Cloud Security and Privacy: Implications of Smart Sensor Networks

Verified

Added on  2023/06/09

|14
|4116
|454
Report
AI Summary
This report delves into the critical aspects of cloud security and privacy, primarily examining the implications of smart city initiatives, using Singapore's Smart Nation Plan as a case study and extending the analysis to a hypothetical Australian Smart State Plan. The report explores the personal and ethical implications of smart sensor networks, such as those deployed at traffic lights, bus stops, and waste management facilities, on citizens' privacy. It investigates the potential behavioral changes among citizens and analyzes the security and privacy concerns associated with digital identity, including its use in maintaining privacy. The report also addresses the ethical considerations of smart Wi-Fi networks and the protection of personal data. It examines the use of digital identity for maintaining privacy, the security and privacy of digital identity during mobile device operation, and the challenges of cloud computing security, including cyber-attacks. Overall, the report provides insights into the balance between technological advancements, data security, and individual privacy within the context of smart city development.
Document Page
Running head: CLOUD SECURITY AND PRIVACY
Cloud Security and Privacy
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
CLOUD SECURITY AND PRIVACY
Table of Contents
Introduction......................................................................................................................................3
Personal and ethical implications for privacy of proposed Government’s Smart Sensor Network 3
Personal and ethical implication of smart Wi-Fi network...........................................................6
Use of digital identity for maintaining privacy............................................................................8
Security and privacy of digital identity during operation mobile device..................................10
Conclusion.....................................................................................................................................12
References......................................................................................................................................14
Document Page
3
CLOUD SECURITY AND PRIVACY
Introduction
Cloud computing has been an important aspect in the field of information technology.
The IT field has been enhancing in the market with development of the computing resources in
the market. However, with the development of the IT resources, there has been increase in the
security of data and information over the internet. Data security has been an important aspect in
the field of cloud computing. The use of cloud computing has been increased on a daily basis
that has been providing several benefits to the organizations. The cyber security has been main
aspect of any government or organizations in the market. The use of cloud computing has been
given rise to various threats and problems in the organization.
This report discusses about the cyber security issues faced by Singapore government.
Various cyber-attacks has been reported in the Hong Kong, Singapore. Various organization has
been affected by the cyber-attacks over the internet. The use of cloud computing has been an
important point of discussion in the Singapore Government’s Smart Nation Plan. Various factors
has been discussed in plan related to the cloud computing security issues.
Personal and ethical implications for privacy of proposed Government’s
Smart Sensor Network
Hong Kong has been a developing territory in the Southern China. Therefore, the cloud
computing has been developing its market in various organization. However, there has been
various cases of cyber security hacks in the territory. The use of various technical advances in
the territory has been maintaining a keen approach to the development of business. However,
same cases has been found in Singapore related to the cyber security issues. Therefore, the
government of Singapore has proposed Smart Nation Plan for development of the country. This
Document Page
4
CLOUD SECURITY AND PRIVACY
plan has focused on the local cloud users and organizations using cloud computing services. The
use of cloud computing in the organizations of both places has been increasing in recent years.
Cloud computing services has been protecting data and information of various users and
organizations in the market. The plan has been focusing in the development of the places in order
to maintain several policies in the state.
The plan has been accepted by people in the society of Singapore. Normal citizens has
been suffering with the cyber security issues in the state. The cyber security has been provided
proper priority in the list (Khan & Tuteja, 2015). The use of the plan has helped in maintaining
the diversity of the city. Therefore, there is change in the behavior of the normal citizens
regarding the use of cloud computing. The cloud computing has been more used in the country
with the implementation of the plan. This plan has been used in all the electronic devices
including mobile devices and computing devices. The use of mobile devices has been increased
in the place. The use of mobile device has helped in providing various benefits (Koorevaar,
Pourzandi & Zhang, 2016). However, it is expected that normal citizens will be positively
affected by the plan. The use of the mobile device might get increased in the region. The traffic
lights in the road has been digitalized and connected with the cloud computing. Therefore, there
has been development of fear among normal citizens. This plan has been able to maintain
different aspects of the city. The nation plan has been renovating overall places in the city.
