1
Chapter Two: Literature Review
Student's Name
Name of the Institution
Course Number and Name
Professor
Due Date
Privacy Issues in Multi-Tenant Cloud Computing
Chapter Two: Literature Review
Introduction
A multitenant cloud is a cloud computing architecture that allows customers to share computing resources in a public or private cloud. Multitenant involves different cloud computing clients using or transferring a single computing infrastructure. This arrangement exposes the clients who have agreed to various privacy issues relating to their data and information stored in the cloud (Al-Ruithe et al., 2018). Evidence indicates that some of the privacy issues involved in multitenant cloud computing include data leakage, data breach, and exposure of the private data relating to clients involved in the agreement. As the number of people using cloud computing balloon, privacy issues are becoming a significant problem for many consumers who use the same cloud computing architecture in a private or public setting. It is essential to define what multitenant cloud entails before developing a clear concept or problem that can be investigated. According to Park et al. (2018), "A multitenant cloud is a cloud computing architecture that allows customers to share computing resources in a public or private cloud" (Park et al., 2018). Each tenant's data must be isolated in this cloud computing arrangement and cannot be accessed or seen by the partner tenant. However, the recent growth in technology has made data privacy in cloud computing challenges, posing a big problem to cloud computing providers.
The theoretical foundation for the current privacy issues in multitenant cloud computing is drawn from the study done by Park et al. (2018). According to Park et al. (2018), the most significant privacy issue in multitenant cloud computing is the lack of configurability. Configurability poses a colossal privacy issue in this infrastructure because the tenants have to share the same configuration. However, there is little evidence to provide this theory, and this study will play a significant role in contributing to this theoretical framework (Meng et al., 2021). The purpose of the current study is to investigate privacy and confidentiality issues in multi-tenancy cloud computing. Specifically, in this chapter, studies that have been done in the last five years focusing on this topic will be reviewed through a professional literature review.
Chapter Outline
The current chapter will be structured using headings and subheadings to ensure that each aspect is captured during the literature review. The study will be structured in 12 different sections, of which some may have sub-sections. The twelve sections in the current chapter will include introduction, chapter outline, search strategy, introduction to cloud computing, multi-tenancy cloud computing, and cloud computing deployment models. The other sections will consist of cloud computing service models, ...
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
Review of Business Information Systems – Fourth Quarter 2013 Volume 17, Number 4
2013 The Clute Institute Copyright by author(s) Creative Commons License CC-BY 159
Dimensions Of Security Threats In Cloud
Computing: A Case Study
Mathew Nicho, University of Dubai, UAE
Mahmoud Hendy, University of Dubai, UAE
ABSTRACT
Even though cloud computing, as a model, is not new, organizations are increasingly
implementing it because of its large-scale computation and data storage, flexible scalability,
relative reliability, and cost economy of services. However, despite its rapid adoption in some
sectors and domains, it is evident from research and statistics, that security-related threats are the
most noticeable barrier to its widespread adoption. To investigate the reasons behind these
threats, the authors used available literature to identify and aggregate information about IS
security threats in cloud computing. Based on this information, the authors explored the
dimensions of the nature of threat by interviewing a cloud computing practitioner in an
organization that uses both the private and public cloud deployment models. From these findings,
the authors found that IS security threats in cloud computing must be defined at different levels;
namely, at the business and technical level, as well as from a generic and cloud-specific threat
perspective. Based on their findings, the authors developed the Cloud Computing Threat Matrix
(CCTM) which provides a two-dimensional definition of threat that enables cloud users to fully
comprehend the concerns so that they can make relevant decisions while availing cloud computing
services.
Keywords: Cloud Computing; Security; Cloud Security Issues Taxonomy; Threat Matrix
INTRODUCTION
ecause a cloud is a collection of inter-connected and virtualized computers (Buyya et al., 2008), the
main enabling technology for cloud computing is virtualization. The basic concept of cloud is based
on the premise that instead of having selected information systems (IS) resources, such as software
and data stored locally on a user’s or organization’s computer systems, these resources can be stored on Internet
servers, called “clouds,” and accessed anytime, anywhere as a paid service on the Internet. Cloud computing has the
potential to bring significant benefits to small- and medium-sized businesses by reducing the costs of investment in
information communication technology (ICT) infrastructure because it enables the use of services, such as
computation, software, data access, and storage by end-users, without the need to know the physical location and
configuration of the system that delivers the services (Mujinga & Chipangura, 2011). However, it has been stated
that organizations adopt cloud computing projects and systems cautiously while maximizing benefits and
minimizing risks (Lawler, Joseph, & Howell-Barber, 2012). Cloud computing is expected to play .
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxjuliennehar
Trends in cloud computing
TRENDS IN CLOUD COMPUTING
ABSTRACT
Cloud computing involves the use of remote servers that are hosted on the Internet. The technology has been a game-changer in the world of technology as it has dramatically influenced the aspect of storing, processing, and also managing data. Besides, technology has witnessed a couple of trends that have attracted the attention of crucial technology players. In line with this, the paper will investigate the various trends in cloud computing.
Keywords: cloud computing, social networking, Security, IaaS, PaaS, SaaS.
INTRODUCTION
Cloud computing is one of the newest areas of interest in the world of computing. The technology entails the use of cloud services to store, manage, process, and even ensure that data is secure. Cloud computing involves the use of remote servers that are hosted on the Internet. As a result, the technology has seen an increased reduction of the use of physical servers and computers by companies in storing, managing, and also processing their data. In recent days, technology has witnessed several changes or, rather, trends that will be covered briefly in the paper. Cloud is a collective term for a massive number of possibilities and developments. It is more of a practical innovation than an invention that combines several other inventions to become something compelling and new. Cloud computing puts together and merges several technologies that already exist together, where they include virtualization, time-sharing, web interactivity, browser interface, and high bandwidth networks. Cloud computing helps companies and businesses to transform their initial existing server infrastructures to form a dynamic environment that leads to the expansion and reduction of the server’s capacity. A cloud computing platform, configures, depravations, and reconfigures the servers. Many issues arise firm adopting the cloud computing platform, and the articles below discuss some of the main issues associated with cloud computing.
