StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security of Brokerless (Cloud) Architectures - Essay Example

Cite this document
Summary
Security system that are used include content-based publish; secure goals and requirements, identity-based encryptions, numeric attributes and key generation for subscribers. Security systems that have been used such as secure event dissemination have ensured that publishing of…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Security of Brokerless (Cloud) Architectures
Read Text Preview

Extract of sample "Security of Brokerless (Cloud) Architectures"

Security of Brokerless Architectures By Security systems Security system that are used include content-based publish; secure goals and requirements, identity-based encryptions, numeric attributes and key generation for subscribers. Security systems that have been used such as secure event dissemination have ensured that publishing of event as are managed (Duncan, 2009). Cipher texts that are used in this system need to reflect back to the roots of attribute tree. Security is enhanced in the system since cipher texts are labelled each with a unique symbol.

Strengths of approach Security system that have been used have made authentication possible (Duncan, 2009). Authentication has been used in the security system to avoid publication that is non-legible with only those that are authorised being able to publish events in the system. Confidentiality has been maintained in the system since events are only visible to subscribers and are protected from modification that is illegal. Confidentiality also makes subscriptions done by subscribers to be confidential and not able to be forged (John, 2010).

Weakness of approach Scalability has made scaling with the number of people that are subscribers in the system. Key server has enabled maintenance of constant number of keys per transaction.Weak notions have occurred reducing confidentiality since peers need to know subscriptions that are made by their parents. Parents also need to know subscriptions that are made by their children (John, 2010). Overlay maintenance should also be done in the right way such that credentials of subscribers are not confused making one to get to publications of others (Pesonen, Eyers and Bacon, (2007).

ReferencesW. Pesonen, Eyers, and J. Bacon, (2007) “Encryption-EnforcedAccess Control in Dynamic Multi-Domain Publish/SubscribeNetworks,” Proc. ACM Int’l Conf. Distributed Event-Based Systems (DEBS)Press Duncan, T. (2009). Publishing security. KidhavenJohn R. (2010). Management of sites and publishing security. Oxford press

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security of Brokerless (Cloud) Architectures Essay”, n.d.)
Security of Brokerless (Cloud) Architectures Essay. Retrieved from https://studentshare.org/information-technology/1674942-security-of-brokerless-cloud-architectures
(Security of Brokerless (Cloud) Architectures Essay)
Security of Brokerless (Cloud) Architectures Essay. https://studentshare.org/information-technology/1674942-security-of-brokerless-cloud-architectures.
“Security of Brokerless (Cloud) Architectures Essay”, n.d. https://studentshare.org/information-technology/1674942-security-of-brokerless-cloud-architectures.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security of Brokerless (Cloud) Architectures

Cloud Computing

cloud Computing Name Instructor Question 1(a) As the organizations continue to embrace technology, cloud computing has become an asset prompting the move from customary technologies to cloud computing models.... hellip; For an organization that is adopting cloud computing for the first time, I would recommend that they take the following steps into consideration.... The second step is the architecture, engineering and deployment, which basically entails setting architectural framework, engineering the process of cloud computing and putting it into action....
3 Pages (750 words) Research Paper

Enterprise network architectures constraints

From a broad perception, enterprise network solutions in organizations are done in the right manner possible, and this integrates all elements… This becomes a defining application which has the capability of improving performance and ensuring that organizational strategic goals have been realized within the shortest time possible. Several leaders in Enterprise Network architectures Constraints Enterprise Network architectures Constraints Evidently through modern research, there are various reasons as to why organizational leaders migrate to enterprise network solutions....
2 Pages (500 words) Essay

Network Security Architecture

These architectures are namely the Centralized and Distributed AP WLAN architectures.... These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security.... These two approaches, however, entail some basic differences which majorly impact deployment costs, management and security.... The security edge in the Centralized approach is the WLAN switch.... In Distributed Architecture, on the other hand, security is extended to the client devices where strong encryption occurs at both the APs and client devices along with authentication....
1 Pages (250 words) Research Paper

Cloud-Based Computing Security

The paper "cloud-Based Computing Security" highlights that Data security, in particular data protection from unauthorized access, is becoming more crucial as an increasing number of enterprises trust their database systems.... nbsp;It is obvious that cloud computing helps IT organizations.... This essay summarizes the most important data security requirements (confidentiality, integrity and availability), discusses the security challenges that currently face the enterprise when storing data in its own local servers or deploying it to the cloud and introduces available solutions for these issues....
7 Pages (1750 words) Essay

Proposition to Introduce Cloud Client Architecture at Macfarlanes LLP

Of note is that there exists a basic distinction between cloud and client architectures (Donnell 2010).... Of note is that there exists a basic distinction between cloud and client architectures (Donnell 2010).... This report describes the proposition to introduce cloud/client architecture at Macfarlanes LLP.... In conclusion it stipulates advantages and disadvantages of both cloud and client architecture.... hellip; cloud/client computing architecture is basically a terms that used to refer to the various components and subcomponents that are required so as to be able to set up either a client or a cloud computing network....
6 Pages (1500 words) Report

Security Management in the Cloud

The author of the paper titled "Security Management in the cloud" focuses on the NIST cloud Standards which goals are to achieve fungible clouds that ensure application portability, standard interfaces, programming models for the cloud, and semantics.... nbsp;… The NIST cloud Standards also seeks to make federated security services and that there is effective implementation by all the competing vendors of the cloud....
1 Pages (250 words) Essay

Enterprise Information Architecture

cloud Computing systems have a wide range of capabilities relevant to business organizations.... cloud computing services are standardized in that they can be offered to individuals, firms and corporate companies with tailoring to fit the need for which they are used.... cloud computing is also capable of virtualization of services and use of the internet.... cloud computing creates a virtual environment for computing, storage of data and information as well as communication offering sustainable solutions to internet risks....
6 Pages (1500 words) Assignment

Cloud Computing: Overview and Risk Analysis

The paper "cloud Computing: Overview and Risk Analysis" outlines that cloud computing develops a crucial keyword in accelerating information technology businesses, but it possesses a distributed architecture established on unfixed nodes and safety issues outlined in services based on cloud computing.... hellip; The emergence of cloud computing has rapidly changed everyone's intuition of infrastructure structure, development paradigms, and software delivery....
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us