Comparative Study: Security, Privacy, and Trust in Cloud Computing
VerifiedAdded on 2019/09/22
|5
|2306
|205
Report
AI Summary
This report conducts a comparative study on the crucial aspects of security, privacy, and trust within the realm of cloud computing. It begins by highlighting the increasing significance of cloud computing in the IT industry, particularly in relation to the Internet of Things (IoT) and its vulnerabilities. The ...

Security, privacy and trust in cloud computing: A comparative study
In recent years cloud computing plays a major role in the IT industry by introducing completely a
new concept as well as the enterprise system. IoT cloud computing devices work on a concept
where all the devices are connected with the internet and capable to find each other by sharing their
address with each other over the internet. It mainly consists of sensor, wireless and RFID
technology which is generally vulnerable in modern technology. It mainly uses to control the IoT
devices and object to control and sensed from far distance across the internet. In current time the
internet is a big medium which connects people all over the world. Most of the people use to engage
in online gaming, trading and main day to day daily activities over the internet using a different type
of IoT devices. It is going to put the real world problem as a solution in the hands of the people.
Most of the interconnected devices and smart architecture is connected with a network and provide
various type of autonomous services which brings various types of personal, economic and
professional benefits leads to a rising in data-centric business. Most of the IoT devices and object
share the data and information with each other in huge amount with lots of vulnerabilities. To
prevent the data and information of different IoT devices there are so many different types of
technologies and methodology developed to achieve higher goals in terms of data privacy, security,
and integrity.
As per the report of CISCO in the year 2008, the total number of IoT devices connected to the
internet is greater than the people currently living on earth. For future internet and Secure global
network infrastructure, the internet of things play an integral part with self-configuration
capabilities which totally depend upon standard communications protocol in which both physical
and virtual things uses intelligent interface, physical attributes with virtual personality and
integrated across the internet without any hinderances. Here most of the things expect to connect
with all the process where they can interact, communicate with each other in favorable
environments. Here they can react automatically with physical world events and influence by
running a different type of process where they can start their services without human interference or
start with them also in proper environment.
The previous system is very old and a little bit expensive as well as complex in implementation and
use. To prevent this type of situation cloud-based enterprise system is recently introduced to provide
flexibility, scalability, and independence in the infrastructure of IT. Due to lack of much research
and literature, this area is still completely not explored but nowadays it attracted high interest from
the general user.
Enterprise system planning mainly provides huge benefits to the complete enterprise. It helps the
enterprise to share their data and information of enterprise across all the function of the network.
Implementation and running of ERP systems over the cloud provide great benefits and advantages
in spite of different types of challenges.
In recent years cloud computing plays a major role in the IT industry by introducing completely a
new concept as well as the enterprise system. IoT cloud computing devices work on a concept
where all the devices are connected with the internet and capable to find each other by sharing their
address with each other over the internet. It mainly consists of sensor, wireless and RFID
technology which is generally vulnerable in modern technology. It mainly uses to control the IoT
devices and object to control and sensed from far distance across the internet. In current time the
internet is a big medium which connects people all over the world. Most of the people use to engage
in online gaming, trading and main day to day daily activities over the internet using a different type
of IoT devices. It is going to put the real world problem as a solution in the hands of the people.
Most of the interconnected devices and smart architecture is connected with a network and provide
various type of autonomous services which brings various types of personal, economic and
professional benefits leads to a rising in data-centric business. Most of the IoT devices and object
share the data and information with each other in huge amount with lots of vulnerabilities. To
prevent the data and information of different IoT devices there are so many different types of
technologies and methodology developed to achieve higher goals in terms of data privacy, security,
and integrity.
As per the report of CISCO in the year 2008, the total number of IoT devices connected to the
internet is greater than the people currently living on earth. For future internet and Secure global
network infrastructure, the internet of things play an integral part with self-configuration
capabilities which totally depend upon standard communications protocol in which both physical
and virtual things uses intelligent interface, physical attributes with virtual personality and
integrated across the internet without any hinderances. Here most of the things expect to connect
with all the process where they can interact, communicate with each other in favorable
environments. Here they can react automatically with physical world events and influence by
running a different type of process where they can start their services without human interference or
start with them also in proper environment.