LITERATURE REVIEW
Different studies, such as Varghese & Buyya (2018), recognize that cloud computing is one of the booming technologies. The technology has witnessed immense growth rates over the last couple of years. Notably, more companies and institutions continue to adopt cloud services. Besides, the use of Iaas, Paas as well as SaaS continues to increase.
Additionally, Varghese & Buyya (2018) express their optimism that the revenue earned from cloud technology will continue to grow. Also, cloud services will continue to advance. For instance, different companies have embarked on the process of adopting private and hybrid technologies, which are much significant in storing, processing, and also managing big company data. Cloud asserts that conceptually the "cloud" at the Internet conceals to be had computing resources and offers an elegant interface, through which customers might be capable of using the whole World Wide Web as a powerful personal ...
Netmagic talks about the increasing preference for hybrid cloud computing and why it is the future of IT. Know more information from Netmagicsolutions.com
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJECTawnaDelatorrejs
CAPSTONE PROJECT: LITERATURE REVIEW ASSIGNMENT 1
CAPSTONE PROJECT: LITERATURE REVIEW ASSIGNMENT 8
LITERATURE REVIEW ASSIGNMENT
Jerry L. Quarles
School of Engineering & Computer Science, Liberty University
Author Note
Jerry L. Quarles
I have no known conflict of interest to disclose.
Correspondence concerning this article should be addressed to Jerry L. Quarles.
Email: [email protected]
Table of Contents
Introduction 3
Problem Statement 5
Research Question(s) 8
Literature Review 9
Literature Review Findings and Gaps……………………………………………………………17
Conclusion 19
References 21
Appendix…..……………………………………………………………………………………..26
Error in red – not booked marked correctly
FAILED THIS ASSIGNMENT ALL THE WORK THAT IS MARKED THRU WAS PLAGARISM COPIED WORK!
Total word count needs to be 4000 words so you can use anything highlighted in yellow again to get a total of 4000 words!
Introduction
DO NOT USE MARKED THRU WORDS -Rapid advancements in modern technology have changed the digital landscape and increased the demand for secure internet and communication Technology and Cloud computing is one of them. Cloud computing has grown in popularity as a study and application field (Rashid, & Chaturvedi, 2019). A growing number of technology companies and manufacturing industries have started to implement cloud-based services or are planning to do so. Nonetheless, there are a few drawbacks to using public and or private cloud technologies. As a result, quite a few institutions are already using private cloud technologies. Day by day cloud computing is in growth as many organizations adopted cloud technology, but in parallel, several security issues are raised. Each organization chooses secure infrastructures when they move its data to remote locations. According to the NIST security, portability and interoperability are the major obstacles to the adoption of cloud computing.
Can Use Highlighted words
Our motivation for creating a new design of a hybrid architecture using key cloud technologies build a new private cloud platform for Amazon Inc. that requires high data availability at a low cost. Big data approaches relying on traditional data warehouses often pose latency problems, making them unsuitable for new data use cases (Hsu, Fox, and Min, 2019). Many cloud services are provided by a trusted third party which arises new security threats. The cloud provider provides its services through the Internet and uses many web technologies that arise new security issues. This paper discussed the basic features of cloud computing, security issues, threats, and their solutions. Additionally, the paper describes several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks.
When data is stored in remote storage, the cloud user loses control over the data, at this time consumers may not be conscious of the details of security policies, vulne ...
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
While use of the cloud today is generally associated with the ability to reduce costs and improve efficiency, widespread adoption of this technology is projected to have a transformative effect on all businesses of all sizes.
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
Review of Business Information Systems – Fourth Quarter 2013 Volume 17, Number 4
2013 The Clute Institute Copyright by author(s) Creative Commons License CC-BY 159
Dimensions Of Security Threats In Cloud
Computing: A Case Study
Mathew Nicho, University of Dubai, UAE
Mahmoud Hendy, University of Dubai, UAE
ABSTRACT
Even though cloud computing, as a model, is not new, organizations are increasingly
implementing it because of its large-scale computation and data storage, flexible scalability,
relative reliability, and cost economy of services. However, despite its rapid adoption in some
sectors and domains, it is evident from research and statistics, that security-related threats are the
most noticeable barrier to its widespread adoption. To investigate the reasons behind these
threats, the authors used available literature to identify and aggregate information about IS
security threats in cloud computing. Based on this information, the authors explored the
dimensions of the nature of threat by interviewing a cloud computing practitioner in an
organization that uses both the private and public cloud deployment models. From these findings,
the authors found that IS security threats in cloud computing must be defined at different levels;
namely, at the business and technical level, as well as from a generic and cloud-specific threat
perspective. Based on their findings, the authors developed the Cloud Computing Threat Matrix
(CCTM) which provides a two-dimensional definition of threat that enables cloud users to fully
comprehend the concerns so that they can make relevant decisions while availing cloud computing
services.
Keywords: Cloud Computing; Security; Cloud Security Issues Taxonomy; Threat Matrix
INTRODUCTION
ecause a cloud is a collection of inter-connected and virtualized computers (Buyya et al., 2008), the
main enabling technology for cloud computing is virtualization. The basic concept of cloud is based
on the premise that instead of having selected information systems (IS) resources, such as software
and data stored locally on a user’s or organization’s computer systems, these resources can be stored on Internet
servers, called “clouds,” and accessed anytime, anywhere as a paid service on the Internet. Cloud computing has the
potential to bring significant benefits to small- and medium-sized businesses by reducing the costs of investment in
information communication technology (ICT) infrastructure because it enables the use of services, such as
computation, software, data access, and storage by end-users, without the need to know the physical location and
configuration of the system that delivers the services (Mujinga & Chipangura, 2011). However, it has been stated
that organizations adopt cloud computing projects and systems cautiously while maximizing benefits and
minimizing risks (Lawler, Joseph, & Howell-Barber, 2012). Cloud computing is expected to play .
