Wednesday, May 6, 2020

Security and Privacy Challenges in Computing Environments

Question: Discuss about the Security and Privacy Challenges in Computing Environments. Answer: Introduction: The scope of this project covers the identification of an engineering topic with a gap in the literature, identification of the gap and then taking a small literature review to showcase the need for a further research to solve the acknowledged gap. The aim of the study is to undertake a research that will help the cloud service providers to effectively integrate the provide clouds that has not been addressed by the cloud providers for a long time as the focus has been on the middleware (Assuno et al. 2015). The objective of the study is to present a mechanism through which the cloud providers can integrate the private clouds rather than merely focusing their attention on middleware. Literature Review The underlying gap identified for further study is that integration of the private clouds have not been or being addressed by the providers of the cloud. This is the silent gap in the literature identified from the review since there is a rising attention being put by the enterprise on cloud middleware but this has been lacking on high on the agendum of cloud providers. Associated with a robust interest in private cloud indicating an increasingly serious engagement with cloud by enterprise where precisely interoperability between clouds alongside traditionally served applications of significance (Shawish and Salama 2014). The development in enterprise cloud usage shall be shaped by a cloud providers capability to provider the PaaS kind infrastructure services in the form of a private, secure cloud that has a middleware as well as integration capabilities for the applications under the heterogeneous enterprise surrounding. The ability to deliver the private cloud straightly into enterprise backbone in the integrated fashion shall be fundamental to cloud providers capitalizing on the increasing desire of enterprise to use the cloud. Having the capability to leverage Ethernet exchanges as well as latching into MPLS networks as well as VPNs shall be a significant component in bringing services of cloud to enterprise. The choice shall be significant to enterprise so that individuals can effectively manage technology risks as well as make reasoned decisions upon which network, cloud as well as XaaS provider they utilize for a particular purpose. The new product offerings shall acknowledge concerns over the network performance. A zone where the gap is acknowledged by both the cloud provider as well as the enterprise respondents is the shared concern over the general network perform of the offering of cloud. The pressure point has been recognized by both the demand and supply size, it hence it is predicted that an increased tiering of cloud providers commodities to encompass guaranteed resource allocations at the layer of the network. This will go beyond the known CPU, Memory as well as Disk flexibility of shared current cloud offerings. With the latency rising top of the agenda, service providers shall require to search their fundamental delivery architectures to make sure that cloud customers are able to map latency sensitive application into the platforms of cloud (Da Cunha Rodrigues et al., 2016). What is common in practice in the high performance financial services applications will increasingly applied to enterprise as well as mission critical line of business applications. Enterprise shall increasingly become the core of the cloud economy (Botta et al. 2014). The outcomes of the survey indicate that a heavy learning of the providers of cloud to posit other as their primary clients that can be read as cloud providers serving the consumer as well as small-medium sized firms with enterprise customers landing in 2nd place (Toosi, Calheiros and Buyya 2014). The above revelation is an indication of high value growth potential in the enterprise-class cloud services, in comparison to the more product offerings to smaller business, web providers as well as software development firms. Enterprise shall eventually drive choice as well as standardization in cloud services (Bist, Wariya and Agarwal, 2013). There are potential opportunities for the system integrators for assessing the deployment of the latency sensitive applications. As it has been predicted that enterprise cloud services to experience growth via an attention by the software, infrastructure as well as integrators, the analysis indicate that the latency stays a top enterprise issue suggesting that an extreme particular niche is available for the system integrators (Gubbi et al. 2013). Differing application show differing requirements relating to network performance, and hence needs careful mapping to the architecture deployment. With the cloud offerings varying geographic reaches, network backbones as well as content delivery topologies, particular care needs to be undertaken when deploying the applications systems for the international franchise (Keahey et al. 2008). The medical imaging applications demand, for instance, remains wholly different from that of the private investor trading podium, or the enterprise resource planning system for the global franchise. As robust techniques are developed to map the applications requirements into the cloud deployments, systems integrators shall capitalize on growth of the enterprise services in cloud (Sultan 2010). As revealed in the above analysis, it is increasingly apparent that the cloud providers should undertake thorough studies to address the issue this lacking integration of the private clouds into the activities of the providers of the cloud (Gomes et al. 2014). Despite the problem being identified, there has never been a particular study that focuses on how well the above integration needs to be addressed (Grozev and Buyya 2014). As has been identified in the literature reviewed, the past and the current studies have only focused their attention on the enterprise on cloud middleware. This means that the problem will remain unsolved for a prolonged time despite the undesirable consequences attached to the above identified gap (Sotomayor et al. 2009). Conclusion It is upon this revelation that the current study seeks to investigate and present the best mechanisms upon which the cloud providers can adopt in order to effectively undertake the proper integration of private clouds that has not being addressed by cloud providers for a long time (Takabi, Joshi and Ahn 2010). Getting a solution to this problem will a very desirable move as it will help prevent the problems associated with this lack of integration of private clouds by the service providers (Botta et al. 2016). References Takabi, H., Joshi, J. B., and Ahn, G. J., 2010. Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Sotomayor, B., Montero, R. S., Llorente, I. M., and Foster, I., 2009. Virtual infrastructure management in private and hybrid clouds. IEEE Internet computing, 13(5). Gomes, R., Costa, F., Da Rocha, R., and Georgantas, N., 2014. A middleware-based approach for QoS-aware deployment of service choreography in the cloud. In Proceedings of the 11th Middleware Doctoral Symposium (p. 2). ACM. Sultan, N., 2010. Cloud computing for education: A new dawn?. International Journal of Information Management, 30(2), 109-116. Keahey, K., Figueiredo, R., Fortes, J., Freeman, T., and Tsugawa, M., 2008. Science clouds: Early experiences in cloud computing for scientific applications. Cloud computing and applications, 2008, 825-830. Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660. Sultan, N., 2014. Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management, 34(2), 177-184. Botta, A., De Donato, W., Persico, V., and Pescap, A., 2016. Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700. Botta, A., De Donato, W., Persico, V., and Pescap, A., 2014. On the integration of cloud computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on (pp. 23-30). IEEE. Da Cunha Rodrigues, G., Calheiros, R. N., Guimaraes, V. T., Santos, G. L. D., de Carvalho, M. B., Granville, L. Z., ... and Buyya, R., 2016. Monitoring of cloud computing environments: concepts, solutions, trends, and future directions. In Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 378-383). ACM. Toosi, A. N., Calheiros, R. N., and Buyya, R., 2014. Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Computing Surveys (CSUR), 47(1), 7. Shawish, A., and Salama, M., 2014. Cloud computing: paradigms and technologies. In Inter-cooperative collective intelligence: Techniques and applications (pp. 39-67). Springer Berlin Heidelberg. Bist, M., Wariya, M., and Agarwal, A., 2013. Comparing delta, open stack and Xen Cloud Platforms: A survey on open source IaaS. In Advance Computing Conference (IACC), 2013 IEEE 3rd International (pp. 96-100). IEEE. Grozev, N., and Buyya, R., 2014. Inter?Cloud architectures and application brokering: taxonomy and survey. Software: Practice and Experience, 44(3), 369-390. Assuno, M. D., Calheiros, R. N., Bianchi, S., Netto, M. A., and Buyya, R., 2015. Big Data computing and clouds: Trends and future directions. Journal of Parallel and Distributed Computing, 79, 3-15.

No comments:

Post a Comment