The previous system is very old and a little bit expensive as well as complex in implementation and
use. To prevent this type of situation cloud-based enterprise system is recently introduced to provide
flexibility, scalability, and independence in the infrastructure of IT. Due to lack of much research
and literature, this area is still completely not explored but nowadays it attracted high interest from
the general user.
Enterprise system planning mainly provides huge benefits to the complete enterprise. It helps the
enterprise to share their data and information of enterprise across all the function of the network.
Implementation and running of ERP systems over the cloud provide great benefits and advantages
in spite of different types of challenges.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Service Support Aware Resource Allocation Policy for Enterprise Cloud-based
Systems
Cloud computing is the capability to acquire large resources easily and quickly according to the
need and the user charge for this on the basis of usage. It is a model for enabling user-friendly on-
demand service of network access to shared resources like servers, storage, which can be easily
available and have low management effort in maintenance. These are the main characteristics of
cloud computing: a) pooling of resource b) on demand network and other services c) elasticity and
calculated service. As complete we can say that cloud computing mainly based upon two things first
is cloud services and the second one is cloud platforms.
In the platform of the cloud, the provider of service creates a development environment according
to the operating system where user required application is executed or develop according to the
demand of the user. Nowadays the most famous cloud platforms are google app engine, Microsoft
Azure, and Amazon elastic cloud computing.
In all parts of the world, the electronic information sources for big data are becoming very efficient
and more effective. In the coming future, a big amount of data being collected, achieved by
researchers across the globe are becoming more easily accessible. As time passes, gradually all the
personal data in IoT devices are going to stored and collected on a centralized cloud server. But in
centralized storage, a single failure leads to complete loss as a whole.
To prevent this most of the researchers suggested going for decentralized storage. For this, we need
a strong algorithm which able to work on big data distribution over the network in a different cloud-
based enterprise system.
As we see that, In today time cloud-based enterprise system have so many different types of
vulnerabilities, threats, and risks. They also have their own hardware and software weakness and
vulnerabilities. Due to the increasing rate of security threats cloud ES owners should change their
networks and devices with an upgraded one to secure their systems. These changes need to be
specific in a different area so it is easy to keep the systems maintained a base on specific standards.
According to the vulnerabilities and attacks on cloud-based enterprise system network, there are
few prevention methods like penetration testing, Attack mitigation, IoT honeynet systems, and
preventative systems.
When we’re going to this cloud-native model and running all thing in containers, we have to make
sure that at any moment we can reboot without any downtime and without losing the traffic. It
provides tooling across the docker ecosystem which makes it the best way to install apps in the
cloud. It also permits simple applications to be installed in distributed architecture with higher
availability, automatic scaling and failover.
The cloud-based environment helps in reducing the high workload from the mobile. It basically
boosts the operations of the network, access of data and speeds up the computation process. Due to
this many of the work can be completed at a very fast rate on a large scale. Cloud computing
environment provides the best virtual environment on the same server at a very cheap cost. Here
we can say that the when virtual network run in a public cloud, it is very important to protect the
data and information of the user with end to end secure network. Very strong encryption and
authentication method are used for storing private information and during the exchange of data.
Systems
Cloud computing is the capability to acquire large resources easily and quickly according to the
need and the user charge for this on the basis of usage. It is a model for enabling user-friendly on-
demand service of network access to shared resources like servers, storage, which can be easily
available and have low management effort in maintenance. These are the main characteristics of
cloud computing: a) pooling of resource b) on demand network and other services c) elasticity and
calculated service. As complete we can say that cloud computing mainly based upon two things first
is cloud services and the second one is cloud platforms.
In the platform of the cloud, the provider of service creates a development environment according
to the operating system where user required application is executed or develop according to the
demand of the user. Nowadays the most famous cloud platforms are google app engine, Microsoft
Azure, and Amazon elastic cloud computing.
In all parts of the world, the electronic information sources for big data are becoming very efficient
and more effective. In the coming future, a big amount of data being collected, achieved by
researchers across the globe are becoming more easily accessible. As time passes, gradually all the
personal data in IoT devices are going to stored and collected on a centralized cloud server. But in
centralized storage, a single failure leads to complete loss as a whole.