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxjuliennehar
Trends in cloud computing
TRENDS IN CLOUD COMPUTING
ABSTRACT
Cloud computing involves the use of remote servers that are hosted on the Internet. The technology has been a game-changer in the world of technology as it has dramatically influenced the aspect of storing, processing, and also managing data. Besides, technology has witnessed a couple of trends that have attracted the attention of crucial technology players. In line with this, the paper will investigate the various trends in cloud computing.
Keywords: cloud computing, social networking, Security, IaaS, PaaS, SaaS.
INTRODUCTION
Cloud computing is one of the newest areas of interest in the world of computing. The technology entails the use of cloud services to store, manage, process, and even ensure that data is secure. Cloud computing involves the use of remote servers that are hosted on the Internet. As a result, the technology has seen an increased reduction of the use of physical servers and computers by companies in storing, managing, and also processing their data. In recent days, technology has witnessed several changes or, rather, trends that will be covered briefly in the paper. Cloud is a collective term for a massive number of possibilities and developments. It is more of a practical innovation than an invention that combines several other inventions to become something compelling and new. Cloud computing puts together and merges several technologies that already exist together, where they include virtualization, time-sharing, web interactivity, browser interface, and high bandwidth networks. Cloud computing helps companies and businesses to transform their initial existing server infrastructures to form a dynamic environment that leads to the expansion and reduction of the server’s capacity. A cloud computing platform, configures, depravations, and reconfigures the servers. Many issues arise firm adopting the cloud computing platform, and the articles below discuss some of the main issues associated with cloud computing.
LITERATURE REVIEW
Different studies, such as Varghese & Buyya (2018), recognize that cloud computing is one of the booming technologies. The technology has witnessed immense growth rates over the last couple of years. Notably, more companies and institutions continue to adopt cloud services. Besides, the use of Iaas, Paas as well as SaaS continues to increase.
Additionally, Varghese & Buyya (2018) express their optimism that the revenue earned from cloud technology will continue to grow. Also, cloud services will continue to advance. For instance, different companies have embarked on the process of adopting private and hybrid technologies, which are much significant in storing, processing, and also managing big company data. Cloud asserts that conceptually the "cloud" at the Internet conceals to be had computing resources and offers an elegant interface, through which customers might be capable of using the whole World Wide Web as a powerful personal ...
Netmagic talks about the increasing preference for hybrid cloud computing and why it is the future of IT. Know more information from Netmagicsolutions.com
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJECTawnaDelatorrejs
CAPSTONE PROJECT: LITERATURE REVIEW ASSIGNMENT 1
CAPSTONE PROJECT: LITERATURE REVIEW ASSIGNMENT 8
LITERATURE REVIEW ASSIGNMENT
Jerry L. Quarles
School of Engineering & Computer Science, Liberty University
Author Note
Jerry L. Quarles
I have no known conflict of interest to disclose.
Correspondence concerning this article should be addressed to Jerry L. Quarles.
Email: [email protected]
Table of Contents
Introduction 3
Problem Statement 5
Research Question(s) 8
Literature Review 9
Literature Review Findings and Gaps……………………………………………………………17
Conclusion 19
References 21
Appendix…..……………………………………………………………………………………..26
Error in red – not booked marked correctly
FAILED THIS ASSIGNMENT ALL THE WORK THAT IS MARKED THRU WAS PLAGARISM COPIED WORK!
Total word count needs to be 4000 words so you can use anything highlighted in yellow again to get a total of 4000 words!
Introduction
DO NOT USE MARKED THRU WORDS -Rapid advancements in modern technology have changed the digital landscape and increased the demand for secure internet and communication Technology and Cloud computing is one of them. Cloud computing has grown in popularity as a study and application field (Rashid, & Chaturvedi, 2019). A growing number of technology companies and manufacturing industries have started to implement cloud-based services or are planning to do so. Nonetheless, there are a few drawbacks to using public and or private cloud technologies. As a result, quite a few institutions are already using private cloud technologies. Day by day cloud computing is in growth as many organizations adopted cloud technology, but in parallel, several security issues are raised. Each organization chooses secure infrastructures when they move its data to remote locations. According to the NIST security, portability and interoperability are the major obstacles to the adoption of cloud computing.
Can Use Highlighted words
Our motivation for creating a new design of a hybrid architecture using key cloud technologies build a new private cloud platform for Amazon Inc. that requires high data availability at a low cost. Big data approaches relying on traditional data warehouses often pose latency problems, making them unsuitable for new data use cases (Hsu, Fox, and Min, 2019). Many cloud services are provided by a trusted third party which arises new security threats. The cloud provider provides its services through the Internet and uses many web technologies that arise new security issues. This paper discussed the basic features of cloud computing, security issues, threats, and their solutions. Additionally, the paper describes several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks.
When data is stored in remote storage, the cloud user loses control over the data, at this time consumers may not be conscious of the details of security policies, vulne ...
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
While use of the cloud today is generally associated with the ability to reduce costs and improve efficiency, widespread adoption of this technology is projected to have a transformative effect on all businesses of all sizes.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
It auditing to assure a secure cloud computingingenioustech
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Cloud Computing Applications and Benefits for Small Businesses .docxclarebernice
Cloud Computing: Applications and Benefits for Small Businesses
Abstract
Cloud computing is one of the most talked about topics in the world of technology and entrepreneurship. Until now it has never been so easy for people, especially small business owner’s, to have the tools and resources readily available just one click away and at the fraction of the cost of the typical investment a few years back. Cloud computing offers cost-effective solutions at various levels that can be customize to meet the needs of anyone. Cloud computing can be thought of as a new found technology and this paper defines the concept of the cloud and provides a brief background of where most business are in regards to the use of this technology. This is then continued by describing the types of cloud currently available and potential use. The paper then presents a short but important section of cloud security issues and challenges. Finally, the paper discusses the benefits each of the different levels of cloud computing can provide small business.
