Monday, May 4, 2020

Internet of Things Security and Privacy Issues in Cloud - Samples

Question: Discuss about the Internet of Things: Security and Privacy Issues in Cloud and Fog Domain. Answer: In this recent era of high level technologies, both cloud and fog computing are referred to as an evolving archetype with a tremendous momentum however all the unique aspects associated to these technologies are currently facing major level of challenges. This report depicts the security and privacy issues in cloud computing and fog domain those are interrupting its technical efficiencies. Fog computing is the extended edge of network is of cloud computing that is consist of certain different characteristics. After analyzing the background of these technical applications it has been found that due to lack of security approaches these application domains are facing privacy and security challenges. Due to lack of data segregation as well as ownership data segregation issues are arising during the creation of shared infrastructure. Again the location of data are also facing legal issues due to lack of privacy laws of cloud computing. In addition to this, the security procedures are lagg ing proper encryption algorithm and due to this reason the unauthenticated users are becoming able to hijack confidential information from the server. Besides this the access protocols used by the organizations are also facing huge security challenges. Issues are also rising for lack of notification of the security breaches and improper audit rights. On the other hand, the fog computing technology integrated with IoT also faces different security and privacy challenges such as lack of authentication, ineffective trust and rouge node detection, data protection issue etc. Apart from this, the other challenges that Fog computing is facing simultaneously include man in the middle attack, environment setting of the stealth testing, decoy system decoy data etc. These challenges are needed to be identified and minimized respectively to improve the service mobility across the technical platform adopted by different organizations. References Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K. K. R., Dlodlo, M. (2017). From cloud to fog computing: A review and a conceptual live VM migration framework.IEEE Access,5, 8284-8300. Vaquero, L. M., Rodero-Merino, L. (2014). Finding your way in the fog: Towards a comprehensive definition of fog computing.ACM SIGCOMM Computer Communication Review,44(5), 27-32.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.