ITC571 Emerging Technologies and Innovation Editing Services

ITC571 Emerging Technologies and Innovation Assignments

ITC571 Emerging Technologies and Innovation Editing Services

Introduction

Cloud Computing and cloud-based solutions at the latest implementation in the world of Technology that has been migrated from having a dedicated hardware solution two or more virtual network where service act as physical hardware. Starting from storage to data handling everything is based on synthesis of information on the cloud. The cloud based accounting system security services are slowly migrating from implementing into hardware solutions to cloud-based security services. Mostly this is done following software as a service or SaaS model (Lee et al., 2014). The virtualization of the cloud network has been increasing at an exponential rate with the increasing demand for cloud-based security. This is because the applications and the software that have been used in the latest world have become much more portable and have been distributed across a variety of networks over a wide area.

This means that the applications also need to function as software in the cloud instead of being dedicated hardware appliances that are utilized to protect the specific points of a network. In addition to that the fast growing market and higher rate of demand browsing for cloud based solutions amazing the market grow rapidly in this regard. Thus the following report would identify cloud as the most important intermediate of data storage and management with the most up-to-date promising technologies and the information and data sets that are required to be taken care of with enhancement of security (Chang, Kuo & Ramachandran, 2016). The security system in the recent times that has been used utilizing outdated technology with entirely depends upon the human monitoring opening the opportunity of door for more automatic versions in the cloud. However both the processes are implemented by a man and human error can be a cause of rising issues in the latest technology of cloud implementation as well (Henze et al., 2016). Therefore it needs to be analyzed if there are any disadvantages or advantages of the cloud computing security system as a whole.

This would be done by a dedicated establishment of few steps in the report by first presenting a research problem overview about the application of Technology and the clear research issues with the motivation of continuing the research. Then the aim of this research would be investigated along with further findings in the report. The background of the related works will be described as well as the proposed methodology by different authors to solve the security issues that arises result would be described. Later, the architecture of framework of the technology according to the comparisons between the algorithms are techniques for problem solving in security measures of cloud computing will be described in details.

Research Problem Overview

Application of Technology

Technological advancement has been taking place in an exponential rate where every old technology is being replaced by new or ones and the latest technologies and applications which are yet being developed are being adopted by the organization. For the imaging purposes, an innovative technology of cloud computing and cloud based security solution the popular methodologies that are being used as a concept are the internet of things or IoT, Artificial Intelligence and big data (Abolfazli et al., 2014). This technology has been providing the users with ample amount of beneficial changes that would make the user dependable up on cloud computing for providing the service for access.These technological applications are open to the elements of various security challenges and its different forms. The frameworks used for cloud computing and applications as well would be able to provide measures for the enhancement of security.

One of the most identified issues with Cloud Computing security is the SDN security order security of SDN networks. In the SDN environment, the security system needs to be omnipresent within a software defined network or SDN. This is due to the fact that the SDN security has to be built around the architecture and it is to be delivered as a service for the protection of the availability privacy and integrity of all the connected resources and information. In another case, WebSCADA is a technology used for smart medical technologies that are used to monitor medical data of different patients (Rittinghouse & Ransome, 2016). It has been found that the technology application has solved a lot of problems but also has faced a lot of problems regarding the security of the data sets in the applied technology. Cloud computing is nowadays used in various other technologies to aid the complexity related to data generated everyday in the organization.

The technological advancements that have been made in the various different zones of the industrial era, has also made the common mass be exposed to the world of advanced technology and as a result it has made the generation of data in every way rise at an exponential level where handling these generated data have been extremely problematic. The application of the latest technology has made it easier for the entire cyberworld to take account of the data generated within the industry every day but has not yet been able to get out of the security problems that the cloud computing technology causes (Ibrahim, Hamlyn-Harris & Grundy, 2016). There have been several problems in every industry, especially noticeable in the industry of healthcare, where generation of daily data is rising day by day at an exponential rate. The application of the EHR machines in healthcare industry had made it extremely simple to make use of the patient health data generated every day but it has also made it impossible to handle. The huge load of data generated by the EHR machines contains not only patient’s health data but also contains the personal details of a patient which could be enormously problematic if breached.