Introduction
The use of cloud computing has grown exponentially in the last decade, according to Weins (2015) eight-four percent of enterprises that make use of such services in one way or another. Could computing by definition is internet-based computing, where by shared resources, software and information are provided to the end user as metered services much like a utility does(Bradley, 2014). For businesses in many cases could computing is use for IT solution purposes as it can provide IT-related capabilities as a service using internet technologies.
With the fast pace of today’s market businesses need to provide fast and reliable services to their customers in order to remain competitive. The concept of could computing is not something new as it uses existing technology and processes; however it can be consider new in sense that using these technologies has revolutionized the manner in which we host and cater services to customers. Startup companies and small businesses can take advantage of could computing to reduce spending on IT, be more adept to changes in the market, change scale and lower risk and cost.
Given the structural complexity of larger organization, Alijani (2014) states that it is essential for cloud computing to deliver rear value rather than serve as a platform for simple task. The need to deliver rear value is just as important for small businesses. For small businesses value is important but it’s their customer relationship and public image, flexibility and continuity. As such small business owners need to consider the benefits, drawback s and the effect of cloud computing on their organization before taking the decision to implement.
Types of cloud computing
There are three categories or levels cloud computing, this are: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Infrastructure as a Service (I ...
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Cloud Computing a leading and getting widely adopted technology in industry, unveils some unprecedented challenges to security of company’s resources such as capital and knowledge based assets. Hither to no much attention has been paid by the governments and there is neither any universal standard adopted, nor any breakthrough to take up these challenges. Traditional contracts and licensing agreements may not provide adequate legal resources and remedies normally associated with the layers of protection for corporations. Intellectual Property, Foreign Direct Investments (FDI) and corporate governance issues have to be fully explored and practiced in domestic and international markets. So this paper discusses the need of establishment of Law and judicial framework of policies to the services embedding cloud computing technology, besides this it also addresses legal issues and existing policies adopted by different countries.
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
Cloud computing refers to a location that allows us to preserve our precious data and use computing and
networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud
computing now provides us with powerful data processing and storage, exceptional availability and
security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost
efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that
promise to make it easier for a customer, organization, or trade to establish any type of IT business. We
compared a variety of cloud service characteristics in this article, following the comparing, it's
straightforward to pick a specific cloud service from the possible options by comparison with three chosen
cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not
only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest
some areas for further study.
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
In this paper, fast, efficient, simple and widely used
Set Partitioned Embedded bloCK based coding is done on
Multiple Descriptions of transformed image. The maximum
potential of this type of coding can be exploited with discrete
wavelet transform (DWT) of images. Two correlated
descriptions are generated from a wavelet transformed image
to ensure meaningful transmission of the image over noise
prone wireless channels. These correlated descriptions are
encoded by set partitioning technique through SPECK coders
and transmitted over wireless channels. Quality of
reconstructed image at the decoder side depends upon the
number of descriptions received. More the number of
descriptions received at output side, more enhance the quality
of reconstructed image. However, if any of the multiple
description is lost, the receive can estimate it exploiting the
correlation between the descriptions. The simulations
performed on an image on MATLAB gives decent
performance and results even after half of the descriptions is
lost in transmission.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
1Comparing Humanistic-Existential Psychotherapy with OthEttaBenton28
1
Comparing Humanistic-Existential Psychotherapy with Other Approaches
Caroline E Sam
NRNP 6645
Psychotherapy with Multiple Modalities
Assignment week 7
01/15/2022
This study source was downloaded by 100000806925124 from CourseHero.com on 04-18-2022 09:34:05 GMT -05:00
https://www.coursehero.com/file/128013930/Comparing-Humanistic-Existential-Psychotherapy-with-Other-Approaches-gwdocx/
https://www.coursehero.com/file/128013930/Comparing-Humanistic-Existential-Psychotherapy-with-Other-Approaches-gwdocx/
2
Comparing Humanistic-Existential Psychotherapy with Other Approaches
Psychologists have developed various theories on human psychology. The Humanist,
existential, and humanist existential models explain the personality changes. The models are
central in therapies as they define how people perceive and accept life challenges. The humanist
model emphasizes the innate goodness in people, while the humanist-existential psychotherapy
model argues that personalities change, and people can develop new attributes based on
circumstances.
Two models: Humanistic-existential psychotherapy and Humanist psychotherapy
Humanistic-existential Psychotherapy
Humanistic Existential Psychotherapy (HE) postulates that the human personality is
dynamic, and changes occur across the lifespan that defines personality at each point
(Hounkpatin et al., 2015). The model integrates humanistic and existentialist approaches. The
humanist perspective claims that human beings are good, while the existentialist proposes that
people are neither good nor bad (Daei Jafari et al., 2020). Integration of the two models creates a
dynamic person capable of actualizing based on situations and strengths. The model is adopted as
a transition from the traditional conception of personality as a stable element that remains
consistent throughout life. The HE models framework asserts that individuals confront and
challenge a meaningless life as they transform their lives into a personality they desire. The
person pursues self-rated health, self-efficacy, psychological turning point, and life satisfaction
that involves a subjective evaluation of an individual’s wellbeing (Hounkpatin et al., 2015).
These components keep an individual driven to improve their lives. Notably, societal norms and
This study source was downloaded by 100000806925124 from CourseHero.com on 04-18-2022 09:34:05 GMT -05:00
https://www.coursehero.com/file/128013930/Comparing-Humanistic-Existential-Psychotherapy-with-Other-Approaches-gwdocx/
https://www.coursehero.com/file/128013930/Comparing-Humanistic-Existential-Psychotherapy-with-Other-Approaches-gwdocx/
3
the pursuit of authentic individual-based life goals contribute to an individual’s personality
changes.
There is a constant drive to meet an expectation, which is addressed in the social
investment theory- an investment in institutions such as work, and marriage motivates
personality changes. Notably, the ...
1Comment by Perjessy, Caroline SubstanEttaBenton28
1
Comment by Perjessy, Caroline:
Substance use Anxiety Group Curriculum
Southern New Hampshire University
Clinical Mental Health Counseling Department, COU660
Dr. Caroline P.
