logo

(PDF) A Survey of Big Data Cloud Computing Security

   

Added on  2021-02-21

17 Pages5139 Words55 Views
Big Data and CloudSecurity

Table of ContentsINTRODUCTION...........................................................................................................................1SECTION A.....................................................................................................................................11. Security Assurance Framework for evaluation for the assessment of the compliance andthreat in relation to the cloud based applications.........................................................................12. Critical evaluation of the security risks within IASS, PAAS and SAAS and also moresuitable and secure cloud services within the HC........................................................................33. Critical evaluation of the Big data Ecosystem Architecture components. Also identifying thesecure design architecture and various recommendations for security control within HC..........4SECTION – B..................................................................................................................................61. Discuss about the strength and weakness of secure cloud computing and big data features...62. Discuss about the professional practices that help the Hounslow construction to complywith legal, ethical and social issues with the big data and cloud environment............................9CONCLUSION..............................................................................................................................11REFERENCES..............................................................................................................................12

INTRODUCTIONBig data can be considered as a field which helps in extracting the informationsystematically. Big data is generally used to extract the meaningful data from the huge andcomplex database which analyse large data sets computationally in order to reveal a particularpattern. Cloud security is the protection of the data that is stored online. Cloud computing allowsdata to be stored within the network and this needs a proper security in order to restrict theunauthorised users to access such information. This report will be based on the big data analyticsand cloud security within the Hounslow construction company and this company deals withvarious operations which are handled by the number of TPS and controlled by the centraliseddatabase. Furthermore, the report will help in understanding Security assurance framework in orderto protect the data within the network. Along with this, it will also help in understanding variouscloud based technology that is IASS, PAAS and SAAS which allows the use of the cloudservices. Moreover, it will also investigates the features of the Big data ecosystem Architecturecomponents. Strengths and weaknesses of secured cloud computing and big data are also beenexplained.SECTION A1. Security Assurance Framework for evaluation for the assessment of the compliance and threatin relation to the cloud based applicationsThe security assurance Framework for Evaluation (SAFE) is a structured, light weightmethodology that helps in comparative assessment of the compliance and risk in relation with theapplication of the modern cloud based services. Information security assurance commonly beginswith two perspectives that is Risk and compliance (Cai and et.al., 2016). SAFE methodologybasically helps in providing the secure cloud based platform for the Hounslow constructioncompany. Collection of the specific policies and regulatory requirements allows the organizationto work through the series of information security checklists that helps in easily identifying thediscrepancies in practice. SAFE Framework is useful because it helps in identifying variousvulnerabilities that helps in exposing such assets in order to identify various adverse events.Although, it helps in assessing the overall risk and also helps in taking the security controls andrisk mitigation measures in order to overcome the overall risks of the company. In HounslowConstruction company, SAFE framework helps in configure the security settings. It also allows1

the firm to maintain the coordination and synchronization among multiple programs. It alsohelpful for the company in providing the strategic direction, investment funding and leangovernance. However, this is designed to be the lightweight in order to assess the security andcompliance rapidly without the need for the highly skilled experts.This SAFE framework mainly focuses towards the security, compliance and risk factors.This methodology is also used to compare multiple alternative cloud provider solution on aconsistent basis (Gai and et.al., 2016). It allows the organization to compare various alternativemethods which may comprises of the delivery models such as on-premises non-cloud basedimplementation, private cloud, hosted cloud, public cloud or any other combination of cloud.There are five stages included in the SAFE methodology and these distinct stages are describedbelow:Strategic intentThis stage allows the construction company to develop the clear strategies, plans andclear statements in order to deal with the security and compliance of the cloud basedapplications. This stage assures the clear objectives along with the benefits and description of the2Illustration 1: Dimensions of Assurance whenusing cloud services

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Evaluate Cloud Architecture
|11
|1697
|300

Migration to SaaS Cloud Computing Platform - Land Titles Agency
|18
|1135
|269

Webserver Migration Plan for DTGOV
|17
|947
|80

Cloud Computing: Selection of Cloud Architectures for a Hybrid Cloud and Risks Associated with Hybrid Cloud and Microservices Strategy
|21
|5740
|256

IT Risk Assessment | Case Study
|22
|5807
|240

Security And Privacy Issues In CLOUD COMPUTING. Assignment
|11
|2435
|252