Therefore, it can be easily stated that the application of technology has not just been stuck in a specific industry but has channelized in every possible industry that has taken up the technological advancement and implemented them in their business system.

About Technology

For the imaging purposes, an innovative technology of cloud computing and cloud based security solution the popular methodologies that are being used as a concept are the internet of things or IoT, Artificial Intelligence and big data. This technology has been providing the users with ample amount of beneficial changes that would make the user dependable up on cloud computing for providing the service for access.These technological applications are open to the elements of different kinds of security challenges of every kind (Xu, Huang & Tsai, 2014). The frameworks used for the cloud computing applications holds the ability to enable the security measures for the enhancement of technology as well. There are various technologies as per the cloud computing implementation that has been utilized by various industries in order to make sure that the data generated in the organizations are handled properly. The organizations are aiming for being ahead of their competitors with this latest technological implementation but also they want to handle the enormous amount of data generated in the system. In addition to that, cloud implementation solves a lot of problems as a result.

Like in healthcare industry, cloud computing is being as a helping hand to help with the huge amount of data generated every day. WebSCADA is a technology used for smart medical technologies that are used to monitor medical data of different patients. It has been found that the technology application has solved a lot of problems but also has faced a lot of problems regarding the security of the data sets in the applied technology (Zhou et al., 2017). Cloud computing is nowadays used in various other technologies to aid the complexity related to data generated everyday in the organization.

In addition, there are also various other benefits of this technology. It serves as a proper solution to storage area which initially as per traditional system, have been confined within a physical area. The amount of storage space was limited and so there had been several misconceptions regarding the effective utilization of storage space. Nevertheless, there had been other problems regarding traditional physical storage since the amount of data generated nowadays had increased at an exponential rate (Sajid, Abbas & Saleem, 2016). Therefore, the technology has made an easier solution to this by providing the network servers as unlimited storage spaces in the cloud.

Clear Research Issues

During the research it can be seen that the technology of cloud computing had moved out of the utility of the cloud computing and the individual business application server-to-services the cloud computers provides. The latest materialization of the implementation of the technology of cloud computing has made a tremendous impact on both IT and non-IT industries in the past few years (Thota et al., 2018). Currently IT industry requires Cloud computing services to make available the best openings to the real world. Cloud computing is in preliminary stages, which means that there are still many issues that needs to be addressed.

Researching for the security systems in cloud computing has made it clear that indeed there are few issues that may arise while the progression of the report. These research issues can be described in details as follows:

Availability of services

Most organizations, which have been utilizing the SaaS products, have found to be utilizing high standards in the system. Therefore, the users are bound to expect extreme high standard of services from the systems. The cloud facilities are expected to be highly accessible, which can be extremely attractive an offer for the large consumers with business permanence prospect to transfer into the cloud services in extremely decisive situations (Tao et al., 2014). It is potentially acceptable to the companies providing for the independent software stacks for them, but it is essentially difficult for single organization to justify maintain and create more than one stack in the name of software dependability.

In addition to that, one of the most important availability problems is the DDoS or the Distributed Denial of Services attacks. This is a case where security issues harm the users and make the attackers able to use larger botnets for reducing the profit of the SaaS providers. These larger botnet attacks are extremely problematic to handle and difficult to maintain (Almorsy, Grundy & Müller, 2016). These attacks are however shifted by the clouds to Utility Computing Provider from the SaaS provider.

Data Security

Data security forms one of the most significant research topics of the cloud computing era. Every service provider does not have the authorization to admittance in the physical data systems or physical security systems in the data centers. To enable access in this regard, a service provider must depend on the provider of the infrastructure to obtain absolute security of data. The service provider can only identify the security setting within a remote area in a virtual private cloud environment (Chang & Ramachandran, 2016). In this process, the infrastructure provider must reach the following objectives, namely, confidentiality, for secure data transfer and access and audit-ability, where it is determined that whether an application’s security setting has been tampered with or not.