Rationale for the group
In Massachusetts, we have several groups for substance use both such as AA meetings and , NA meetings that are held in most area areasjust not a sufficient amount. Some. So me groups are also held at treatment centers by alumni which is a great thing because it will provide members with great responsibility skills. Some of the groups like psychoeducation and 12 steps meetings are mainly for those who are going through andchallenges and have a past with substance use. I plan to hold a group not only for those who have been through it but also withhave family members that are looking for resources and better understanding of the disease. The need for substance use group in the Boston, MassMassachusetts community is in high demand. Although Boston is a wide community where the rent can be high and have good paying jobs, many still struggle s with the everyday life stressors that can lead to excessive drinking. In my community I believe that the need for substance use group can benefit so many specifically those in the poverty area, because they are dealing with these issues every day. Also, due to therapy being frown upon in their environment and some lack the ability to seek professional help. Although some may have the need but will not attend due to therapy being frown upon in their environment. Comment by Perjessy, Caroline: Make sure you are revising for clarity. I know you said this was a draft, so keeping that In mind Comment by Perjessy, Caroline: Revise for clarity
The purpose of substance use group is to help individuals who are have dealing with anxiety and have an underlining issue like anxiety. Substance use clients with underlining issues like anxiety lack coping skills and the ability to perform everyday tasks. Evidence by, the lack of motivation, traumatic event, exposure to violence, withdrawal, and continuing alcohol or drug use. However, the misuse of alcohol not only can lead to neurological as well as anxiety. Several individuals who are actively using have an underlining issue that has cause them to use excessively rather its depression, bipolar, or anxiety. I will be focusing mainly on anxiety. Anxiety can be something that several deal with in silent or out loud, those who have been impacted by the disease either way many are not getting the help they deservemerit. Especially those who have been impacted with the disease For example, not they feeling at time they are not good enoughenough, the uncertainty of their job,; and will they have their job back; doubts about being accepted back into their familywill they have a family after. Comment by Perjessy, Caroline: This is uinclear…how are they dealing with anxiety and have an underlying issue of anxiety?
All those factors are negative im ...
More Related Content
Similar to 1Chapter Two Literature ReviewStudents NameName of the
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
It auditing to assure a secure cloud computingingenioustech
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Cloud Computing Applications and Benefits for Small Businesses .docxclarebernice
Cloud Computing: Applications and Benefits for Small Businesses
Abstract
Cloud computing is one of the most talked about topics in the world of technology and entrepreneurship. Until now it has never been so easy for people, especially small business owner’s, to have the tools and resources readily available just one click away and at the fraction of the cost of the typical investment a few years back. Cloud computing offers cost-effective solutions at various levels that can be customize to meet the needs of anyone. Cloud computing can be thought of as a new found technology and this paper defines the concept of the cloud and provides a brief background of where most business are in regards to the use of this technology. This is then continued by describing the types of cloud currently available and potential use. The paper then presents a short but important section of cloud security issues and challenges. Finally, the paper discusses the benefits each of the different levels of cloud computing can provide small business.
Introduction
The use of cloud computing has grown exponentially in the last decade, according to Weins (2015) eight-four percent of enterprises that make use of such services in one way or another. Could computing by definition is internet-based computing, where by shared resources, software and information are provided to the end user as metered services much like a utility does(Bradley, 2014). For businesses in many cases could computing is use for IT solution purposes as it can provide IT-related capabilities as a service using internet technologies.
With the fast pace of today’s market businesses need to provide fast and reliable services to their customers in order to remain competitive. The concept of could computing is not something new as it uses existing technology and processes; however it can be consider new in sense that using these technologies has revolutionized the manner in which we host and cater services to customers. Startup companies and small businesses can take advantage of could computing to reduce spending on IT, be more adept to changes in the market, change scale and lower risk and cost.
Given the structural complexity of larger organization, Alijani (2014) states that it is essential for cloud computing to deliver rear value rather than serve as a platform for simple task. The need to deliver rear value is just as important for small businesses. For small businesses value is important but it’s their customer relationship and public image, flexibility and continuity. As such small business owners need to consider the benefits, drawback s and the effect of cloud computing on their organization before taking the decision to implement.
Types of cloud computing
There are three categories or levels cloud computing, this are: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Infrastructure as a Service (I ...
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Cloud Computing a leading and getting widely adopted technology in industry, unveils some unprecedented challenges to security of company’s resources such as capital and knowledge based assets. Hither to no much attention has been paid by the governments and there is neither any universal standard adopted, nor any breakthrough to take up these challenges. Traditional contracts and licensing agreements may not provide adequate legal resources and remedies normally associated with the layers of protection for corporations. Intellectual Property, Foreign Direct Investments (FDI) and corporate governance issues have to be fully explored and practiced in domestic and international markets. So this paper discusses the need of establishment of Law and judicial framework of policies to the services embedding cloud computing technology, besides this it also addresses legal issues and existing policies adopted by different countries.
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
Cloud computing refers to a location that allows us to preserve our precious data and use computing and
networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud
computing now provides us with powerful data processing and storage, exceptional availability and
security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost
efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that
promise to make it easier for a customer, organization, or trade to establish any type of IT business. We
compared a variety of cloud service characteristics in this article, following the comparing, it's
straightforward to pick a specific cloud service from the possible options by comparison with three chosen
cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not
only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest
some areas for further study.
