ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cloud Computing Security and Privacy

Verified

Added on  2020/05/28

|15
|2860
|251
AI Summary
This assignment delves into the critical topic of data security and privacy within the context of cloud computing. It examines various research papers that highlight the vulnerabilities and risks associated with storing and processing data in the cloud. The assignment encourages a deep understanding of the technical aspects, legal implications, and best practices for ensuring robust security measures in cloud environments.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: SYSTEM ANALYSIS
System Analysis
Name of the Student
Name of the University
Author’s Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
SYSTEM ANALYSIS
Table of Contents
Introduction......................................................................................................................................4
Discussion........................................................................................................................................4
Non-Functional Requirements.........................................................................................................4
Functionality................................................................................................................................5
Usability.......................................................................................................................................5
Reliability....................................................................................................................................5
Performances...............................................................................................................................6
Security........................................................................................................................................6
Comparison and Contrast between Functional Requirements and Non-Functional Requirements
of the System...................................................................................................................................6
Cloud-based solution.......................................................................................................................7
Strengths of Selected Cloud Solution..............................................................................................8
Weakness of the selected cloud Solution.........................................................................................8
System Development Life Cycle Approach (SDLC)..................................................................9
Description of predictive Approach.............................................................................................9
Description of Adaptive Approach............................................................................................10
Conclusion.....................................................................................................................................10
References......................................................................................................................................12
Document Page
2
SYSTEM ANALYSIS
Document Page
3
SYSTEM ANALYSIS
Introduction
The Telehealth project has been initiated for the development of the healthcare services
in the healthcare organization. The use of this project has been helpful for the individuals in the
rural areas who are not able to access quality health care services. Therefore, patients are not able
to access quality doctors and services. The professional experts in organizations are not able to
connect with these patients due to long distances. However, this has been considered to be the
major problem for the rural areas in communicating with the hospitals and other health care
organizations.
This report deals with the integration of cloud computing in the Telehealth project and its
benefits. Various security threats and risks are explained in the report. Major functional and non-
functional requirements of the Project Telehealth have been provided in the report.
This report outlines the various SDLC approach included in the Telehealth project.
Difference between Adaptive and Predictive SDLC approaches has been focused on the report,
The benefits and disadvantages of the cloud-based solution have been critically analyzed in the
report.
Discussion
Non-Functional Requirements
Non-functional requirements help in measuring any particular situation of the system.
There are several non-functional requirements included in the Telehealth project. This can be
described with the help of the FURPS. The FURPS stands for Functionality, Usability,
Reliability, Performance and Security (Li et al., 2015).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
SYSTEM ANALYSIS
Functionality
Functionality refers to basic functions for daily updates in the project. This is an
important element for the development of for development of the project with complete
functionality (Chen & Zhao, 2012). The user of the project will be able to understand and access
the data and information provided by the project. Doctor and professional experts can understand
the problems of the patients from this project. Therefore, data and information stored in the
project and server have played an important role in the development of the project (Kulkarni et
al., 2012).
Usability
Usability deals with the effortlessness and utilization of tool in order to develop the
system. The use of different components of a project helps in maintaining a proper usability of a
system among the customers. The main benefit of the project is efficiency and utilization if
various components of the project (Galibus & Vissia, 2015). The project of Telehealth has never
considered the problem in communication within any health expert.
Reliability
The reliability refers to the trustworthiness of the project among users. The Telehealth
project has been reliable among the users in the market (Mahalakshmi & Sundararajan, 2013).
The reliability factor of the system has been enhanced with the integration of the cloud-based
approach. The professionals have been hired for providing complete treatment to the patients. In
this case, the treatment of the patients is done by the use of audio-visual conferences (Li et al.,
2015). Therefore, data and information about the patients are stored in the cloud server that helps
in broadcasting and treatment of the patients. Therefore the treatment quality if the patients can
be improved by this requirement.
Document Page
5
SYSTEM ANALYSIS
Performances
Performance is the most significant criteria in the context of the project. The components
of project Telehealth needs to be significant for analyzing the performance of the Telehealth. The
treatment provided by the professional experts in the hospital have to be enhanced with the help
on the training (AlZain et al., 2012). The project has helped in maintaining the performance of
the expert professional in the hospitals and other health organizations (Balaji & Murugaiyan,
2012). Therefore, the use of this project help in maintaining and enhancing the quality of
healthcare services in the hospitals.
Security
It is the last non-functional requirements of the FURPS. It is one of the most important
components of the system. Security of data and information stored in the database is essential.
There are various cyber-crimes are prevailing over the internet. Therefore, risks related to the
data and information of patients is high (Li et al., 2013). Therefore, this project was concerned
with various online risks. However, biometrics is the best solution doe these issues. The user has
to provide the biometric signature to access the system. Therefore, this prevents from third party
unauthorized access to the system.
Comparison and Contrast between Functional Requirements and Non-Functional
Requirements of the System
The functional requirements of any project include various requirements that are related
to the functioning of the project (Balaji & Murugaiyan, 2012). However, the functional activities,
calculations, manipulated data and details of technology used in the system have been integrated
into these functional requirements. Processing of data is an important functional requirement that
Document Page
6
SYSTEM ANALYSIS
helps in maintaining the vulnerability of the system among the users (Chung et al., 2012).
Therefore, functional requirements are expressed in the form of use case diagrams and models.
Figure 1: FURPS
(Source: Chung et al., 2012)
The non-functional requirements of the project refer to the requirements that can be
utilized for judging any operations of a system. Therefore, these requirements can be considered
as the quality attributes of the system (Kulkarni et al., 2012). However, various examples of non-
functional requirements include functionality, performance, accessibility, usability and
portability. In this case, the Telehealth cannot consider functional requirements. Therefore, non-
functional requirements are suitable for the Telehealth system.
Cloud-based solution
Cloud computing has been an emerging technology for transfer and storage of data and
information over the internet. Cloud computing has helped many projects to perform their
functionality over the internet (Weinstein et al., 2014). In this case, the Telehealth system has
been started in order to provide quality services to the patients in the hospitals (Galibus & Vissia,