Cryptographic protocols generally provide the confidentiality to the users of the infrastructure. Any data that remains unencrypted within a social or local data center cannot be quantifiable as secured. Whereas, auditability can be accomplished as a result using remote testimony modus operandi and it could be added as an extra echelon away from of Operating System as the virtualized guest, in one logical layer maintaining softwares at the ready for confidentiality and auditability.

Motivation

The rates by which entire industrial area and individual masses are making use of or adopting the cloud computing technology have been increasing at an exponential rate. The industry forecasts that this would further increase and gives the impression about the organizations which have been utilizing cloud technology at such impressive rates. However, the impending threats regarding this new technology have been noticed to be as increased in rate as the utilization of the cloud computing in various industries (Ali, Khan & Vasilakos, 2015). Cloud adoption is up despite not always proving to be a less expensive alternative. In fact, many CIOs have already made investments in more traditional forms of IT and any additional investments in the cloud could appear counterintuitive. On top of this, cloud computing opens up more opportunity for additional IT.

This technology has many advantages and thus it becomes very important to find out the reasons due to which the problems have been arising in the industries regarding cloud. It is a very interesting fact that how a technology bearing with so many facilities in its utilization can bring about difficulties of such huge amount. The most interesting fact about this technology is the ways by which the data integrity becomes vulnerable to impending threats caused by malicious attackers.

Since, almost all of the business processes depends on the cloud, it would create a huge problem while the threats remain. Researching the security vulnerabilities would make sure about the causes behind the huge amount of threat vulnerabilities and what creates issues in the cloud security systems (Yang et al., 2017). Thus, it would easily find out the ways by which the security issues can be mitigated. Therefore, the motivation behind the research is the ways to find out the reasons for security vulnerability of cloud computing and the ways by which they can be mitigated.

Aimof This Research ???????

The technological advancements that have been made in the various different zones of the industrial era, has also made the common mass be exposed to the world of advanced technology and as a result it has made the generation of data in every way rise at an exponential level where handling these generated data have been extremely problematic. The application of the latest technology has made it easier for the entire cyberworld to take account of the data generated within the industry every day but has not yet been able to get out of the security problems that the cloud computing technology causes. There have been several problems in every industry, especially noticeable in the industry of healthcare, where generation of daily data is rising day by day at an exponential rate (Castiglione et al., 2015). The application of the EHR machines in healthcare industry had made it extremely simple to make use of the patient health data generated every day but it has also made it impossible to handle. The huge load of data generated by the EHR machines contains not only patient’s health data but also contains the personal details of a patient which could be enormously problematic if breached.

Since, almost all of the business processes depends on the cloud, it would create a huge problem while the threats remain. Researching the security vulnerabilities would make sure about the causes behind the huge amount of threat vulnerabilities and what creates issues in the cloud security management systems. Thus, it would easily find out the ways by which the security issues can be mitigated. Therefore, the aim of the research is the ways to find out the reasons for the security vulnerability of cloud computing and the ways by which they can be mitigated.

Following is a diagram represented to make out the research process:


Figure 1: Cloud Security Systems
(Source: Created by Author)

What will be investigated in this report

To this day, cloud solutions have been providing various ways by which an organization or a service provider can be benefitted in handling the generated data and channelizing it with within the entire industry. In the following report, it would be investigated about the security vulnerabilities of the security systems in cloud computing and the ways by which these can be mitigated. The reason due to which the generated data is vulnerable to mishandling and breaching is to be researched as a result. The main purpose behind the research is to investigate and analyse the role of cloud-computing to design, develop, and deploy security solutions. However, the research done as a result would also follow the codes of ethical conduct while researching about the topic (Wu et al., 2015). The theory of consequentialism, and deontology ethics would be taken into consideration while researching about the reasons behind the security vulnerabilities in cloud computing. The research methodology will follow an amalgamation of the qualitative and quantitative analysis of the used methodology done over a huge cluster of data sets. In addition to that, advanced automated tools would be utilized as the data analysis tools for the purpose.