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
In this paper, fast, efficient, simple and widely used
Set Partitioned Embedded bloCK based coding is done on
Multiple Descriptions of transformed image. The maximum
potential of this type of coding can be exploited with discrete
wavelet transform (DWT) of images. Two correlated
descriptions are generated from a wavelet transformed image
to ensure meaningful transmission of the image over noise
prone wireless channels. These correlated descriptions are
encoded by set partitioning technique through SPECK coders
and transmitted over wireless channels. Quality of
reconstructed image at the decoder side depends upon the
number of descriptions received. More the number of
descriptions received at output side, more enhance the quality
of reconstructed image. However, if any of the multiple
description is lost, the receive can estimate it exploiting the
correlation between the descriptions. The simulations
performed on an image on MATLAB gives decent
performance and results even after half of the descriptions is
lost in transmission.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Similar to 1Chapter Two Literature ReviewStudents NameName of the (20)
1Comparing Humanistic-Existential Psychotherapy with OthEttaBenton28
1
Comparing Humanistic-Existential Psychotherapy with Other Approaches
Caroline E Sam
NRNP 6645
Psychotherapy with Multiple Modalities
Assignment week 7
01/15/2022
This study source was downloaded by 100000806925124 from CourseHero.com on 04-18-2022 09:34:05 GMT -05:00
https://www.coursehero.com/file/128013930/Comparing-Humanistic-Existential-Psychotherapy-with-Other-Approaches-gwdocx/
https://www.coursehero.com/file/128013930/Comparing-Humanistic-Existential-Psychotherapy-with-Other-Approaches-gwdocx/
2
Comparing Humanistic-Existential Psychotherapy with Other Approaches
Psychologists have developed various theories on human psychology. The Humanist,
existential, and humanist existential models explain the personality changes. The models are
central in therapies as they define how people perceive and accept life challenges. The humanist
model emphasizes the innate goodness in people, while the humanist-existential psychotherapy
model argues that personalities change, and people can develop new attributes based on
circumstances.
Two models: Humanistic-existential psychotherapy and Humanist psychotherapy
Humanistic-existential Psychotherapy
Humanistic Existential Psychotherapy (HE) postulates that the human personality is
dynamic, and changes occur across the lifespan that defines personality at each point
(Hounkpatin et al., 2015). The model integrates humanistic and existentialist approaches. The
humanist perspective claims that human beings are good, while the existentialist proposes that
people are neither good nor bad (Daei Jafari et al., 2020). Integration of the two models creates a
dynamic person capable of actualizing based on situations and strengths. The model is adopted as
a transition from the traditional conception of personality as a stable element that remains
consistent throughout life. The HE models framework asserts that individuals confront and
challenge a meaningless life as they transform their lives into a personality they desire. The
person pursues self-rated health, self-efficacy, psychological turning point, and life satisfaction
that involves a subjective evaluation of an individual’s wellbeing (Hounkpatin et al., 2015).
These components keep an individual driven to improve their lives. Notably, societal norms and
This study source was downloaded by 100000806925124 from CourseHero.com on 04-18-2022 09:34:05 GMT -05:00
https://www.coursehero.com/file/128013930/Comparing-Humanistic-Existential-Psychotherapy-with-Other-Approaches-gwdocx/
https://www.coursehero.com/file/128013930/Comparing-Humanistic-Existential-Psychotherapy-with-Other-Approaches-gwdocx/
3
the pursuit of authentic individual-based life goals contribute to an individual’s personality
changes.
There is a constant drive to meet an expectation, which is addressed in the social
investment theory- an investment in institutions such as work, and marriage motivates
personality changes. Notably, the ...
1Comment by Perjessy, Caroline SubstanEttaBenton28
1
Comment by Perjessy, Caroline:
Substance use Anxiety Group Curriculum
Southern New Hampshire University
Clinical Mental Health Counseling Department, COU660
Dr. Caroline P.
Rationale for the group
In Massachusetts, we have several groups for substance use both such as AA meetings and , NA meetings that are held in most area areasjust not a sufficient amount. Some. So me groups are also held at treatment centers by alumni which is a great thing because it will provide members with great responsibility skills. Some of the groups like psychoeducation and 12 steps meetings are mainly for those who are going through andchallenges and have a past with substance use. I plan to hold a group not only for those who have been through it but also withhave family members that are looking for resources and better understanding of the disease. The need for substance use group in the Boston, MassMassachusetts community is in high demand. Although Boston is a wide community where the rent can be high and have good paying jobs, many still struggle s with the everyday life stressors that can lead to excessive drinking. In my community I believe that the need for substance use group can benefit so many specifically those in the poverty area, because they are dealing with these issues every day. Also, due to therapy being frown upon in their environment and some lack the ability to seek professional help. Although some may have the need but will not attend due to therapy being frown upon in their environment. Comment by Perjessy, Caroline: Make sure you are revising for clarity. I know you said this was a draft, so keeping that In mind Comment by Perjessy, Caroline: Revise for clarity
The purpose of substance use group is to help individuals who are have dealing with anxiety and have an underlining issue like anxiety. Substance use clients with underlining issues like anxiety lack coping skills and the ability to perform everyday tasks. Evidence by, the lack of motivation, traumatic event, exposure to violence, withdrawal, and continuing alcohol or drug use. However, the misuse of alcohol not only can lead to neurological as well as anxiety. Several individuals who are actively using have an underlining issue that has cause them to use excessively rather its depression, bipolar, or anxiety. I will be focusing mainly on anxiety. Anxiety can be something that several deal with in silent or out loud, those who have been impacted by the disease either way many are not getting the help they deservemerit. Especially those who have been impacted with the disease For example, not they feeling at time they are not good enoughenough, the uncertainty of their job,; and will they have their job back; doubts about being accepted back into their familywill they have a family after. Comment by Perjessy, Caroline: This is uinclear…how are they dealing with anxiety and have an underlying issue of anxiety?
All those factors are negative im ...
1
College Student’s Depression
Jasmin Linthicum
Course Discovery Writing
Professor Aguiar
Date Due 02/24/2022
College Student’s Depression
2
According to the World Health Organization (WHO), depression is a common and severe
health issue that affects how someone feels, thinks and acts. The most common symptoms of
depression are; having bad moods and feeling very sad, losing interest in the activities that were
once fun, loss of appetite, which in turn will lead to massive weight loss or gain that is not related
to dieting and difficulty in concentrating, thinking or making decisions (LeMoult & Gotlib, 2019).
People become depressed due to various factors; some of the significant social factors that
bring about depression include; encountering traumatic events, separation from parents or
caregivers and being bullied. Personality some people are inclined towards experiencing
depression. For instance, people who tend to hold worries, have a low-self-esteem, are
perfectionists and are very sensitive towards negative criticism naturally have a higher likelihood
of facing depression.
