Comparative Study: Security, Privacy, and Trust in Cloud Computing

Verified

Added on  2019/09/22

|5
|2306
|205
Report
AI Summary
Document Page
Security, privacy and trust in cloud computing: A comparative study
In recent years cloud computing plays a major role in the IT industry by introducing completely a

new concept as well as the enterprise system.
IoT cloud computing devices work on a concept
where all the devices are connected with the internet and capable to find each other by sharing their

address with each other over the internet. It mainly consists of sensor, wireless and RFID

technology which is generally vulnerable in modern technology. It mainly uses to control the IoT

devices and object to control and sensed from far distance across the internet. In current time the

internet is a big medium which connects people all over the world. Most of the people use to engage

in online gaming, trading and main day to day daily activities over the internet using a different type

of IoT devices. It is going to put the real world problem as a solution in the hands of the people.

Most of the interconnected devices and smart architecture is connected with a network and provide

various type of autonomous services which brings various types of personal, economic and

professional benefits leads to a rising in data-centric business. Most of the IoT devices and object

share the data and information with each other in huge amount with lots of vulnerabilities. To

prevent the data and information of different IoT devices there are so many different types of

technologies and methodology developed to achieve higher goals in terms of data privacy, security,

and integrity.

As per the report of CISCO in the year 2008, the total number of IoT devices connected to the

internet is greater than the people currently living on earth. For future internet and Secure global

network infrastructure, the internet of things play an integral part with self-configuration

capabilities which totally depend upon standard communications protocol in which both physical

and virtual things uses intelligent interface, physical attributes with virtual personality and

integrated across the internet without any hinderances. Here most of the things expect to connect

with all the process where they can interact, communicate with each other in favorable

environments. Here they can react automatically with physical world events and influence by

running a different type of process where they can start their services without human interference or

start with them also in proper environment.

The previous system is very old and a little bit expensive as well as complex in implementation and

use. To prevent this type of situation cloud-based enterprise system is recently introduced to provide

flexibility, scalability, and independence in the infrastructure of IT. Due to lack of much research

and literature, this area is still completely not explored but nowadays it attracted high interest from

the general user.

Enterprise system planning mainly provides huge benefits to the complete enterprise. It helps the

enterprise to share their data and information of enterprise across all the function of the network.

Implementation and running of ERP systems over the cloud provide great benefits and advantages

in spite of different types of challenges.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Service Support Aware Resource Allocation Policy for Enterprise Cloud-based
Systems

Cloud computing is the capability to acquire large resources easily and quickly according to the

need and the user charge for this on the basis of usage. It is a model for enabling user-friendly on-

demand service of network access to shared resources like servers, storage, which can be easily

available and have low management effort in maintenance. These are the main characteristics of

cloud computing: a) pooling of resource b) on demand network and other services c) elasticity and

calculated service. As complete we can say that cloud computing mainly based upon two things first

is cloud services and the second one is cloud platforms.

In the platform of the cloud, the provider of service creates a development environment according

to the operating system where user required application is executed or develop according to the

demand of the user. Nowadays the most famous cloud platforms are google app engine, Microsoft

Azure, and Amazon elastic cloud computing.

In all parts of the world, the electronic information sources for big data are becoming very efficient

and more effective. In the coming future, a big amount of data being collected, achieved by

researchers across the globe are becoming more easily accessible. As time passes, gradually all the

personal data in IoT devices are going to stored and collected on a centralized cloud server. But in

centralized storage, a single failure leads to complete loss as a whole.

To prevent this most of the researchers suggested going for decentralized storage. For this, we need

a strong algorithm which able to work on big data distribution over the network in a different cloud-

based enterprise system.

As we see that, In today time cloud-based enterprise system have so many different types of

vulnerabilities, threats, and risks. They also have their own hardware and software weakness and

vulnerabilities. Due to the increasing rate of security threats cloud ES owners should change their

networks and devices with an upgraded one to secure their systems. These changes need to be

specific in a different area so it is easy to keep the systems maintained a base on specific standards.

According to the vulnerabilities and attacks on cloud-based enterprise system network, there are

few prevention methods like penetration testing, Attack mitigation, IoT honeynet systems, and

preventative systems.

When we’re going to this cloud-native model and running all thing in containers, we have to make

sure that at any moment we can reboot without any downtime and without losing the traffic. It

provides tooling across the docker ecosystem which makes it the best way to install apps in the

cloud. It also permits simple applications to be installed in distributed architecture with higher

availability, automatic scaling and failover.

The cloud-based environment helps in reducing the high workload from the mobile. It basically

boosts the operations of the network, access of data and speeds up the computation process. Due to

this many of the work can be completed at a very fast rate on a large scale. Cloud computing

environment provides the best virtual environment on the same server at a very cheap cost. Here

we can say that the when virtual network run in a public cloud, it is very important to protect the

data and information of the user with end to end secure network. Very strong encryption and

authentication method are used for storing private information and during the exchange of data.
Document Page
A cloud-based production system for information and service integration
Cloud computing is the capability to acquire large resources easily and quickly according to the

need and the user charge for this on the basis of usage. It is a model for enabling user-friendly on-

demand service of network access to shared resources like servers, storage, which can be easily

available and have low management effort in maintenance. These are the main characteristics of

cloud computing: a) pooling of resource b) on demand network and other services c) elasticity and

calculated service. As complete we can say that cloud computing mainly based upon two things first

is cloud services and the second one is cloud platforms. In the platform of the cloud, the provider of

service creates a development environment according to the operating system where user required

application is executed or develop according to the demand of the user. Nowadays the most famous

cloud platforms are google app engine, Microsoft Azure, and Amazon elastic cloud computing.

