Wednesday, December 4, 2019

Learning Theory and Online Technologies †MyAssignmenthelp.com

Question: Discuss about the Learning Theory and Online Technologies. Answer: Introduction: In this article, Yang et al., (2015) discussed on the survey that is conducted on the security technologies on wireless sensor networks. Due to rapid development of wireless communication, sensor technology is promoted to develop wireless sensor networks (WSN). WSN is consisted of an emergence network technology that is raised recently. It obtains lot of consistent information within distributed network wherever and anytime. While providing of security solutions to WSN, encryption technology is used to prevent the security issues. The researcher conducted the research to identify various security technologies used to mitigate security and privacy risks from the cloud environment. The author proposed of key management schemes. The limitation of this study is shortcomings into security as well as network applicability. In this article, Inukollu, Arsi and Ravuri (2014) discussed about the security issues within cloud computing. This selected article is relevant as applications of big data are benefited to the organizations, businesses and large and small scale industries. Various solutions for the problems within cloud computing security are discussed. In order to protect the data and big data applications, cloud computing plays a key significant role. Hadoop framework is discussed with using of security framework to process larger amounts of data into the hardware. The author concluded that cloud computing consists of various security issues as it contains of networks, operating systems, scheduling of resources, concurrency control and databases. Security over the data contains of data encryption, but it makes sure that proper policies are to be followed for data sharing. In this article, Modi et al. (2013) discussed that the cloud computing provides scalable on demand services to the customers with better suppleness as well as infrastructure asset. The cloud services are provided the users using classical networking protocols and it is formatted over the internet. The researcher surveyed of various factors which affect the adoption of cloud computing are attacks, threats and vulnerabilities to strength security cloud environments. The researcher concluded that in the future, this research will focus on existing techniques and examine of new security techniques to cloud environment. It requires a dynamic model and crypto algorithm which will target various levels of security in addition to privacy for the cloud computing. Encryption algorithm consists of unfamiliar position of the data within cloud to administer the data encryption. In this article, Almorsy, Grundy and Muller (2016) demonstrated that cloud computing is a computational paradigm which is offering of various business models for the business in order to adopt of IT with no upfront investments. In the cloud environment, security issues are critical as new dimensions are entered into problem scope related to the model architectures. The researcher introduced a detailed analysis of the problems related to problem of cloud security. The problem is investigated based on perspective of cloud architecture. A cloud computing model is used by the service and cloud providers. This model is used to utilize to block existing security holes. It is concluded that cloud security management problems are investigated so that the system users can analyze it. The objective is to block the holes arise within the processes of security management. In this article, Fernandes et al. (2014) discussed that the paper is based on security issues within the cloud environments. The features of cloud computing is that it motivates the researcher about various technologies to be used to mitigate the cloud computing issues. The issues are derived from the web technologies, internet, and then the cloud introduced of security issues. This particular paper surveyed on cloud security issues. It is concluded that the cloud computing is being dominated by various challenges. Due to growth of advanced technology as well as virtualization, the industry is facing security issues. In order to provide a secured cloud environment, highest priority is the security issues. Therefore, it will enable a better considerate of the security states. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., Incio, P. R. (2014). Security issues in cloud environments: a survey.International Journal of Information Security,13(2), 113-170. Inukollu, V. N., Arsi, S., Ravuri, S. R. (2014). Security issues associated with big data in cloud computing.International Journal of Network Security Its Applications,6(3), 45. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing.The Journal of Supercomputing,63(2), 561-592. Yang, Q., Zhu, X., Fu, H., Che, X. (2015). Survey of security technologies on wireless sensor networks.Journal of sensors,2015. Anderson, T. (2016). Theories for learning with emerging technologies.Emerging technologies in distance education. Harasim, L. (2017).Learning theory and online technologies. Taylor Francis. Lu, X., Wang, P., Niyato, D., Kim, D. I., Han, Z. (2016). Wireless charging technologies: Fundamentals, standards, and network applications.IEEE Communications Surveys Tutorials,18(2), 1413-1452. Mijumbi, R., Serrat, J., Gorricho, J. L., Bouten, N., De Turck, F., Boutaba, R. (2016). Network function virtualization: State-of-the-art and research challenges.IEEE Communications Surveys Tutorials,18(1), 236-262. Pan, M., Sikorski, J., Akroyd, J., Mosbach, S., Lau, R., Kraft, M. (2016). Design technologies for eco-industrial parks: From unit operations to processes, plants and industrial networks.Applied Energy,175, 305-323.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.