Depression throughout history has always been a health problem for people. According to
articles written by philosophers and writers throughout humanity's history, there is depression,
which is a health condition. The articles also include some of the continuous struggles that have
been made to find a solution on treating this condition. For instance, the ancient Greeks and
Romans had different thinking on depression. Some of the literature shows that the Greeks had a
notion that depression was a form of evil spirit possession and used exorcism techniques like;
beatings and starvation as "treatments" to cure a person. On the other hand, the Romans thought
depression was a combination of biological and psychological issues and employed gymnastics,
special diet, herbal medicine and music to treat the patients (Taquet et al., 2020).
In our present day, some of the startling statistics concerning depression are; depression
affects approximately one in fifteen adults, that is close to 6.8% annually, and a projection of an
estimated one in six persons will encounter depression at a given point in their life, that is around
Christian Aguiar
All of these statistics come from research, so you need to cite them using an in-text citation like we learned in class. Luckily, we're reviewing them again today (3/17).
Christian Aguiar
Christian Aguiar
This is another place where you need to cite your source. Which literature tells us this?
Christian Aguiar
I like the historical context, Jasmin. This could be a great way to begin the script for your video, too.
Christian Aguiar
Since this is an argument based on research - it draws on what scientists know about depression - you need to make it clear what the source is.
Christian Aguiar
Do you mean "personally, some people are inclined..." or perhaps that "some people's perso ...
1
Close Looking Analysis: Visual ArtArtist’s Self-Portrait AnalysisPoint Value: 80 pts possible
· 80 pts for submitting analysis of the short story to BSP:Assignments by 11:59pm at the end of Module 3—Part 5*
*The analysis assignment will be run through TurnItIn to look for plagiarism, so be sure to leave yourself enough time to review your paper’s “Originality Report” and make any necessary changes before the due-date.
Don’t forget that Tutoring services are available to you.
If you have any difficulty submitting the assignment on Brightspace, consult the Brightspace (BSP) Help Desk
The struggle is inner: Chicano, indio, American Indian, mojado, mexicano, immigrant Latino, Anglo in power, working class Anglo, Black, Asian—our psyches resemble the bordertowns and are populated by the same people. The struggle has always been inner, and is played out in the outer terrains. Awareness of our situation must come before inner changes, which in turn come before changes in society. Nothing happens in the “real” world unless it first happens in the images in our heads.
Gloria Anzaldúa, Borderlands/La Frontera: The New Mestiza (1987)
Introduction
In this part of Module 5, we have been exploring how visual artists and architects interact with borders in their work. Borders inherently establish defined points of view as well as remind us of the limitations and possibilities for transgressing those borders or living in the “borderlands” (Anzaldúa). Consider the images you viewed of the art, architecture, and design found at the physical borders between nations around the world. Could you imagine standing at these different borderlines or in the border spaces? Which borders can you step over? Where can you sit with someone on the other side? Where can you see across? Which ones are completely opaque? Which borders feel unsafe? They feel so different! How are they designed to feel or operate this way?
Then, consider artists and architects who explore borders as themes or principles in their work or who feel themselves to be operating in a border space? (see Marlin-Bennett, Maya Lin) Did any of the artists in our tours of Chicago’s public art use their work to highlight or bump up against the borders of a wall, a neighborhood, a community, the city?
Finally, we turn our attention to self, self-perception, and self-representation. How would you create a portrait of yourself? (Give it a try right now!) How do you express your internal spirit externally? In which ways do you intentionally “present” to the world and in which ways does the world layer an image on to you? When does creating your own image or own story act as resistance to a “single story” misperception? How can a self-portrait be powerful? Consider the story behind Artemisia Gentileschi’s Self-Portrait as the Allegory of Painting (see Mary Gerrard) and how she used dominant iconography of the time to render a feminist portrait. Almost every other artist you can think of or know personall ...
1
CLA1
Xueyao Dong
Westcliff University
INT 501 EF Concentration:
Purchasing and Human Resources
Professor: Dr. Julia Sherm
Octomber 20, 2021
2
Learning Objectives
This was my third semester at Westcliff University, and I explored a wide range of
helpful strategies and practical techniques that benefited my overall career and life balance.
For instance, the habit of professional journaling helps me release my stress and motivate
myself to keep on track towards my goal.
From week 3, I started to prepare the professional portfolio, and I felt it was an
excellent way to keep a record of my achievements and experiences. From week 5, the
interview exercise taken with the senior manager from my department, I have learned about
her personal experiences and know a little more about strategic leadership. Another valuable
material that I learned from this class is always to be prepared. Before I interview the senior
manager, I prepare additional questions to ask my supervisor and colleagues about my
performance. I was nervous during the interview, but these extra questions helped me come
down and make the conversion more smooth.
At the beginning of this semester, my goal was to improve my communication skills
in the workplace and learn how to be more flexible in dealing with incidents. From week six
course’s video, “I Wanna Be a Human Resources Officer - A Day in the Life of a Human
Resources Officer,” made me see some perspectives of the responsibility of a Human
Resources Officer and provided me some direction to improve my interpersonal skills. I
always find ways to improve my confidence when I communicate with people and learn how
to be an active listener.
Week seven’s video about “Internship Expectations vs. Realities- the Intern Queen”
makes me think about expectations and realities at the workplace. What expectation does the
employer look for, and how should I improve my performance regarding their expectation?
3
Additionally, through this semester, I realized different ways of conveying a message
could have other effects and impact communication effectiveness. During the internship, I
utilized the benefits of a supportive and positive environment.
Taking everything into account, I believe that I made significant progress towards my
goals, and I became more efficient and productive at work.
Internship Experiences
This semester I am considering switching to a new company that will allow me to
practice my professional skills in the area of individual and corporate taxes. Therefore, I
started my journey to submit job applications and prepare for an interview. Finding an
appropriate position that matches my interests and abilities is not an easy task. I felt frustrated
for the first few weeks when I did not get many responses. However, I record all my feelings
and things that I need to work on in my resume and cover letter in my journal. Additionally, I
love to write some inspirational and motivationa ...
