Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Itc571 Emerging Technology And Innovations Assessment Answers

Questions:

1.Start your writing by providing background information about the topic and its current/existing solution
2.Continue your writing to set the need for the research
3.Continue your writing to set the Motivation for the research as a starting point
4.Why your research is significant or Why is it an interesting or useful problem?
5.What are the researchers in the area were trying to find out?
6.What is the aim or objective of your research?

Answers:

Introduction

One of the most emerging technologies in the field of information and communication technology is Fog Computing. After the development of online storage systems, several technologies were invented that were able to store large amounts of data in the online storage interface. Cloud computing and big data fall under this category [3]. While cloud computing provided the online storage interface, Big Data provided the online storage space for vast amounts of data. The online storage system is considered to be one of the best technical inventions and are used extensively by large commercial organizations all over the world. However, the problem arose when the data processing was not done efficiently by these technologies. Moreover, the data distribution in these storage spaces was not done accurately. Hence, there was a need for a new technology to solve these problems. Fog Computing solves this problem and provides data processing solutions for those using cloud computing services [7]. Fog computing system acts as an intermediate between the physical operational device and the cloud computing system. It processes the data from the users’ devices and then sends the processed data to respective storage spaces in the cloud.

In this research, fog computing is to be explored and its security and privacy issues are to be analyzed and addressed.

Rationale Of Research

A. Problem Domain

Fog computing is closely related to Internet of Things as well as cloud computing as it benefits both of the services. Fog computing is used to process the personal information of the users that are sent to the cloud through internet of things. The main problem domain in this case is the security issue with the fog computing services. Since it handles a huge amount of personal data of the users, security threats can destroy the privacy of these data and information [12]. On the other hand, since fog computing is completely based online, there are a large number of cyber security threats that can do serious damage to all the data and information processed by the fog. Hence, the security and privacy issues with fog must be addressed in order make it more usable for the IoT users as well as the commercial organizations who use cloud computing services.

B. Purpose and Justification

The main purpose of the research is to address the security and privacy issues in fog computing. The main threats of fog computing are cyber agents that deal with stealing or damaging of the personal information of common users. In this research, fog computing is to be explored in detail in order to identify its vulnerabilities and weak points that can be exploited by external cyber agents. Accordingly, suitable measures must be designed and deployed so that the threats from these external cyber agents can be minimized.

While some researchers might argue about why should the issues with fog have to be addressed while there are still sufficient rooms for newer and better technologies, the research on addressing the security and privacy issues of fog computing can be justified by the following reasons.

  • Internet of Things is an extremely popular technology nowadays with its popularity increasing every day. In order to manage all the data used by Internet of Things, fog computing is a necessary technology to process all the data.
  • With the increasing popularity of Internet of Things, data traffic is increasing significantly. In order to manage all the data and reduce the traffic, fog computing is extremely necessary.
  • Due to the data traffic, the network bandwidth changes frequently to catch all types of data from different sources. Fog computing can be used to solve this issue and maintain a standard network bandwidth while also capturing all the data.
  • Fog computing also aids the improvement of system response time.

C. Research Questions

Before conducting any research, a list of research questions is to be prepared. These research questions are to be addressed during the course of the project. The research questions for this project are as follows.

  1. What is fog computing and what are its advantages?
  2. What types of data are processed through fog computing?
  3. What are the vulnerabilities of fog computing?
  4. What are the main security and privacy threats of fog computing?
  5. How can the security and privacy issues of fog computing be addressed?

D. Conceptual Framework

Fog computing is a software based data processing and management system similar to cloud computing. Cloud is a virtual interface for handling and management of information inside a virtual storage interface that will generally require physical capacity framework. With expanding utilization of Internet of Things, the information administration and capacity by cloud have essentially lessened in proficiency and precision. Subsequently, the new fog framework will be created with a specific end goal to lessen the movement in the cloud and increment precision and productivity of information administration and capacity [10]. Because of extensive variety of advantages of fog, numerous new technical developments have been constantly developed for benefiting the cloud, IoT and big data. Besides, fog can be utilized to handle numbers issues and inaccuracies provided by cloud and IoT. For the research of fog computing services, the available technical setup has to be upgraded so that it supports different software processing of cloud and fog computing services.

III. Materials and Methods

A. Research and System Development Model

For the purpose of this research, standard research process will be followed. The research will be conducted in two stages – review of existing literature and evaluation of practical applications of the system. The context of the research questions is be analyzed using the existing literatures that contain works of reputed researchers on advanced information technology and online storage system. From the literature survey, sufficient amount of primary data can be collected that can be used to analyze the fog computing system and its vulnerabilities. In the next stage, practical implementation of fog computing will be done and analyzed. In this project stage, fog computing will be installed in the system and analyzed on the basis of collected primary data. Moreover, secondary data will be collected from the experimental results.

For the purpose of system development, at first, the available technical setup will be upgraded so that it can support cloud and fog operations. After that, a subscription will be done in a cloud server in which, the implementation of fog computing will be done. After the implementation is complete, the security and privacy issues of fog will be analyzed and addressed.

B. Data Collection

Data will be collected from two sources – primary data will be obtained from the review of literature and secondary data will be obtained from experimental results. After the experiment is complete, the two types of data will be compared for parity and the final test results will be published accordingly. It is to be ensured that the final data is sufficient to address the security and privacy issues of fog computing.

C. Ethical Issues

In different research activities, several ethical issues are associated especially in this research, where the project involves handling users’ personal information through fog computing. Moreover, there are certain ethical guidelines of software usage by the local government. Hence, while conducting the research, it is to be ensured that the privacy of the user information is maintained and the ethical guidelines of software usage is followed while implementing and operating fog computing system.

D. Compliance Requirements

The use of softwares in the project must comply with the usage guidelines of the government as well as the manufacturers of the software. Copyright infringement is strictly banned and the softwares and online services used in the project must be done after the companies’ permission or full subscription in the services.

E. Data Analysis

Data analysis will be done using the comparison results of the primary and secondary data. Initially, while performing the literature analysis, the primary data analysis will be done while during the experiment, the secondary data analysis will be conducted. During the final phase of the research, both types of data will be compared and analyzed for generating the final results.

IV. Rerearch and Project Plan

A. Research Deliverables

The final deliverables of the research are as follows.

  • An in-depth analysis of fog computing service and its benefits
  • Analysis of vulnerabilities in fog computing system
  • Analysis of the security and privacy issues in fog computing
  • Final document containing the plans for addressing the security and privacy issues of fog computing

B. Risk Analysis

The main objective of the research is to identify and address the threats associated with fog computing system. Hence, there are a lot of risks and threats that are needed to be addressed in course of the research. The first main risk associated with fog computing is the privacy risk. Fog computing deals with processing of a huge amount of personal information of the users and as a result, the privacy has to be maintained at all costs [6]. Cyber security threats like hackers and malwares seek this type of personal information of the common users and use it for unethical activities like masked transactions, fraud cases and others. This is exactly the main reason why many users still do not rely on fog computing. If this issue can be addressed and minimized, it will raise the potential of fog computing and the business organizations will extensively use fog computing services. Another main risk associated with this is the network security. Fog computing is completely based online, wireless network security is a significant risk. Wireless network security issues include sniffer attacks, jamming attacks and others [4]. Finally, another major risk in the fog system is the rogue fog node. Sometimes, some unethical hackers prepare and attach rogue fog nodes to a fog system. These rogue fog nodes can act as regular fog node and once the user provides personal information, the rogue fog node captures it and sends it to the parent rogue server. In this way, huge amounts of personal information of users have been lost through the fog computing system.