There has been various smart sensors installed in various organizations and smart homes that
help in maintaining the security of the physical matter. However, data and information related
has been stored in cloud storages over the internet. There has been various challenges occurring
in maintaining a proper understanding of the data and information used in the sensors and
networks of the company. The use of data and information in the company used for the data
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
CLOUD SECURITY AND PRIVACY
analysis of several structure in the smart city. The use of the IoT has been maintaining IT in the
organizations. Sensors has been installed in various region in the city and connected with cloud
storages.
Information collection in the cloud should be possible with assistance of specific
standards and conventions. Wi-Fi has been maintained as the default medium that is utilized for
setting up an association. It by and large transporters half of the internet movement and very
nearly 10 times activity than cell. It can be thought to be critical factor which is utilized for
advancement all the more uniquely in specific locales including urban communities and business
which has been expanding in most recent years (Scarborough et al., 2015). The new period of
urban communities is making network which is effortlessly available. Traditional plan of
building is fundamentally reliant on different things including settled lines and copper links
(Hua, Oliphant and Hu, 2016). Presently the Wi-Fi innovation has supplanted different sorts of
remote advancement. Wi-Fi guaranteed innovation has developed which has brought about
settlement of a wide range of a wide range of capacity that extents from sight and sound
excitement to Wi-Fi calling (Pettit et al., 2015). Cloud computing has been helping in
maintaining a keen approach to the development of the plan in the country. The organization has
been maintaining the security of the data and information in the company.
Ethics and morals of cloud security has been hampered by the cyber-attacks in the state.
The use of different ethical consideration have been creating problems for the companies to
maintain their data and information in the cloud. Network which is produced by assistance of
rising Wi-Fi recurrence beneath 1 GHz has been legitimately created to the given range. It is
specific appropriate for application which concocts low information in think control and home
sensors (Samarati et al., 2016). This sort of gadgets is situated in harder spots to achieve
Document Page
6
CLOUD SECURITY AND PRIVACY
including kitchens or room. At the opposite side, 60 GHz band makes simple exchange of
information to some physical hindrance (Calder, 2016). In the middle of there are two recurrence
band that is 2.4 and 5 GHz transmission capacity which are thought to be normal for use in
mixed media and internet association.
Personal and ethical implication of smart Wi-Fi network
For influencing utilization of administration different administrations to require
individual data which is given by the assistance of ad and other outsiders administrations. The
stream of information over the fringes by and large enables different individuals to effectively
get to the worldwide esteem or range and nature of administrations which is given. The real sort
of issue can be from the issue of availability that is 4.5 billion consistently. Different associated
urban communities which will enhance broadband accessibility and association.
Aside from, urban communities and business are accompanying a test to a constrained
remote access (Chiu, 2018). It is finished by across board organization and association with
online area or gadget for giving insurance of client information and data Australian government
center around holding individuals information (Kumar, 2015). It is tied in with advising
individuals about the sort of information which is gathered from them alongside guaranteeing the
way that it is put away appropriately. In a matter of ISP supplier giving free administration, it
can prompt data of individuals when they sign on with their email address (Ho, 2017). The use of
plan has helped in maintaining diversity of the city. The use of the mobile device might get
increased in the region. The traffic lights in the road has been digitalized and connected with the
cloud computing (Almorsy, Grundy & Müller, 2016). There has been various smart sensors
installed in various organizations and smart homes that help in maintaining the security of the
physical matter. Under the Act, different information insurance standards ought to follow
Document Page
7
CLOUD SECURITY AND PRIVACY
different information controllers. Alongside it should make certain that the given data is
effectively given legitimately (Sethi & Sruti, 2018). It is utilized as a part of such a path, to the
point that the given information is satisfactory and pertinent in nature. Including cell phones, Wi-
Fi gadgets come up identifier which can be utilized for following reason can without much of a
stretch outcome in different sorts of security issues. For influencing utilization of administration
different administrations to require individual data which is given by the assistance of ad and
other outsiders administrations. Online business and different bodies by and large rely upon
internet based administrations for the development of information (Denkovski et al., 2015). The
stream of information over the fringes by and large enables different individuals to effectively
get to the worldwide esteem or range and nature of administrations which is given. While
utilizing open Wi-Fi four stages can be effortlessly taken for anchoring information.