Back Ground and Related Work

Cloud Computing and cloud based solutions at the latest implementation in the world of Technology that has been transferred from having an enthusiastic hardware solution two or more virtual network where service act as physical hardware. From storage to data handling, everything is based on amalgamation of information on the cloud. The cloud based security services are gradually migrating from implementing into hardware solutions to cloud based security services. Mostly this is done subsequent to software as a service or SaaS model (Khan et al., 2014). The virtualization of the cloud network has been increasing at an exponential rate with the increasing demand for cloud based security. This is because the applications and the software that have been used in the latest world have become much more portable and have been distributed across a variety of networks over a wide area.

The latest emergence of the implementation of the technology of cloud computing has made a tremendous impact on both IT and non-IT industries in the past few years. Currently IT industry needs Cloud computing services to provide best prospects to the real world. Cloud computing is in initial stages, which means that there are still many issues that needs to be addressed. Researching the security vulnerabilities would make sure about the causes behind the huge amount of threat vulnerabilities and what creates issues in the cloud security systems. Thus, it would easily find out the ways by which the security issues can be mitigated. There have been many researches going about different industries to mitigate the security vulnerabilities of cloud computing to the malicious attackers and thus a lot of researches are also going on to make sure about the security vulnerabilities and the ways by which they can be eliminated to focus on the benefits of cloud computing to their full potential.

Proposed Methodology by Authors to Solve Problem

There have been various methodologies proposed by various researchers about the methodologies utilized to solve the problems about security vulnerabilities in the cloud computing security systems. Therefore, in this regard, the appropriate methodology that can be used for solving the problem would be the TPA methodology using aggregated signature, where the users sending an auditing request to TPA, after receiving a request TPA send an auditing challenge to the cloud server (Hafeez et al., 2015). The CS generates proof based on verification signature and passing the auditing proof to TPA. TPA validates the proof and sends the auditing report to the user.

A set of questions will be prepared as a result for the business organizations using emerging technologies and exposed to security risks and challenges. The questionnaires will be so designed such that the required information regarding applicability of cloud computing in the area of security could be obtained. The method will provide an analysis of each domain to come up with domain related information.

Architecture or Framework for the Technology

Several techniques and theories are applied to the mitigation process for the security systems in cloud. Few authors have proposed that the solution support to the security threats can be mitigated with the utilization of the aggregate signature and TPA. This process is progressed with the users sending an auditing request to TPA, request TPA sends an auditing challenge to the cloud server after receiving a request. The CS generates proof based on verification signature and passing the auditing proof to TPA. TPA validates the proof and sends the auditing report to the user.

Comparisons of Algorithms / Techniques to Solve a Problem

The cloud based security services are slowly migrating from implementing into hardware solutions to cloud based security services. Mostly this is done following software as a service or SaaS model. The virtualization of the cloud network has been increasing at an exponential rate with the increasing demand for cloud based security. This is because the applications and the software that I been used in the latest world have become much more portable and have been distributed across a variety of networks over a wide area Cloud computing is a technology which is used worldwide through the internet (Baek et al., 2015). This examination is focused on privacy and security issues in cloud data storage and this has also addressed some privacy approaches for overcoming the issues in privacy on data stores in cloud computing that cannot be trusted. The methodologies covered in this report as encryption based methods and auditability schemes are used.

On the other hand, it would create a huge problem while the threats remain. Researching the security vulnerabilities would make sure about the causes behind the huge amount of threat vulnerabilities and what creates issues in the cloud security systems. Therefore, several techniques and theories are applied to the mitigation process for the security systems in cloud. Few authors have proposed that the solution support to the security threats can be mitigated with the utilization of the aggregate signature and TPA. This process is progressed with the users sending an auditing request to TPA.