D. Research Duration

Task Name

Duration

Start

Finish

Fog Computing Security Development Research Project

95 days

Mon 27-03-17

Fri 04-08-17

   Project Planning Phase

12 days

Mon 27-03-17

Tue 11-04-17

      Preparation of Research Plan

5 days

Mon 27-03-17

Fri 31-03-17

      Analysis of the Research Plan

5 days

Mon 03-04-17

Fri 07-04-17

      Scheduling of Research Period and Resource Requirements

2 days

Mon 10-04-17

Tue 11-04-17

   Project Initiation Phase

3 days

Mon 10-04-17

Wed 12-04-17

      Verification of Project Plan against Research Requirements

1 day

Mon 10-04-17

Mon 10-04-17

      Approval of Research Plan

1 day

Tue 11-04-17

Tue 11-04-17

      Initiation of the Research

1 day

Wed 12-04-17

Wed 12-04-17

   Project Execution Phase

59 days

Wed 12-04-17

Mon 03-07-17

      Survey of Existing Literature

20 days

Thu 13-04-17

Wed 10-05-17

      Primary Data Collection

3 days

Thu 11-05-17

Mon 15-05-17

      Primary Data Analysis

5 days

Tue 16-05-17

Mon 22-05-17

      Application of Technical Upgrades

15 days

Wed 12-04-17

Tue 02-05-17

      System Planning and Development

15 days

Wed 03-05-17

Tue 23-05-17

      Implementation of Proposed System Model

10 days

Wed 24-05-17

Tue 06-06-17

      Subscription of Cloud Storage Server

4 days

Wed 07-06-17

Mon 12-06-17

      Implementation of Fog Server

3 days

Tue 13-06-17

Thu 15-06-17

      Secondary Data Collection

5 days

Tue 13-06-17

Mon 19-06-17

      Secondary Data Analysis

10 days

Tue 20-06-17

Mon 03-07-17

   Project Closing Phase

36 days

Fri 16-06-17

Fri 04-08-17

      Comparison of Primary and Secondary Data

10 days

Tue 20-06-17

Mon 03-07-17

      Development of System Usage Protocol

5 days

Tue 04-07-17

Mon 10-07-17

      Implementation of Fog Privacy and Security System

10 days

Fri 16-06-17

Thu 29-06-17

      Final Analysis and Testing

5 days

Fri 30-06-17

Thu 06-07-17

      Analysis of Further Risks and Issues

5 days

Fri 07-07-17

Thu 13-07-17

      Mitigation of Risks and Debugging

5 days

Fri 14-07-17

Thu 20-07-17

      Completion of Research and Documentation

10 days

Fri 21-07-17

Thu 03-08-17

      Researchers Signoff

1 day

Fri 04-08-17

Fri 04-08-17

V. Conclusion

In this research, fog computing is to be explored and its security and privacy issues are to be analyzed and addressed. One of the most emerging technologies in the field of information and communication technology is Fog Computing. After the development of online storage systems, several technologies were invented that were able to store large amounts of data in the online storage interface. Cloud computing and big data fall under this category. While cloud computing provided the online storage interface, Big Data provided the online storage space for vast amounts of data. The online storage system is considered to be one of the best technical inventions and are used extensively by large commercial organizations all over the world. There are a lot of risks and threats that are needed to be addressed in course of the research. The first main risk associated with fog computing is the privacy risk. Fog computing deals with processing of a huge amount of personal information of the users and as a result, the privacy has to be maintained at all costs. Cyber security threats like hackers and malwares seek this type of personal information of the common users and use it for unethical activities like masked transactions, fraud cases and others. In this research, all the associated privacy and security issues of fog computing will be addressed.

