Explain three challenges in managing data in the cloud

Assignment Help Computer Networking
Reference no: EM131910829

Assignment

Managing data in the cloud can be a very difficult task. It is made even more difficult when attempting to ensure performance and reliability. Once data are placed in the cloud, there are questions about how is that data accessed and audited, who can access the data, and can data in the cloud be tracked back to its original owner? In this assignment, explore how cloud data are accessed by users, cloud providers, and law enforcement; examine two important components of cloud technology: data provenance and process provenance; and make an argument for the performance and reliability of one provider of cloud technology.

Assignment Guidelines

• You are the IT manager for a small electronics manufacturer with several valuable technical patents and an emerging international market. You have been tasked with providing a report on the viability of moving the company's data to the cloud.

• Keeping the scenario in mind, research cloud data provenance and process provenance, making sure you address the following points:

o Create a strategic plan to move the company's data to the cloud while still ensuring data security
o Explain the differences between cloud data provenance and process provenance
o Explain three challenges in managing data in the cloud
o List and describe the problems with data access in the cloud and ownership
o Give a recommendation on the ability to remain anonymous in the cloud
o Explore and recommend a company policy that addresses law enforcement requests and data security

• Choose one provider of cloud technology and report on the performance and reliability of its product.

• What other ways are there to optimize cloud performance and reliability?

Your submitted assignment must include the following:

• A double-spaced paper of 3-5 pages that covers cloud data provenance and process provenance
• A title page that includes your name, course number, and unit number
• A reference list in APA format.

Reference no: EM131910829

Questions Cloud

How are the tools used specifically to improve performance : How are these tools used specifically to improve performance? How does each tool function with regard to network reliability testing?
Aviva to collect its receivables on average : How long does it take Aviva to collect its receivables on average?
What is the firm accounts payable : The firm’s cash conversion cycle is 58.50 days, and its operating cycle is 97.5 days. What is the firm’s accounts payable?
Confidence interval for the average number : Give a 90% confidence interval for the average number of banking operations per week for the town residents aged 18 and over.
Explain three challenges in managing data in the cloud : Explain three challenges in managing data in the cloud. List and describe the problems with data access in the cloud and ownership.
What is the effective interest rate on loan : The loan called for a compensating balance of 15 percent. What is the effective interest rate on the loan?
Explain how the task can be delegated to others : Explain how the task can be delegated to others, and list the pros and cons of having multiple administrators manage the policies.
What impact will qe have on a companys cost of capital : Consider how QE may affect different economic sectors, and think about different macroeconomic variables that will be most affected.
The right to erect office building on parcel of land : The webber Company is an international conglomerate with a real estate division that owns the right to erect an office building on a parcel of land

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain poe and describe its capabilities and limitations

Explain PoE. Describe its capabilities and limitations. Identify ways in which PoE may be used in mobile technology. Explain design and structure of network.

  Explain current standards and policies with star clothing

In context of telecommunications standards and policy, create 3-5 page white paper which explains current standards and policies which are suitable to MCG's work with Star Clothing.

  What port does tftp use

What command is used to save a configuration in JUNOS? What command sequence saves the JUNOS configuration and exits the configuration mode?

  What is theoretical maximum channel capacity

What is the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  The common criteria address these four problems of tcse

Recall that criteria creep is the process of refining evaluation requirements as the industry gains experience with them, making the evaluation criteria something of a moving target. (See Section 21.2.4.2 of Bishop) How well did the Common Criteria (..

  What can happen if a response is lost

IGMP does not include a strategy for acknowledgement or retransmission, even when used on networks that use best-effort delivery.

  Conduct a feasibility study of your project

Discuss the whole experience of hypothetical project design exercise-what you learned, what you found frustrating, and any suggestions you have as to how it could be improved for future students.

  Identify the critical path and other paths through network

Construct the project activity network using AON methodology and label each node. Identify the critical path and other paths through the network

  Discuss how fixed-length classful addressing affects

The IPv4 classful architecture has been wasteful and led to the rapid depletion of IPv4 addresses worldwide. Discuss how fixed-length classful addressing affect

  Distinguish between local area networks wireless technologie

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies.

  Explain the osi model and tcp-ip protocol

Define and explain the OSI model, TCP/IP protocol, File transfer protocol, or wireless workstation giving examples of its usage and explaining its' background and history

  How can a mantrap provide multifactor authentication

While upgrading a sales rep's corporate desktop computer, you notice some HR files for several coworkers from several different departments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd