Tuesday, May 5, 2020

Security and Privacy Issues in Cloud and Fog Domain- myassignmenthelp

Question: Discuss about theSecurity and Privacy Issues in Cloud and Fog Domain. Answer: Introduction The Internet of Things or IoT is the core concept in technology that helps to understand the major areas and advancements of the technological world. RFID as well as sensor technology are utilized in this sector (Wortmann Flchter, 2015). The main objectives of this Internet of Things is to make the successful connection with both living and inanimate things, utilize sensors for the purpose of collecting data, changing the type of items that are communicated over the network and many more. Cloud computing is the easiest method of transferring all types of data through the connection of Internet, without any complexity. Fog computing is the computing infrastructure for distributing the applications and data efficiently and effectively. Cloud and Fog Domain Background Cloud computing is the part of information technology through which the great access of shared pools of all types of configurable resources are being frequently provisioned (Osanaiye et al., 2017). This could only be used when the cloud is connected to the Internet. It is responsible for minimizing the infrastructure costs. Fogging or fog computing allows the users to properly distribute the data source as well as the cloud over a decentralized infrastructure logically. This infrastructure is utilized for the computation, storing or manipulation of the data or information (Vaquero Rodero-Merino, 2014). Fog computing is the extension of cloud computing in the network edges. Thus, it comprises of all the advantages of cloud computing. The fog domain is utilized by various users. Security and Privacy Issues or Challenges in Cloud and Fog Domain Both the cloud as well as the fog domains is vulnerable to various types of security and privacy issues or challenges. These security issues make the domains difficult to use and thus they are vulnerable for the users (Yang, 2014). The most significant security and privacy issues in cloud computing mainly include data breaching, hijacking of the accounts, any type of insider threats, malware injections, insecure APIs, DoS attacks or Denial of Service attacks, inadequate diligence and many others. These security issues eventually make the entire ideology of cloud computing dangerous for the users and thus they often give a second thought while using this technology (Osanaiye et al., 2017). Fog computing is also vulnerable to various security or privacy issues. When the technical applications of fog domain are being analyzed, it is noted that the domains does not comprise of any security measures (Vaquero Rodero-Merino, 2014). Thus, it is extremely vulnerable to the security and privacy issues. The absence of data segregation is one of the most important issues in fog computing. The lack of encryption is the second major problem regarding security. When the data is transferred, encryption helps to secure the data. However, since the data is not encrypted, there is always a high chance that the data would be lost. Lack of data authentication is the third security issue in fog computing. All these issues or challenges should be mitigated, so that there exists no problem amongst the security. Structure of the Report Introduction Cloud and Fog Domain Background Security and Privacy Issues or Challenges in Cloud and Fog Domain References Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K. K. R., Dlodlo, M. (2017). From cloud to fog computing: A review and a conceptual live VM migration framework.IEEE Access,5, 8284-8300. Vaquero, L. M., Rodero-Merino, L. (2014). Finding your way in the fog: Towards a comprehensive definition of fog computing.ACM SIGCOMM Computer Communication Review,44(5), 27-32. Wortmann, F., Flchter, K. (2015). Internet of things.Business Information Systems Engineering,57(3), 221-224. Yang, S. H. (2014). Internet of things. InWireless Sensor Networks(pp. 247-261). Springer, London.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.