Answer To: IEEE Paper Template in A4 (V1) Security and Privacy Issues in Cloud and Fog Domain Beulah Moses...
Ahmedali answered on Apr 28 2020
Big Data challenges in IoT and Cloud
Executive Summary
Big Data, IoT, and Cloud computing are most advanced technologies that are now becoming inseparable. The IoT produced data form the part of big data, which is processed by Big Data technologies while analysis of this data is carried out by cloud-based applications. This amalgamation of technologies also result into increase of challenges as each technologies has its own set of challenges such that when they are put together, the systems have to face a large number of challenges. These challenges are required to be addressed if companies have to make most effective use of these technologies to bring profitability in the organization.
This paper addresses this need by exploring the challenges faced by the three technologies. The paper first explores the fundamentals of each technologies including what they are, how they are structured and where they are used. Further, it explores the challenges of each technologies. In the next section, the challenges discovered are collated, critically analysed and the solutions are suggested. The paper analyses the key feature of Big data that is obtained from IoT devices and explores possible solutions for it. As the current research explores more of the challenges and leaves less scope for identification of the solutions, a future research is recommended for the same such that each of the challenges identified can be studied in depth and solutions can be discovered.
Contents
Executive Summary 1
Introduction 2
Literature Review 3
Cloud Computing technology 3
Cloud computing models 4
Development process 4
Challenges in Cloud Computing 5
Measures to overcome challenges in Cloud Computing 9
IoT Technologies 9
IoT Architecture 10
Challenges of IoT 11
Big Data Technologies 13
Issues and Challenges in Big Data 13
Big Data, IoT, and Cloud Computing Challenges and Solutions 15
Heterogeneity 15
Future research 17
Conclusions 18
References 19
Introduction
IT industry currently in the phase of transition in which the data is growing at an exponential rate and the people and organizations are getting more data centric. The world has entered the Big data era and the data is getting more precise with the increase of capabilities of the technology. Big data provides many opportunities for the organization but at the same time also present some challenges.
The collection of huge data can be obtained from various internet sources in the modern world and with the use of IoT; it has become possible to extract more data from industrial and very human sources. Because of the emergence of IoT, the expanse of data has become even more and growing towards infinity.
To be able to extract the value from the big data, the technology needs to process the data and analyse the same in the timely manner. The results of the analysis can affect the business decisions. Cloud computing is used to keep the big data stored. Cloud is the distributed system of computing that provides resources for storage, computing and networking of big data. The adoption of cloud computing has some major benefits for users such as reduced cost of operations effective management, higher availability, and rapid elasticity of data.
Organizations working to gain more profitability from the use of Big data lead to wide talks about the field of data science by researchers. Data science comes with a variety of techniques that can be used for extracting data and developing insights from the data. Big Data analytics can be used for analysis of the converged data that is obtained from IoT devices and from the cloud computing storage units.
However, big data analytics is faced with several challenges that could be related to big data usage, cloud-computing challenges or IoT as the three technologies merged to produce a complete system of data extraction and analysis. While one technology has specific challenges, when the three technologies are used in a unified manner, the challenges not only add but new challenges also emerge because of the combination. This research would explore the challenges that are faced by the Big Data technology systems operating in Cloud under the IoT environment.
Literature Review
Big data is huge in size, velocity and variety and thus, requires a platform that is capable of storing this large amount of data along with the defined categories. Thus, cloud computing comes as the most suitable choice for the storage of big data. Big data is not directly usage and needs to be filtered and refined before it can be put to an actual business use. Big data analytics is used for this and it lies inside the cloud system platform. Before understanding how the Big Data technologies over cloud and IoT work, the three technologies have to be explored individually to understand how they work and what challenges they face.
Cloud Computing technology
Cloud computing is academically defined as "A computing paradigm where the boundaries of cloud computing are determined economic rationale and not by technical limits". As per NIST, cloud computing uses a shared pool of a variety of different computing resources. Before cloud computing emerged, companies used to develop applications in their own technology infrastructure but with the advent of cloud computing, cloud infrastructure could be used for developing applications at much lower costs than traditional development that needed an organization to establish a complete infrastructure for the development (PETRI, 2010). There are three types of deployment models that can be used for the deployment of cloud computing and these include IaaS, PaaS, and SaaS, each of them are discussed hereafter.
Cloud computing models
Figure 1: Cloud Computing Models (Glas & Andres, 2010)
IaaS: In this cloud computing model, the infrastructure can be put on the cloud using virtualization technology such that hardware components like data centres, networks, and the company can use servers over cloud (Eval-Source, 2014).
PaaS: This architecture can be used for implementing multiple applications on the cloud. This model easy to integrate and deploy. Platform As a Service (PaaS) model is used for the development of software applications over the web.