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7
SYSTEM ANALYSIS
2015). The approach of doctors and health professionals has been extended to the rural areas
with the help of this system. The issues included in the project has been integrated with the
cloud-based solutions. A major problem with the system was the storage and security of data and
information (Jain & Nandakumar, 2012). Cloud computing has helped in providing models for
mitigating these issues in the system. Private cloud is a type of cloud that allowing access to data
to the restricted group of users (Chung et al., 2012). On the other hand, public cloud provides
access to all users without any restrictions. Combination of both public and private cloud is
known as the hybrid cloud. Community cloud refers to a community having homogeneous
requirements in accessing the data.
In this case, the use of hybrid cloud model is appropriate for the Telehealth project. As
the hybrid, a cloud is a combination of both public and private cloud, both authorized and
unauthorized users can use data and information. However, personal and private data will be
stored in the private cloud. Therefore, the use of hybrid cloud model is justified for development
of the Telehealth project.
Strengths of Selected Cloud Solution
There are various benefits of the cloud computing including the safest mode of data
transfer over the internet. However, different computing model has different characteristics. In
this case, the strengths of hybrid cloud model have been discussed.
Security: Security is one of the basic attributes of this model. This model mainly focuses
on the security data and information stored in it. Personal and private data and information are
stored in the hybrid cloud for its safety measures (AlZain et al., 2012). Different business
Document Page
8
SYSTEM ANALYSIS
organization have utilized the hybrid cloud for storing their data and information. Therefore, in
this case, the telehealth system might store their data using the hybrid cloud model.
Cost-effectiveness: Hybrid cloud helps in minimizing the cost of the storage and security
of data and information. Therefore, small and medium-size enterprises can avail these services of
hybrid cloud computing for storing their data and information (Chung et al., 2012). In this case,
the budget of the telehealth system is not so high. Therefore, using hybrid cloud can provide
benefit in cost of the system.
Weakness of the selected cloud Solution
In spite of above strengths, there are various weaknesses of the hybrid cloud-computing
model. These weaknesses are described below:
Integration of Application: Hybrid cloud computing lacks in proper integration of
applications. This creates a problem if the application is using private cloud model and data is
stored in the data centre. Therefore, the integration and accessing of the data and information for
using the application becomes difficult for users. Secondly, the data loss can be recovered if
there is no recovery plan (Chen & Zhao, 2012).
Document Page
9
SYSTEM ANALYSIS
Figure 2: Hybrid Cloud Computing
(Source: Chen & Zhao, 2012)
Compatibility: There is a lack of compatibility in the hybrid cloud computing model. The
data and information stored in the hybrid cloud model are less compatible than the private and
public cloud.
System Development Life Cycle Approach (SDLC)
The System Development Life Cycle (SDLC) approach helps in dividing the entire cycle
of a project into significant stages. Adaptive and Predictive SDLC approach are the two types of
approaches for this project.
Description of predictive Approach
Predictive approach refers to the steps taken before completion of the project. There are
various benefits and limitations of this approach:
Pros:

