Data Security and Privacy Protection Issues in Cloud Computing Supported by Core Electronic Device, High General Chip and Basic Software program of China: 2011ZX XXXXXXXXXX Supported by National...

1 answer below »

View more »
Answered Same DayMar 30, 2021MITS6001

Answer To: Data Security and Privacy Protection Issues in Cloud Computing Supported by Core Electronic Device,...

Kuldeep answered on Apr 01 2021
152 Votes
Article Review
Student Name:
Unit Name:
University Name:
Date:
Contents
Introduction    3
Brief Summary    4
Concerns    6
IFC Designs    6
Weaknesses    7
Foundation    7
Critique    8
Introduction
In this article, the authors examine the viability of easily deploying IFC as a part of the new generation safe cloud infrastructure. T
his article is instructive. The main technical challenges in the cloud safety come from the truths that cloud infrastructure combines heterogeneous software, also the service written by severalteams of development without shared approaches to data safety. As a solution, they believe that data-centric safety mechanisms, for example, data flow control or decentralized IFC (DIFC), are particularly likely to greatly enhance today's approaches to cloud security. Some data-centric safety mechanisms that track or force dataflow moreto get better cloud security in a variety of ways. Firstly, developers can coordinate with the cloud providers or control it to how user data is spread across cloud platforms. This helps to comply with the regulatory framework. Up next, multi-tenancy becomes more protected, because despite the flaws in service itself. Third, tracking information flows across various services provides a way for cloud providers to strictly record sensitive action on tenant data, thereby increasing accountability. The author's goal is to show that although many outstanding challenges can be addressed, the IFC model and implementation can be lead to a practical as well as more secure or safe cloud computing infrastructure. Security issues are broadly seen as obstacles to adopting a cloud computing solution. Also, Information flow management or control is an extremely well-known method of compulsory access control. The old models of IFC were aimed at security in a centralized environment, but often in academic research projects, decentralized forms of Information flow control have been designed as well as implemented. As a result, decentralized IFC may have the best cloud security in comparison to this era. In this article, authors define the characteristics of cloud computing, specifically the platform for a good service cloud, a series of Information flow control (IFC) models is to identify the opportunities to use IFC in the context of the cloud computing. As information flow security is tied to information it protects andboth the tenants and cloud service providers can also agree on the security in a way that doesn't require them torecognize and depend on the details of the software stack to implement.
Brief Summary
Cloud service products are generally it is divided into 3 types of infrastructure as a service: customers directly rent computing resources.
IaaS properties are frequently provided to customers in the form of machines. Security risks may come from administrators.
PaaS: Customers need to develop the applications to using the languages ​​and also service APIs particular by a provider, where the supportive languages ​​are usually the most famous ​​in web development. furthermore, the security methods for the services provided are often highly diverse and often come from the other projects that cannot be redesigned. it makes it too difficult to complete reliable security...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30