SaaS: In this deployment model of cloud computing, clients are provided with the license for using cloud based applications and the payment for the same is managed using pay-as-you-go model. Salesforce.com is one such model that is based on SaaS deployment. There are some major benefits of SaaS such as fast deployment, better user adoption, and less support requirement (Glas & Andres, 2010).
Development process
The development process of cloud computing application involves four major steps that include identification of opportunities, suitability assessment, requirement gathering and implementation.
Opportunities Identification: The organization is explored to understand what applications are already used in the organization and the utilizes, databases or website that are with the organization. Using this knowledge, gaps can be identified on what additional applications would be required for the implementation over the cloud. This would need an understanding of the applications purpose, security needs, growth opportunities, and the environment in which the application would be deployed (Gupta & Rathore, 2012).
Suitability Assessment: Before an organization decides to implement any cloud-based application, the suitability of the needed application to cloud environment needed to be explored. This would include exploration of the potential risks that the application can face in a cloud environment. In case, the risks are too high, the application may not be installed over the cloud (Carlson, et al., 2012).
Requirement Gathering: The stakeholder requirements for the development of the cloud solution is then gathered so that the developed application has the required features and other criteria related to functionality, performance, security, compliance, manageability, and standards.
Implementation: Cloud can be implemented using specific deployment model as per the needs of the organization from private cloud, virtualization, third party platform, and hybrid model involving in-house as well as virtualized resources (Babcock, 2011).
Challenges in Cloud Computing
Perceived risks related to cloud computing prevent its adoption and thus, it is important to study risks and challenges that are faced by cloud computing models in business. There can be five major sources of risks in cloud computing environment and these include uses, service provided, network provider, enterprise, and the environment (Catteddu & Hogben, 2010).
A Risk Identification Matrix can be used for understanding how the risks generated in each of these areas can affect an organization and how easy is it to mitigate their impacts. The matrix shown below can be used for creating the risk profile of a cloud based network. This risk profile can be modified as the workload in the IT systems increase (Gadia, 2011).
Figure 1 Risk Identification Matrix (Ristić, 2014)
The resulting Risks can include issues related to availability, integrity and confidentiality. The risk profile of the cloud based business contains details of risk types, their origin, and risk levels (Schotman, Shahim, & Mitwalli, 2013). Different types of risks faced in cloud computing based businesses include:
User risk: Many organizations today have their employees using their own devices for the office use such as in the BYOD scheme. The organization has a limited control over these privately owned devices and hence, the risks are higher. For instance, in case such a device gets lost, the person able to access the device would be able to access the data (Buchhloz, Dunlop, & Ross, 2012). These users also use certain common business applications such as Microsoft Excel and Private Email service that can further add to security risk for the organization. Controls needed for protection of the data that is transferred through these devices is difficult to achieve in privately owned devices (Oracle Corporation , 2007).
Enterprises risk: Private cloud is more secure than a public cloud but if the data centres used are not of industrial grade, the risks only increase and more comprehensive security processes are then required to mitigate these risks s (Engine Yard, Inc., 2014). The enterprise identity access management (IAM) is one area that creates more risks for cloud computing environment and thus, need proper governance mechanism. For this, different sources of risks have to be assessed and mitigation measures have to be made (Wipro Council for Industrial Research, 2013).
Network provider risk: Networks can exist between the cloud service provider and the company, and between the user and the cloud service provider. Communication on the network with enterprise can be controlled by an organization but the communication that happens between the users, the cloud service provider is difficult to control, and thus, this network poses a risk of facing attacks like Man-in-the-Middle. Although, encryptions are used over SSL, mitigating such risks is still difficult and attackers can still break into the network affecting its integrity and confidentiality of users. Although encryptions are used such as in SSL for mitigating such risks, the network can still be broken into by attackers leading to bad impacts on confidentiality and integrity (Mkrtchyan, 2010).
Cloud provider risk: Cloud service providers can also cause problems that are difficult to predict. Service Level Agreements can help in this case largely for recovery of losses but it cannot help prevent the damage. If the service provider maintains a redundant server, lost data can be retrieved but in case of disaster, it may not help if disaster recovery is not (Chen, Longstaff, & Carley, 2004).
Environment risk: Risks that are caused by natural disasters were the environmental risks that can affect the data on cloud. For instance, in 2011, Tsunami in Japan caused severe damage to Fukushima nuclear energy plant that caused a major power outage (Hathaway, et al., 2012). Hurricane Sandy had disrupted major services in many areas of US in 2012 (AKIYAMA, SATO, NAITO, NAOI, & KATSUTA, 2012).
Key concerns that act as barriers to cloud Computing are data availability issues, data security concerns, legal or compliance issues and loss of control over data (Shinde & Chavan, 2013). In a mitigation plan for overcoming barriers to Cloud Computing, each of these inhibitors had to be explored and their potential risk has to be studied....