To prevent this most of the researchers suggested going for decentralized storage. For this, we need
a strong algorithm which able to work on big data distribution over the network in a different cloud-
based enterprise system.
As we see that, In today time cloud-based enterprise system have so many different types of
vulnerabilities, threats, and risks. They also have their own hardware and software weakness and
vulnerabilities. Due to the increasing rate of security threats cloud ES owners should change their
networks and devices with an upgraded one to secure their systems. These changes need to be
specific in a different area so it is easy to keep the systems maintained a base on specific standards.
According to the vulnerabilities and attacks on cloud-based enterprise system network, there are
few prevention methods like penetration testing, Attack mitigation, IoT honeynet systems, and
preventative systems.
When we’re going to this cloud-native model and running all thing in containers, we have to make
sure that at any moment we can reboot without any downtime and without losing the traffic. It
provides tooling across the docker ecosystem which makes it the best way to install apps in the
cloud. It also permits simple applications to be installed in distributed architecture with higher
availability, automatic scaling and failover.
The cloud-based environment helps in reducing the high workload from the mobile. It basically
boosts the operations of the network, access of data and speeds up the computation process. Due to
this many of the work can be completed at a very fast rate on a large scale. Cloud computing
environment provides the best virtual environment on the same server at a very cheap cost. Here
we can say that the when virtual network run in a public cloud, it is very important to protect the
data and information of the user with end to end secure network. Very strong encryption and
authentication method are used for storing private information and during the exchange of data.

A cloud-based production system for information and service integration
Cloud computing is the capability to acquire large resources easily and quickly according to the
need and the user charge for this on the basis of usage. It is a model for enabling user-friendly on-
demand service of network access to shared resources like servers, storage, which can be easily
available and have low management effort in maintenance. These are the main characteristics of
cloud computing: a) pooling of resource b) on demand network and other services c) elasticity and
calculated service. As complete we can say that cloud computing mainly based upon two things first
is cloud services and the second one is cloud platforms. In the platform of the cloud, the provider of
service creates a development environment according to the operating system where user required
application is executed or develop according to the demand of the user. Nowadays the most famous
cloud platforms are google app engine, Microsoft Azure, and Amazon elastic cloud computing.
In the case study of A cloud-based production system for information and service integration: an
internet of things case study on waste electronics (BY Xi Vincent Wang and Lihui Wang) we see
that WEEE is taken as an example of IoT which show how by using old problems we can approach
with new threats. Cloud services recycle and recovery capabilities make them more useful in cloud-
based enterprise systems. But as time passes the waste material amount is increases day by day. In
America recently 3 million ton WEEE is discarded without any proper treatment. As the amount of
big data increase the breach in privacy with people data and information are also increases. Big data
always require high computational and big storage power that make people use distributed systems
to manage their large amount of data. Distributed systems mainly consist of so many different
parties which increase the risk of privacy among the users.
As we discuss earlier that cloud computing mainly offers a centralized computing system, flexible
data storage and different type of scalable services. The proposed cloud-based enterprise system is
flexible and integrated environment due to which it will connect with a different type of processes.
But nowadays by using different approaches like the use of waste products, Waste Electrical and
Electronic Equipment (WEEE) in the manufacturing of cloud-based enterprise systems.
Multiple types of sources are responsible for the generation of data nowadays. Both machine and
human are responsible for the huge generation of data. Due to the huge amount of data generation,
which is complex and diverse in nature, it is tough to handle them with the previous design. Here
the big problem nowadays for a user to how they protect their data from the third party who want to
take their data at any cost and by using any methods. User can reduce privacy risk during the data
generation phase by using Data Falsifying and access restriction methods.
In all parts of the world, the electronic information sources for cloud-based enterprise system are
becoming very efficient and more effective. The overall goal of this system is very similar to that of
others to provide a contribution to scientific knowledge by offering alternate solutions which
mainly rely on existing data. In the coming future, a big amount of data being collected, achieved
by researchers across the globe are becoming more easily accessible.
Cloud computing is the capability to acquire large resources easily and quickly according to the
need and the user charge for this on the basis of usage. It is a model for enabling user-friendly on-
demand service of network access to shared resources like servers, storage, which can be easily
available and have low management effort in maintenance. These are the main characteristics of
cloud computing: a) pooling of resource b) on demand network and other services c) elasticity and
calculated service. As complete we can say that cloud computing mainly based upon two things first
is cloud services and the second one is cloud platforms. In the platform of the cloud, the provider of
service creates a development environment according to the operating system where user required
application is executed or develop according to the demand of the user. Nowadays the most famous
cloud platforms are google app engine, Microsoft Azure, and Amazon elastic cloud computing.
In the case study of A cloud-based production system for information and service integration: an
internet of things case study on waste electronics (BY Xi Vincent Wang and Lihui Wang) we see
that WEEE is taken as an example of IoT which show how by using old problems we can approach
with new threats. Cloud services recycle and recovery capabilities make them more useful in cloud-
based enterprise systems. But as time passes the waste material amount is increases day by day. In
America recently 3 million ton WEEE is discarded without any proper treatment. As the amount of
big data increase the breach in privacy with people data and information are also increases. Big data
always require high computational and big storage power that make people use distributed systems
to manage their large amount of data. Distributed systems mainly consist of so many different
parties which increase the risk of privacy among the users.
As we discuss earlier that cloud computing mainly offers a centralized computing system, flexible
data storage and different type of scalable services. The proposed cloud-based enterprise system is
flexible and integrated environment due to which it will connect with a different type of processes.
But nowadays by using different approaches like the use of waste products, Waste Electrical and
Electronic Equipment (WEEE) in the manufacturing of cloud-based enterprise systems.
Multiple types of sources are responsible for the generation of data nowadays. Both machine and
human are responsible for the huge generation of data. Due to the huge amount of data generation,
which is complex and diverse in nature, it is tough to handle them with the previous design. Here
the big problem nowadays for a user to how they protect their data from the third party who want to
take their data at any cost and by using any methods. User can reduce privacy risk during the data
generation phase by using Data Falsifying and access restriction methods.
In all parts of the world, the electronic information sources for cloud-based enterprise system are
becoming very efficient and more effective. The overall goal of this system is very similar to that of
others to provide a contribution to scientific knowledge by offering alternate solutions which
mainly rely on existing data. In the coming future, a big amount of data being collected, achieved
by researchers across the globe are becoming more easily accessible.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Mozammel-Bin-Motalab & Shohag, SAM 2011, 'Cloud Computing and the Business
Consequencesof ERP Use', International Journal of Computer Applications (0975 – 8887), vol. 28,
no. 8.
Munteanu, A & Fotache, D 2010, 'MEETING TECHNOLOGICAL CHALLENGES ON THE
ITMARKET: CLOUD COMPUTING ', viewed 7 April 2012, <www.feaa.uaic.ro/geba/art2010/9-
30-201.doc>.
Rittinghouse, JW & Ransome, JF 2010, Cloud Computing Implementation, Management
andSecurity, CRC Press.
Saeed, I, Juell-Skielse, G & Uppström, E 2011, 'Cloud Enterprise Resource Planning
Adoption:Motives & Barriers ', paper presented to confenis 2011.
Saini, SL, Saini, DK, Yousif, JH & Khandage, SV 2011, 'Cloud Computing and Enterprise
ResourcePlanning', paper presented to Proceedings of the World Congress on Engineering 2011
WCE 2011,
London, U.K., July 6 - 8, .Schubert, P & Adisa, F 2011, 'Cloud Computing for Standard ERP
Systems: Reference Frameworkand Research Agenda ', Fachbereich Informatik Nr, vol. 16.
Sharif, AM 2010, 'It’s written in the cloud: the hype and promise of cloud computing', Journal
ofEnterprise Information Management, vol. 33, no. 2, pp. 131-4.
Sharma, M, Mehra, A, Jola, H, Kumar, n, Misra, DM & Tiwari, V 2010, 'Scope of cloud
computingfor SMEs in India', JOURNAL OF COMPUTING,, vol. 2, no. 5.Sharma, P, Sood, SK &
Kaur, S 2011, 'Security Issues in Cloud Computing
Vaquero, LM, Rodero-Merino, L, Caceres, J & Lindner, M 2008, 'A break in the clouds: towards a
cloud definition', SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-5.
Velev, D & Zlateva, P 2011, 'Cloud Infrastructure Security Open Research Problems in Network
Security', in J Camenisch, V Kisimov & M Dubovitskaya (eds), Springer Berlin / Heidelberg, vol.
6555, pp. 140-8.
Wan, Y & Clegg, B 2010, 'Enterprise Management and ERP Development: Case Study of Zoomlion
Using the Dynamic Enterprise Reference Grid ENTERprise Information Systems', in JE Quintela
Varajão, MM Cruz-Cunha, GD Putnik & A Trigo (eds), Springer Berlin Heidelberg, vol. 109, pp.
191-8.
Wu, M 2011, 'Cloud Computing: Hype or Vision Applied Informatics and Communication', in J
Zhang (ed.), Springer Berlin Heidelberg, vol. 227, pp. 346-53.
Wu, W-W, Lan, LW & Lee, Y-T 2011, 'Exploring decisive factors affecting an organization’s SaaS
adoption: A case study ', International Journal of Information Management, vol. 31, pp. 556–63.
Mozammel-Bin-Motalab & Shohag, SAM 2011, 'Cloud Computing and the Business
Consequencesof ERP Use', International Journal of Computer Applications (0975 – 8887), vol. 28,
no. 8.
Munteanu, A & Fotache, D 2010, 'MEETING TECHNOLOGICAL CHALLENGES ON THE
ITMARKET: CLOUD COMPUTING ', viewed 7 April 2012, <www.feaa.uaic.ro/geba/art2010/9-
30-201.doc>.
Rittinghouse, JW & Ransome, JF 2010, Cloud Computing Implementation, Management
andSecurity, CRC Press.
Saeed, I, Juell-Skielse, G & Uppström, E 2011, 'Cloud Enterprise Resource Planning
Adoption:Motives & Barriers ', paper presented to confenis 2011.
Saini, SL, Saini, DK, Yousif, JH & Khandage, SV 2011, 'Cloud Computing and Enterprise
ResourcePlanning', paper presented to Proceedings of the World Congress on Engineering 2011
WCE 2011,
London, U.K., July 6 - 8, .Schubert, P & Adisa, F 2011, 'Cloud Computing for Standard ERP
Systems: Reference Frameworkand Research Agenda ', Fachbereich Informatik Nr, vol. 16.
Sharif, AM 2010, 'It’s written in the cloud: the hype and promise of cloud computing', Journal
ofEnterprise Information Management, vol. 33, no. 2, pp. 131-4.
Sharma, M, Mehra, A, Jola, H, Kumar, n, Misra, DM & Tiwari, V 2010, 'Scope of cloud
computingfor SMEs in India', JOURNAL OF COMPUTING,, vol. 2, no. 5.Sharma, P, Sood, SK &
Kaur, S 2011, 'Security Issues in Cloud Computing
Vaquero, LM, Rodero-Merino, L, Caceres, J & Lindner, M 2008, 'A break in the clouds: towards a
cloud definition', SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-5.
Velev, D & Zlateva, P 2011, 'Cloud Infrastructure Security Open Research Problems in Network
Security', in J Camenisch, V Kisimov & M Dubovitskaya (eds), Springer Berlin / Heidelberg, vol.
6555, pp. 140-8.
Wan, Y & Clegg, B 2010, 'Enterprise Management and ERP Development: Case Study of Zoomlion
Using the Dynamic Enterprise Reference Grid ENTERprise Information Systems', in JE Quintela
Varajão, MM Cruz-Cunha, GD Putnik & A Trigo (eds), Springer Berlin Heidelberg, vol. 109, pp.
191-8.
Wu, M 2011, 'Cloud Computing: Hype or Vision Applied Informatics and Communication', in J
Zhang (ed.), Springer Berlin Heidelberg, vol. 227, pp. 346-53.
Wu, W-W, Lan, LW & Lee, Y-T 2011, 'Exploring decisive factors affecting an organization’s SaaS
adoption: A case study ', International Journal of Information Management, vol. 31, pp. 556–63.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.