Ask a question from expert

Ask now

Security, privacy and trust in cloud computing: A comparative

5 Pages2306 Words205 Views
   

Added on  2019-09-22

Security, privacy and trust in cloud computing: A comparative

   Added on 2019-09-22

BookmarkShareRelated Documents
Security, privacy and trust in cloud computing: A comparative studyIn recent years cloud computing plays a major role in the IT industry by introducing completely a new concept as well as the enterprise system. IoT cloud computing devices work on a concept where all the devices are connected with the internet and capable to find each other by sharing their address with each other over the internet. It mainly consists of sensor, wireless and RFID technology which is generally vulnerable in modern technology. It mainly uses to control the IoT devices and object to control and sensed from far distance across the internet. In current time the internet is a big medium which connects people all over the world. Most of the people use to engagein online gaming, trading and main day to day daily activities over the internet using a different typeof IoT devices. It is going to put the real world problem as a solution in the hands of the people. Most of the interconnected devices and smart architecture is connected with a network and provide various type of autonomous services which brings various types of personal, economic and professional benefits leads to a rising in data-centric business. Most of the IoT devices and object share the data and information with each other in huge amount with lots of vulnerabilities. To prevent the data and information of different IoT devices there are so many different types of technologies and methodology developed to achieve higher goals in terms of data privacy, security, and integrity. As per the report of CISCO in the year 2008, the total number of IoT devices connected to the internet is greater than the people currently living on earth. For future internet and Secure global network infrastructure, the internet of things play an integral part with self-configuration capabilities which totally depend upon standard communications protocol in which both physical and virtual things uses intelligent interface, physical attributes with virtual personality and integrated across the internet without any hinderances. Here most of the things expect to connect with all the process where they can interact, communicate with each other in favorable environments. Here they can react automatically with physical world events and influence by running a different type of process where they can start their services without human interference orstart with them also in proper environment. The previous system is very old and a little bit expensive as well as complex in implementation and use. To prevent this type of situation cloud-based enterprise system is recently introduced to provideflexibility, scalability, and independence in the infrastructure of IT. Due to lack of much research and literature, this area is still completely not explored but nowadays it attracted high interest from the general user. Enterprise system planning mainly provides huge benefits to the complete enterprise. It helps the enterprise to share their data and information of enterprise across all the function of the network. Implementation and running of ERP systems over the cloud provide great benefits and advantages in spite of different types of challenges.
Security, privacy and trust in cloud computing: A comparative_1
Service Support Aware Resource Allocation Policy for Enterprise Cloud-based SystemsCloud computing is the capability to acquire large resources easily and quickly according to the need and the user charge for this on the basis of usage. It is a model for enabling user-friendly on-demand service of network access to shared resources like servers, storage, which can be easily available and have low management effort in maintenance. These are the main characteristics of cloud computing: a) pooling of resource b) on demand network and other services c) elasticity and calculated service. As complete we can say that cloud computing mainly based upon two things firstis cloud services and the second one is cloud platforms. In the platform of the cloud, the provider of service creates a development environment according to the operating system where user required application is executed or develop according to the demand of the user. Nowadays the most famous cloud platforms are google app engine, Microsoft Azure, and Amazon elastic cloud computing. In all parts of the world, the electronic information sources for big data are becoming very efficient and more effective. In the coming future, a big amount of data being collected, achieved by researchers across the globe are becoming more easily accessible. As time passes, gradually all the personal data in IoT devices are going to stored and collected on a centralized cloud server. But in centralized storage, a single failure leads to complete loss as a whole. To prevent this most of the researchers suggested going for decentralized storage. For this, we need a strong algorithm which able to work on big data distribution over the network in a different cloud-based enterprise system.As we see that, In today time cloud-based enterprise system have so many different types of vulnerabilities, threats, and risks. They also have their own hardware and software weakness and vulnerabilities. Due to the increasing rate of security threats cloud ES owners should change their networks and devices with an upgraded one to secure their systems. These changes need to be specific in a different area so it is easy to keep the systems maintained a base on specific standards. According to the vulnerabilities and attacks on cloud-based enterprise system network, there are few prevention methods like penetration testing, Attack mitigation, IoT honeynet systems, and preventative systems.When we’re going to this cloud-native model and running all thing in containers, we have to make sure that at any moment we can reboot without any downtime and without losing the traffic. It provides tooling across the docker ecosystem which makes it the best way to install apps in the cloud. It also permits simple applications to be installed in distributed architecture with higher availability, automatic scaling and failover. The cloud-based environment helps in reducing the high workload from the mobile. It basically boosts the operations of the network, access of data and speeds up the computation process. Due to this many of the work can be completed at a very fast rate on a large scale. Cloud computing environment provides the best virtual environment on the same server at a very cheap cost. Here we can say that the when virtual network run in a public cloud, it is very important to protect the data and information of the user with end to end secure network. Very strong encryption and authentication method are used for storing private information and during the exchange of data.
Security, privacy and trust in cloud computing: A comparative_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cyber Crime
|15
|4799
|77

Internet of Things: Privacy Issues and Contents
|9
|1402
|116

Security and Privacy Issues in IoT
|16
|5849
|49

Security and Privacy Issues in all domains of IoT
|8
|6752
|306

(pdf) Internet of things - IOT
|17
|6434
|71

Security and Privacy Issues in Cloud and Fog Domain
|5
|823
|66