Free

Security of Brokerless (Cloud) Architectures - Essay Example

Comments (0) Cite this document
Summary
Security system that are used include content-based publish; secure goals and requirements, identity-based encryptions, numeric attributes and key generation for subscribers. Security systems that have been used such as secure event dissemination have ensured that publishing of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Security of Brokerless (Cloud) Architectures
Read TextPreview

Extract of sample "Security of Brokerless (Cloud) Architectures"

Security of Brokerless Architectures By Security systems Security system that are used include content-based publish; secure goals and requirements, identity-based encryptions, numeric attributes and key generation for subscribers. Security systems that have been used such as secure event dissemination have ensured that publishing of event as are managed (Duncan, 2009). Cipher texts that are used in this system need to reflect back to the roots of attribute tree. Security is enhanced in the system since cipher texts are labelled each with a unique symbol.
Strengths of approach
Security system that have been used have made authentication possible (Duncan, 2009). Authentication has been used in the security system to avoid publication that is non-legible with only those that are authorised being able to publish events in the system. Confidentiality has been maintained in the system since events are only visible to subscribers and are protected from modification that is illegal. Confidentiality also makes subscriptions done by subscribers to be confidential and not able to be forged (John, 2010).
Weakness of approach
Scalability has made scaling with the number of people that are subscribers in the system. Key server has enabled maintenance of constant number of keys per transaction.
Weak notions have occurred reducing confidentiality since peers need to know subscriptions that are made by their parents. Parents also need to know subscriptions that are made by their children (John, 2010). Overlay maintenance should also be done in the right way such that credentials of subscribers are not confused making one to get to publications of others (Pesonen, Eyers and Bacon, (2007).
References
W. Pesonen, Eyers, and J. Bacon, (2007) “Encryption-EnforcedAccess Control in Dynamic Multi-Domain Publish/SubscribeNetworks,” Proc. ACM Int’l Conf. Distributed Event-Based Systems (DEBS)
Press Duncan, T. (2009). Publishing security. Kidhaven
John R. (2010). Management of sites and publishing security. Oxford press Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security of Brokerless (Cloud) Architectures Essay”, n.d.)
Security of Brokerless (Cloud) Architectures Essay. Retrieved from https://studentshare.org/information-technology/1674942-security-of-brokerless-cloud-architectures
(Security of Brokerless (Cloud) Architectures Essay)
Security of Brokerless (Cloud) Architectures Essay. https://studentshare.org/information-technology/1674942-security-of-brokerless-cloud-architectures.
“Security of Brokerless (Cloud) Architectures Essay”, n.d. https://studentshare.org/information-technology/1674942-security-of-brokerless-cloud-architectures.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security of Brokerless (Cloud) Architectures

Cloud Security and Privacy Issues

...of the important security aspects which are discussed in other researches. According to (Babar & Chauhan, 2011; Meng, Wang, Hu, & Li, 2011), cloud computing is an up-and-coming paradigm, which guarantees to make the utility computing model broadly implemented by using Virtualization technologies. Additionally, an increasing number of business organizations have begun offering and utilizing cloud-enabled architectures and services. On the other hand, the progression of cloud computing creates a number of new challenges to existing techniques and approaches to build up and change software intensive systems (Babar & Chauhan, 2011; Meng, Wang, Hu, & Li,...
4 Pages(1000 words)Research Paper

Cloud Security and Privacy Issues

...Cloud Security and Privacy Issues Cloud computing is basically a computer science term that implies using the internet and servers in order to maintain and secure data and its applications. The technology of cloud computing allows consumers and business owners admission to all types of applications and their personal documents over the internet. This occurs without them installing any files at a computer with internet access. As a result of this technology, computing efficiency has been increased by offering centralized storage of data. On the whole, cloud computing security is thus the application of all the sets of...
9 Pages(2250 words)Research Paper

Cloud Computing and Security

...Cloud Computing and Security In the last few years, the paradigm of cloud computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world. Additionally, with its talent to offer users animatedly extendable and collective business resources over the web based technology like internet cloud computing prevents from large level business expenses. In addition, cloud computing guarantees to modernize the future of business as well as corporate computing environment extensively. At the present, recession-hit businesses are progressively considering that only by establishing a strong...
7 Pages(1750 words)Term Paper

Cloud Computing Security

...ID # Cloud Computing Security Cloud computing is an attractive information technology (IT) trend which ensures the implementation of the utility computing model broadly using Virtualization technologies. Keeping in mind the numerous advantages of cloud computing, an increasing number of business organizations have begun offering and making use of cloud-enabled architectures and services to support their business operations. On the other hand, the advancement of cloud computing has also created a wide variety of new challenges to existing techniques and approaches to build up and change software intensive systems (Babar...
5 Pages(1250 words)Dissertation

Cloud Computing Security

...? Cloud Computing Security Cloud Computing Security Introduction The rising cost of computing resources has been a matter of concerns for many organizations whether large, medium, or small. As a result, many organizations are struggling to adopt a cost effective computing resources for their business applications. In this regard, many organizations have moved towards adoption cloud-computing concept in their business environment in a bid to reduce cost. Iyer and Henderson (2010) define cloud computing as a collection of information technology resources such as servers, applications and databases, which are accessible upon demand and...
4 Pages(1000 words)Essay

Security in the Cloud

...and accessibility levels. Such a continuum should enable users to make a decision of applying the right protection level, thus making sure that the flexibility provided by cloud computing into the whole spectrum of data communication is ultimately retained (Anthes, 2010). Addressing the Security Concerns of Cloud Computing Considering the security concerns that relate to cloud computing, there have been efforts to address this problem without compromising fluidity of data. Baiardi and Sgandurra (2010) argue that Virtual Interacting Network Community (Vinci) is an important solution to security of data in cloud. Vinci is...
8 Pages(2000 words)Essay

Business Outreach program - Anaytical report

1 Pages(250 words)Research Proposal

Cloud based computing security

...is of paramount importance. Cloud providers such as Google spend more and more money on IT security than any other enterprise. They have designed the need for security in every layer of their architecture. Unlike the majority of companies, the reliability and security of IT infrastructure is important requirement for any cloud provider. If they fail to achieve it, they will out of business. Conclusion: Data security, in particular data protection from unauthorized access, is becoming more crucial as an increasing number of enterprise trust their database systems. It is obvious that cloud computing...
8 Pages(2000 words)Essay

Cloud computing risks & security concerns

...apply to those used for private cloud. This makes it possible to compromise security in the cloud just as it could be in traditional IT systems. On the other hand, public cloud infrastructure calls for redesigning of the architecture and processes used for security. Even so, the security issues that affect traditional systems still affect this technology. Recommendations Cloud computing bears numerous specific features like being enormous and resources of service providers being heterogeneous and completely distributed and virtualised. For this reason, Zargari, and Smith (2014) observe that traditional...
12 Pages(3000 words)Essay

Cloud Computing Security Policy

...Cloud Computing Security Policy for SNPO-MC Cloud Computing Security Policy for SNPO-MC Purpose The policy outlines the security practices and processes for using cloud services in the daily operations, data manipulation and storage and use of applications at SNPO-MC organization. Scope The policy will be used by managers, executive, staff and as a guide to negotiating terms with cloud providers. Definitions Employees of the organization are people who work in the organization. Executives who are on the loan are referred to as loaned staff members, and they usually telework for the group on specific days of the...
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security of Brokerless (Cloud) Architectures for FREE!

Contact Us