Virtual Private Network (VPN) can be considered as the most ideal method for anchoring
movement. At the point when an association is set up between the cell phone and open Wi-Fi all
the internet movement is sent from the PC by making utilization of a scrambled passage which is
given toward end point (Maier and Verikoukis, 2014). There are a few sorts of programming
accessible which can be utilized as a part of a cell phone which begins consequently when an
association is set up with Wi-Fi hotspot.
The client might play out any sort of FTP (File exchange convention) over given Wi-Fi.
It can be effortlessly stayed away from by making utilization of different conventions which
move the information in an unsecured way.
Use of digital identity for maintaining privacy
Advanced personality has been otherwise called character 2.0 has grown a great deal over
the most recent couple of years. It makes utilization of rising innovation including Open ID,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
CLOUD SECURITY AND PRIVACY
Microsoft window space (Krasnyanskaya & Tylets 2015). It helps in keeping an information in
regards to the servers of Facebook to have a thought in regards to clients everywhere throughout
the general population. Computerized character administration is the imperative thing which
encourages us in characterizing ourselves in the advanced world (Zeng, Pathak and Mohapatra,
2016). Everybody around globe think of an advanced character and it influences general
population in the immediate or aberrant way. All activity is worked in an advanced world that is
particularly our personality in the worldwide profile. Customary advanced administration
framework helps in distinguishing the current computerized age (Kalaiprasath, Elankavi &
Udayakumar 2017). Appropriate planning and picking of security assurance personality
administration framework help in having a thought with respect to the establishing standards. In
current standards, two standards are utilized for two center data security concern are utilized
including discernibleness and likability (Demetriou et al., 2017). There has been think of
potential which can be utilized for connecting information with the person and the potential
distinction between the given informational index (Aljawarneh, Alawneh & Jaradat, 2017).
Legitimate controllability for the most part requires keeping up particular setting which can be
utilized for aggregation of delicate information. Character data is for the most part required for
monitoring data (Hexmoor, 2016). The legal standards in Fair Information standards has been
received by government of Australia. The standards are broadly utilized for accumulation and
individual utilization of data (Zou et al., 2018). Personality administration framework by and
large needs seven reasonable data hones standards which are informative in nature including:
Receptiveness: The present framework requires individual information which is known
freely alongside a portrayal framework for the primary reason. It including expounds on the
utilization of individual information which is given in the given framework.
Document Page
9
CLOUD SECURITY AND PRIVACY
Singular support: Right ought to be given a person to effortlessly see the different sorts of
data gathered about them (Feher, 2015).
Limitation of Collection: Certain cutoff points ought to be there for the correct gathering
of individual information. Individual information ought to be gathered in a dreadful and
appropriate strategy.
Information Quality: Personal information ought to be including giving reason for which
it is gathered and utilized ordinarily. It ought to include three parameters including exact,
auspicious and finish in nature.
Certainty: The best possible utilize and revelation of given individual information ought
to be restricted in nature. Individual information ought to be utilized with the end goal of given
time of gathering (Feher, 2016).
Security: Personal information ought need to ensured all legitimate sort of security shield
against loss of hazard, unapproved sort of allowance, decimation or alteration and any sort of
exposure.
Responsibility: The staff associated with keeping individual information ought to be
essentially responsible for effortlessly conforming to different practices.
Security and privacy of digital identity during operation mobile device
Credit and character checking: Credit card observing by and large requires a portion of
the administrations which can be utilized for sparing a break. Personality observing break by and
large requires legitimate checking of charge card in addition to checking of dull internet of data
(Grassi, Garcia and Fenton, 2017). Therefore, there is change in behavior of the normal citizens
regarding the use of cloud computing. However, it is expected that normal citizens will be
Document Page
10
CLOUD SECURITY AND PRIVACY
positively affected by the plan. A portion of the observing issues for the most part push a person
to over issue when an individual is presented to determine different sorts of issues or issues.
