give rise to confidentialityand integrity security issues. The virtualization of the hardware and software are the biggestthreat in the cloud and fog environment because it is difficult for managing the bridge in therouting process of virtual private network. The counter measures should be developed forminimizing their impact on the cloud and fog domain.1
Contents1.Introduction.........................................................................................................................22.Literature Review...............................................................................................................2Cloud Domain Overview........................................................................................................3Cloud security issues..............................................................................................................3Security controls of cloud Architecture:.................................................................................5Fog Domain Overview...........................................................................................................6Security Issues with Fog Domain:..........................................................................................7Security Controls used by Fog Domain:................................................................................83.Methodology.......................................................................................................................9Literature Review:..................................................................................................................9Evaluation of the use case:.....................................................................................................9Discussion on analyzing the security issues associated with the cloud and fog domain.....11Summarizing the potential security issues associated with the fog and cloud domain........12Analysis of the cloud and fog Architecture..........................................................................134.Compare and contrast.......................................................................................................155.Best suitable Methodologies.............................................................................................166.Justification.......................................................................................................................167.Solution and Findings.......................................................................................................178.Conclusion........................................................................................................................179.References.........................................................................................................................182
List of TablesTable 1: Security Issues in the cloud Domain............................................................................4Table 2: Security controls in cloud architecture........................................................................6Table 3: Security issues in Fog Domain....................................................................................8Table 4: Evaluation criteria used in fog and cloud environment in the Use case....................11Table 5:Table summarizes the type of potential attacks, potential threats, countermeasures,and impact................................................................................................................................13Table 6: Comparison and contrasting of the research methodologies.....................................16List of Figures:Figure 1use case for fog and cloud environment in the deployment of the firefighting systemarchitecture...............................................................................................................................11Figure 2:inclusion of fog domain in the cloud environment for reducing the security issues12Figure 3Architecture of the fog domain..................................................................................15Figure 4: Architecture of the cloud domain.............................................................................153
Title: Security and privacy issues in cloud and fog domain1.IntroductionThe growth of digitization and technological advancement increases the connectivity to theIOT devices for managing machine to machine communication. The connection of the IOTdevices to the cloud environment decreases the efficiency of the system in managinginteroperability among the communicating devices. The traditional cloud environment isinefficient in managing flow of information between smart devices. The migration to the newFog environment helps the IOT connection and smart development of the services inmanaging and storing interconnectivity between IOT devices, bandwidth, resources, andothers (Stojmenovic, and at.el., 2015). The fog computing is a new paradigm which iscapable of replacing the flaws of cloud computing technology. It helps in reducing thelatency period of time. Fog-cloud platform is used for the expansion of the network to formunified virtualization to accommodate resource pooling and streamlining of data. The cloud-fog computing environment helps in initializing the confidentiality and integrity of data. Thecloud computing technology is not suitable for some of the IOT applications. The customersare not able to get the quality of service from the application. The fog computing helps inproviding edge to edge network for delivery of applications. The fog computing is thedecentralized infrastructure for applications and resources. The processing time in fogcomputing is less than cloud computing environment of the applications(Yang, 2014). Forcomputing helps in reducing the latency period and improving the service quality in the realtime applications delivery system(Verbano, and Venturini, 2013). In this paper, we arelooking forward to measure the security and privacy issues which exist with the cloud andfog domain to gain efficiency in the working of the real time applications.2.Literature ReviewThe literature review is conducted for analyzing the impact of security and privacy issueswhich exists with the fog and cloud domain. Fog computing help in extending the cloud andthe network services for increasing the efficiency of the IOT devices. The cloud and the fogenvironment are effective and efficient in managing pooling of the resources, data, andinformation.4
Cloud Domain OverviewThe cloud domain is the emerging and most promising system for sharing of resources andinformation in the ICT technological world. It helps in enabling interoperability and resourcepooling of the devices and information over the network. The security and the privacy issuesare the major hurdles in the management of cloud computing technology (Wortmann, &Flüchter, 2015). The focus should be given on identifying security issues and its relatedcountermeasures for resolving the complexities associated with the cloud domain. The cloudcomputing infrastructure is comprised of five characteristics which are categorized as layer ofinfrastructure abstraction, democratization of the resources, architecture based on serviceorientation, and consumption and allocation of the utility model. Security is the majorconcern in the cloud environment. Cloud security is the amalgamation of policies, rules, andprocedures for managing the confidentiality and integrity of the networks and information.Cloud security issuesThe cloud services are provided in the three different models named as platform as a service,infrastructure as a service, and software as a service model. Each model is comprised of somesecurity issues which are described in the table below:Table1: Security Issues in the cloud DomainCloud ModelTypes of security issuesDescriptionSoftware as aservice model(SAAS)Security issues relatedto the protection of dataThe SAAS cloud model can be deprived ofattacks accomplished on the API’s and interfaceattacks. The management of data privacy in thecloud communication and resource sharing is thecrucial security concern because it can damage orcorrupted the integrity of the informationInterface attacksThe SAAS cloud model can be deprived ofattacks accomplished on the API’s and interfaceattacks. The root cause analysis should beperformed for providing effective authenticationand authorization control on the premises.Secure Shell AttacksThe connections between the participating unitsin the cloud environment are based on trust.There is a threat in managing the secure shell5
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document