However, there are also various problems regarding this technique which can be stated as listed below:

1. The existing cloud based security system may or may not support the functionality of traceability.
2. The time required for verification of the required time and size of the signature is subjected to linear increase as the number of user increases within a group.
3. Identity privacy is maintained for preserving making data freshness simultaneously.
4. The process of TPA has the ability to learn about the original data while the process of public auditing is going on.

Conclusion

Thus as per the report on the research made as a buff it can be concluded that the latest implementation of cloud based systems and cloud computing is indeed and exerted advantage in the world of Technology but it also comes with security issues that needs to be mitigated immediately to maintain integrity of an organization or an individual or a service provider. The most important reason behind the research was to inspect and scrutinize the role of cloud-computing to design, develop, and arrange security solutions. There are many security problems that have been noticed in the security systems whenever cloud computing comes into being. The report is also focused on the fact that how making a proper security system based on the vulnerabilities of cloud computing is necessary because nowadays most of the people remain in contact with each other through the implementation of the latest technologies. Every people has a smartphone which is utilized for connecting with people. But the amount of data stored in and out of the device and how much does it utilize is cloud computing is not understandable.

This is a factor where Cloud Computing Falls short as losing the integrity of data during storage retrieval or processing would mean huge loss of monetary asset for an organization or from the perspective of an individual it may also mean that Cloud Computing is not safe to hold the records of the personal details of every member in the family.

This has been done by a dedicated establishment of few steps in the report by first presenting a research problem overview about the application of technology and the clear research issues with the motivation of continuing the research. Then the aim of this research has been investigated along with further findings in the report. The background of the related works has also been described as well as the proposed methodology by different authors to solve the security issues that arises result has been described. Later, the architecture of framework of the technology according to the comparisons between the algorithms are techniques for problem solving in security measures of cloud computing has been described in details.

References

1. Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials16(1), 337-368.
2. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences305, 357-383.
3. Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
4.Baek, J., Vu, Q. H., Liu, J. K., Huang, X., & Xiang, Y. (2015). A secure cloud computing based framework for big data information management of smart grid. IEEE transactions on cloud computing3(2), 233-244.
5. Castiglione, A., Pizzolante, R., De Santis, A., Carpentieri, B., Castiglione, A., & Palmieri, F. (2015). Cloud-based adaptive compression and secure management services for 3D healthcare data. Future Generation Computer Systems43, 120-134.
6. Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Services Computing9(1), 138-151.
7. Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems57, 24-41.
8. Hafeez, I., Ding, A. Y., Suomalainen, L., Hätönen, S., Niemi, V., & Tarkoma, S. (2015, September). Cloud-based Security as a Service for Smart IoT Environments. In Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, & for the Students (pp. 20-20). ACM.
9. Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B., & Wehrle, K. (20
10. 
Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016). Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059.
11. Khan, F. A., Ali, A., Abbas, H., & Haldar, N. A. H. (2014). A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Computer Science34, 511-517.
12. Lee, Y. T., Hsiao, W. H., Huang, C. M., & Seng-cho, T. C. (2016). An integrated cloud-based smart home management system with community hierarchy. IEEE Transactions on Consumer Electronics62(1), 1-9.
13. Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
14. Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access4, 1375-1384
15. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics10(2), 1435-1442.
16. Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for IoT and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141-154). IGI Global.
17. Wu, D., Rosen, D. W., Wang, L., & Schaefer, D. (2015). Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation. Computer-Aided Design59, 1-14.
18. Xu, L., Huang, D., & Tsai, W. T. (2014). Cloud-based virtual laboratory for network security education. IEEE Transactions on Education57(3), 145-150.
19. Yang, J., He, S., Lin, Y., & Lv, Z. (2017). Multimedia cloud transmission and storage system based on internet of things. Multimedia Tools and Applications76(17), 17735-17750.
20. Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine55(1), 26-33