Charge card observing administration can be considered as a notable strategy which can be
utilized for assurance of information.
Password: The most ideal approach to comprehend for password issues can be the
utilization of secret key director including Dash path, Norton Identity Safe. With the assistance
of a password administrator, one can without much of a stretch make an ace secret word which is
utilized for getting to all password (Hooper, Giles-Corti and Knuiman, 2014). It will just auto-fill
frames including site enabling national for duplicating thing according to necessity. Online
business and different bodies by and large rely upon internet based administrations for the
development of information. Password creates and deals with an alternate 16-digit complex
secret key given for every prerequisite. It for the most part stores the mystery sort of data which
is required for making a full-highlighted computerized wallet.
Phishing and Social Engineering: Phishing misrepresentation for most part requires
association of hacker to give data (Young and Grant, 2015). A hacker can without much of a
stretch request individual data by telephone or email connected with connection. The best to get
guard from this sort of assault is to instruct a person on normal premise.
Back Up of critical information on consistent premise: Whenever a ransomware assault
happens; casualties can without much of a stretch get a thought that ensured themselves by
keeping a move down of information (Yigitcanlar et al., 2017). Presently if an assailant get
entrance to a framework then extra sort of information can be effectively reestablished from
reinforcement. Critical information ought to be reinforcement frequently by IT suppliers for
guaranteeing that all the essential data is put away safely in the server farms.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
CLOUD SECURITY AND PRIVACY
Conclusion
It can be concluded that this report has focused on the implementation of cloud
computing security protocols. Australian State Government design has as of late inspected
Singapore government design and has chosen for actualize their own particular Smart State
design. The shrewd state design principally involves organize keen sensors and camera at
different spots including a transport stop, refuse receptacles in CBD. It helps in simple checking
the conduct of resident alongside tending to the road wrongdoing. The cloud computing has
been more used in the country with the implementation of the plan. This plan has been used in all
the electronic devices including mobile devices and computing devices. The ethical content of
the security protocols have been discussed in the report. The ethical consideration have been led
to the government of Australia. The use of various legal escalation in the security of the cloud
has been discussed in the report. The use of several constitutional legislation related to the
computing resources has been explained in the report. After that Government get ready for
organization of Wi-Fi hotspots that predominantly guarantees a progression of systems is
conveyed all through the city. After that individual and moral ramifications of security for given
government design has been talked about in detail. In this area, a rundown of suggestion for
putting away crucial data on a cell phone has been talked about in points of interest. A legitimate
support has been with respect to the way that Smart state design will help in keeping up security
on a cell phone amid the visit of a person. A rundown of steps has been examined which can be
utilized for keeping up the security of advanced character has been talked about in subtle
elements including observing of Mastercard, password, phishing and social building and go
down of vital information have been talked about in points of interest.
Document Page
12
CLOUD SECURITY AND PRIVACY
References
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early stages
of SDLC. Future Generation Computer Systems, 74, 385-392.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Huang, W., Ganjali, A., Kim, B. H., Oh, S., & Lie, D. (2015). The state of public infrastructure-
as-a-service cloud security. ACM Computing Surveys (CSUR), 47(4), 68.
Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R.
(2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as
a service. Journal of Network and Computer Applications, 74, 98-120.
Kalaiprasath, R., Elankavi, R., & Udayakumar, D. R. (2017). Cloud. Security and Compliance-A
Semantic Approach in End to End Security. International Journal Of Mechanical
Engineering And Technology (Ijmet), 8(5).
Khan, S. S., & Tuteja, R. R. (2015). Security in cloud computing using cryptographic
algorithms. International Journal of Innovative Research in Computer and
Communication Engineering, 3(1), 148-155.
Koorevaar, T., Pourzandi, M., & Zhang, Y. (2016). U.S. Patent No. 9,304,801. Washington, DC:
U.S. Patent and Trademark Office.
Krasnyanskaya, T. M., & Tylets, V. G. (2015). Designing the cloud technologies of
psychological security of the person. Вопросы философии и психологии, (3), 192-199.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]