VI. References

  • Stojmenovic, I. and Wen, S. The fog computing paradigm: Scenarios and security issues. In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on(pp. 1-8). IEEE, 2014, September.
  • Mahmud, R. and Buyya, R. Fog Computing: A Taxonomy, Survey and Future Directions. arXiv preprint arXiv:1611.05539, 2016.
  • Yi, S., Qin, Z. and Li, Q. Security and privacy issues of fog computing: A survey. In International Conference on Wireless Algorithms, Systems, and Applications(pp. 685-695). Springer International Publishing, 2015, August.
  • Sehgal, V.K., Patrick, A., Soni, A. and Rajput, L. Smart human security framework using internet of things, cloud and fog computing. In Intelligent distributed computing(pp. 251-263). Springer International Publishing, 2015.
  • Dsouza, C., Ahn, G.J. and Taguinod, M. Policy-driven security management for fog computing: Preliminary framework and a case study. In Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on(pp. 16-23). IEEE, 2014, August.
  • Vaquero, L.M. and Rodero-Merino, L. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review, 44(5), pp.27-32, 2014.
  • Aazam, M. and Huh, E.N. Fog computing and smart gateway based communication for cloud of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on(pp. 464-470). IEEE, 2014, August.
  • Luan, T.H., Gao, L., Li, Z., Xiang, Y., We, G. and Sun, L. Fog Computing: Paradigm, Protocol and Security Issues. arXiv preprint arXiv:1502.01815, 2015.
  • Bonomi, F., Milito, R., Natarajan, P. and Zhu, J. Fog computing: A platform for internet of things and analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments(pp. 169-186). Springer International Publishing, 2014.
  • Dastjerdi, A.V., Gupta, H., Calheiros, R.N., Ghosh, S.K. and Buyya, R. Fog computing: Principles, architectures, and applications. arXiv preprint arXiv:1601.02752, 2016.
  • Yannuzzi, M., Milito, R., Serral-Gracià, R., Montero, D. and Nemirovsky, M. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing. In Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2014 IEEE 19th International Workshop on(pp. 325-329). IEEE, 2014, December.
  • Alrawais, A., Alhothaily, A., Hu, C. and Cheng, X. Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Computing, 21(2), pp.34-42, 2017.
  • Lee, K., Kim, D., Ha, D., Rajput, U. and Oh, H. On security and privacy issues of fog computing supported Internet of Things environment. In Network of the Future (NOF), 2015 6th International Conference on the(pp. 1-3). IEEE, 2015, September.
  • Syed, M.H., Fernandez, E.B. and Ilyas, M. A pattern for Fog Computing. In Proceedings of the 10th Travelling Conference on Pattern Languages of Programs(p. 13). ACM, 2016, April.
  • Salonikias, S., Mavridis, I. and Gritzalis, D. Access control issues in utilizing fog computing for transport infrastructure. In International Conference on Critical Information Infrastructures Security(pp. 15-26). Springer International Publishing, 2015, October.
  • Shenoy, K., Bhokare, P. and Pai, U. Fog Computing Future of Cloud Computing. International Journal of Science and Research, 4(6), pp.55-56, 2015.
  • Firdhous, M., Ghazali, O. and Hassan, S. Fog computing: Will it be the future of cloud computing?. In Third International Conference on Informatics & Applications, Kuala Terengganu, Malaysia(pp. 8-15) , 2014.
  • Kanna, T.R., Nagaraju, M. and Bhaskar, C.V. Secure Fog Computing: Providing Data Security. IJRCCT, 4(1), pp.053-055, 2015.
  • Madsen, H., Burtschy, B., Albeanu, G. and Popentiu-Vladicescu, F.L. Reliability in the utility computing era: Towards reliable fog computing. In Systems, Signals and Image Processing (IWSSIP), 2013 20th International Conference on(pp. 43-46). IEEE, 2013, July.
  • Botta, A., De Donato, W., Persico, V. and Pescapé, A. On the integration of cloud computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on(pp. 23-30). IEEE, 2014, August.

Buy Itc571 Emerging Technology And Innovations Assessment Answers Online


Talk to our expert to get the help with Itc571 Emerging Technology And Innovations Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.


Get Online Support for Itc571 Emerging Technology And Innovations Assessment Answers Assignment Help Online


); }
Copyright © 2009-2023 UrgentHomework.com, All right reserved.