In the case study of A cloud-based production system for information and service integration: an

internet of things case study on waste electronics (BY Xi Vincent Wang and Lihui Wang) we see

that WEEE is taken as an example of IoT which show how by using old problems we can approach

with new threats. Cloud services recycle and recovery capabilities make them more useful in cloud-

based enterprise systems. But as time passes the waste material amount is increases day by day. In

America recently 3 million ton WEEE is discarded without any proper treatment. As the amount of

big data increase the breach in privacy with people data and information are also increases. Big data

always require high computational and big storage power that make people use distributed systems

to manage their large amount of data. Distributed systems mainly consist of so many different

parties which increase the risk of privacy among the users.

As we discuss earlier that cloud computing mainly offers a centralized computing system, flexible

data storage and different type of scalable services. The proposed cloud-based enterprise system is

flexible and integrated environment due to which it will connect with a different type of processes.

But nowadays by using different approaches like the use of waste products, Waste Electrical and

Electronic Equipment (WEEE) in the manufacturing of cloud-based enterprise systems.

Multiple types of sources are responsible for the generation of data nowadays. Both machine and

human are responsible for the huge generation of data. Due to the huge amount of data generation,

which is complex and diverse in nature, it is tough to handle them with the previous design. Here

the big problem nowadays for a user to how they protect their data from the third party who want to

take their data at any cost and by using any methods. User can reduce privacy risk during the data

generation phase by using Data Falsifying and access restriction methods.

In all parts of the world, the electronic information sources for cloud-based enterprise system are

becoming very efficient and more effective. The overall goal of this system is very similar to that of

others to provide a contribution to scientific knowledge by offering alternate solutions which

mainly rely on existing data. In the coming future, a big amount of data being collected, achieved

by researchers across the globe are becoming more easily accessible.
Document Page
References
Mozammel-Bin-Motalab & Shohag, SAM 2011, 'Cloud Computing and the Business

Consequencesof ERP Use', International Journal of Computer Applications (0975 – 8887), vol. 28,

no. 8.

Munteanu, A & Fotache, D 2010, 'MEETING TECHNOLOGICAL CHALLENGES ON THE

ITMARKET: CLOUD COMPUTING ', viewed 7 April 2012, <
www.feaa.uaic.ro/geba/art2010/9-
30-201.doc
>.
Rittinghouse, JW & Ransome, JF 2010, Cloud Computing Implementation, Management

andSecurity, CRC Press.

Saeed, I, Juell-Skielse, G & Uppström, E 2011, 'Cloud Enterprise Resource Planning

Adoption:Motives & Barriers ', paper presented to confenis 2011.

Saini, SL, Saini, DK, Yousif, JH & Khandage, SV 2011, 'Cloud Computing and Enterprise

ResourcePlanning', paper presented to Proceedings of the World Congress on Engineering 2011

WCE 2011,

London, U.K., July 6 - 8, .Schubert, P & Adisa, F 2011, 'Cloud Computing for Standard ERP

Systems: Reference Frameworkand Research Agenda ', Fachbereich Informatik Nr, vol. 16.

Sharif, AM 2010, 'It’s written in the cloud: the hype and promise of cloud computing', Journal

ofEnterprise Information Management, vol. 33, no. 2, pp. 131-4.

Sharma, M, Mehra, A, Jola, H, Kumar, n, Misra, DM & Tiwari, V 2010, 'Scope of cloud

computingfor SMEs in India', JOURNAL OF COMPUTING,, vol. 2, no. 5.Sharma, P, Sood, SK &

Kaur, S 2011, 'Security Issues in Cloud Computing

Vaquero, LM, Rodero-Merino, L, Caceres, J & Lindner, M 2008, 'A break in the clouds: towards a

cloud definition', SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-5.

Velev, D & Zlateva, P 2011, 'Cloud Infrastructure Security Open Research Problems in Network

Security', in J Camenisch, V Kisimov & M Dubovitskaya (eds), Springer Berlin / Heidelberg, vol.

6555, pp. 140-8.

Wan, Y & Clegg, B 2010, 'Enterprise Management and ERP Development: Case Study of Zoomlion

Using the Dynamic Enterprise Reference Grid ENTERprise Information Systems', in JE Quintela

Varajão, MM Cruz-Cunha, GD Putnik & A Trigo (eds), Springer Berlin Heidelberg, vol. 109, pp.

191-8.

Wu, M 2011, 'Cloud Computing: Hype or Vision Applied Informatics and Communication', in J

Zhang (ed.), Springer Berlin Heidelberg, vol. 227, pp. 346-53.

Wu, W-W, Lan, LW & Lee, Y-T 2011, 'Exploring decisive factors affecting an organization’s SaaS

adoption: A case study ', International Journal of Information Management, vol. 31, pp. 556–63.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]