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
SYSTEM ANALYSIS
Project Scope and Time are properly mentioned and acknowledged to every member of
the project.
Planning of the project is done perfectly.
Cons:
Feedback from clients and customers are not considered (Wacker et al., 2013).
Changes in the project are not possible in this approach.
Figure 3: Waterfall model
(Source: Wacker et al., 2013)
Description of Adaptive Approach
This approach is used for long-term projects. This approach is a reciprocal of the
predictive approach. The pro and cons of this approach have been mentioned below:
Pros:
Clients' feedback is properly considered.
Plan of the project can be modified in every step (Henderson et al., 2013).
Document Page
11
SYSTEM ANALYSIS
Cons:
This approach is costlier than the adaptive SDLC approach.
Project scope and time is not specified.
Figure 4: Agile Model
(Source: Henderson et al., 2013)
Therefore, in this case of telehealth project, the predictive approach is appropriate.
Conclusion
It can be concluded that the use of the cloud computing has helped in developing the
project in the market. Data and information are stored in the cloud storage that helps in providing
security of data and information. The health care experts and professionals are able to contact
with patients in rural areas and provide quality care services to them. The telehealth project has
started for providing quality health care services to patients even in the rural areas. The use of
this project has helped in maintaining a proper approach towards the care services provided to
the patients. The use of the FURPS has helped in analyzing different functional and non-
Document Page
12
SYSTEM ANALYSIS
functional requirement of the project. Hybrid cloud computing model has been used in this case.
The pros and cons of the hybrid cloud computing have been discussed in this report. The SDLC
approaches including predictive and adaptive approach have been explained in this project.
Based on the pros and cons of both approaches, predictive SDLC approach has been selected for
this project.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
13
SYSTEM ANALYSIS
References
AlZain, M. A., Pardede, E., Soh, B., & Thom, J. A. (2012, January). Cloud computing security:
from single to multi-clouds. In System Science (HICSS), 2012 45th Hawaii International
Conference on (pp. 5490-5499). IEEE.
Balaji, S., & Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study
on SDLC. International Journal of Information Technology and Business Management,
2(1), 26-30.
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud
computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
International Conference on (Vol. 1, pp. 647-651). IEEE.
Chung, L., Nixon, B. A., Yu, E., & Mylopoulos, J. (2012). Non-functional requirements in
software engineering (Vol. 5). Springer Science & Business Media.
Galibus, T., & Vissia, H. E. R. M. (2015). Cloud storage security. Proc NSCE, 2014, 123-127.
Henderson, C., Knapp, M., Fernández, J. L., Beecham, J., Hirani, S. P., Cartwright, M., ... &
Doll, H. (2013). Cost effectiveness of telehealth for patients with long term conditions
(Whole Systems Demonstrator telehealth questionnaire study): nested economic
evaluation in a pragmatic, cluster randomised controlled trial. Bmj, 346, f1035.
Jain, A. K., & Nandakumar, K. (2012). Biometric Authentication: System Security and User
Privacy. IEEE Computer, 45(11), 87-92.
Document Page
14
SYSTEM ANALYSIS
Kulkarni, G., Gambhir, J., Patil, T., & Dongare, A. (2012, June). A security aspects in cloud
computing. In Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd
International Conference on (pp. 547-550). IEEE.
Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure
authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5),
1206-1216.
Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., & Du, R. Y. (2013). Applications integration in
a hybrid cloud computing environment: Modelling and platform. Enterprise Information
Systems, 7(3), 237-271.
Mahalakshmi, M., & Sundararajan, M. (2013). Traditional SDLC Vs Scrum Methodology–A
Comparative Study. International Journal of Emerging Technology and Advanced
Engineering, 3(6), 192-196.
Phillips, V. L., Vesmarovich, S., Hauber, R., Wiggers, E., & Egner, A. (2016). Telehealth:
reaching out to newly injured spinal cord patients. Public health reports.
Wacker, D. P., Lee, J. F., Dalmau, Y. C. P., Kopelman, T. G., Lindgren, S. D., Kuhle, J., ... &
Waldron, D. B. (2013). Conducting functional communication training via telehealth to
reduce the problem behavior of young children with autism. Journal of developmental
and physical disabilities, 25(1), 35-48.
Weinstein, R. S., Lopez, A. M., Joseph, B. A., Erps, K. A., Holcomb, M., Barker, G. P., &
Krupinski, E. A. (2014). Telemedicine, telehealth, and mobile health applications that work:
opportunities and barriers. The American journal of medicine, 127(3), 183-187.
1 out of 15
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]