1CJ 550 2-2 Milestone One Southern New HaEttaBenton28
1
CJ 550 2-2 Milestone One
Southern New Hampshire University
Destiny Nance
CJ 550
September 4th, 2022
CJ 550 2-2 Milestone One
A. What are the departments or subdivisions into which your selected organization is divided, and how do these subdivisions work together as a whole in relation to the mission of the organization?
Office of Programs and Re-entry is an organization that focuses on leadership alongside rehabilitative programs ensuring better lives within the community. The organization is divided into four central departments that work together to achieve a common goal. The first department is the Bureau of program development which focuses on the various designs and implementation of risks and needs assessment tools. It also implements other processes and policies key to the restoration alongside rehabilitation of justice to the affected individual within the surrounding.
The second is the department Bureau of Education, which deals with academic and career issues, including technical education and library services (Bell et al., 2018). The third department is the Bureau of Substance Use Treatment which is helpful in dealing with services assisting in the transition period between incarceration and the return to society. The other department is the Bureau of Chaplaincy services dealing with spiritual matters on inmates and offenders. The last department is volunteering with the FDC to assist in a rewarding experience for the citizens. All the departments work together to achieve the organizational goal and mission in leadership and rehabilitation programs that assist the community. Every department has strict policies that make it possible to ensure that it helps the organization achieve its mission.
B. Describe your selected subdivision, and outline the specific goals and responsibilities of the subdivision, describing how they align with the overall mission of the agency. Consider how the goals of the selected subdivision align with the mission of the agency.
The correction officers have a specific function: protecting the community by leading and supervising offenders and reporting the individual who has failed to comply with the regulations to sentencing. Alongside the organizational mission, the correction subdivision has its designed mission. Its mission is to deliver effective service to the community by service diligently while collaborating with other agencies of the criminal justice community (Bell et al., 2018). As such, it serves the community without violating their rights. The detention department ensures people's safety within the community by protecting the surrounding society in various ways, such as establishing safe, secure, and human supervision. It also provides the confinement of inmates by making them follow the law without violation.
However, the subdivision is faced with challenges like the overpopulation of inmates. The inmates are flocked within the organization, thus posing a chall ...
1CLA 1Every organization aims at achieving a cerEttaBenton28
1
CLA 1
Every organization aims at achieving a certain level of performance when it comes to the profitability of the organization. The sales force in any organization is very instrumental towards the performance of an organization as they help push the sales of an organization to the desired level. Organizations must see the value that the salespersons bring to the organization as this impacts the motivation and the productivity of the salespersons (Kuvaas et al., 2017). When a sales team feels that there is value to an organization then they become engaged in their work and perform well. Organizations can show that they value the salespersons by involving them in decision-making, paying them well, and also recognizing achievements.
Skill sets refer to the various abilities and abilities that an individual employee has that enable them to perform according to expectations in an organization. The skill sets vary from the type of sales employee; a salesperson needs more persuasion skills while a sales manager might need more communication skills and leadership skills (Kuczmarski & Kuczmarski, 2019). An organization can ensure that it has the right skill set by ensuring that the recruitment process is thorough and looks at the practical skills of employees as well.
Global sales refer to the sales that an organization makes outside the country where it is located. Global sales skills are important in ensuring that an organization can effectively penetrate an outside market. Global sales skills include understanding the cultural differences and the language of the target nation. A sales team needs to understand what is offensive in other nations such as gestures, body language so that they do not put off customers (Cuevas, 2018). The global sales skill needed by sales managers includes effective communication and an understanding of the trade regulations in different countries. They need to be able to contact customers remotely and manage sales teams in different locations.
The performance of any organization is important as it is an indicator of growth and progress in an organization. When it comes to the performance of employees it is directly related to the rewards system in an organization. Employees need to be motivated to put in extra work in the organization and the easiest way for an organization to motivate employees is to make them feel that they are appreciated and their efforts are recognized. Employees and particularly sales employees work in teams when the performance appraisal is done, it is important that the best-performed employees are rewarded (Asaari et al, 2019). When this is done the other members of the team will be inspired and motivated to increase productivity. An increase in the productivity of an employee translates to the performance of an organization in terms of sales and profitability.
Rewards are multidimensional and exist in different forms and categories in different organizations. The two broad categ ...
1Child Development Observation and ReflectionEttaBenton28
1
Child Development: Observation and Reflection
Lua Shanks
Dr. Edwards
Child Development: Observation and Reflection
80MOD 2 ASSIGN 2
06-27-2021
Child Development: Observation and Reflection
The observation data that I gathered and the process that I used to observe significantly informed my ability to conduct observations in the field. For instance, I learned the most important steps in observation such as familiarizing myself with the subjects and taking note of all the activities that take place since they are all useful in the final analysis. The observation data made me realize the value of being keen during field observations so that no detail is left out.
Some of the questions that emerged during the observation process about the children in the media are whether children have similar developmental capabilities and whether play can be used to rectify a child’s developmental delays. The overall experience of observing made me question teachers’ ability to understand all the unique aspects of child development and how they use them to create unique and engaging learning activities. I experienced the challenge of remaining objective since my personal feelings were consistently influenced by judgments and observations.
As I reflect on the observation process and the overall experience, the question that arises is how infants and young children can exhibit an interest in problem-solving yet their mental faculties have not fully developed. The question exposes the complexity of cognitive development in children since it reveals that children develop cognition from social, emotional, and perceptual experiences.
I would like to know the cognitive capabilities of the children I observed by having one on one sessions with them so that I could test their abilities. I believe that intelligence varies not only in adults but also in children an indication that a child’s developmental milestones are unique and different from that of another child. The only similarities are the age of occurrence for each developmental milestone.
The data that I obtained during my observations deepened my understanding of children’s development and learning. I realized that the developmental domains are interlinked since the development of one domain builds onto another domain. For instance, the development of the social and emotional domains contributes to the emergence of the cognitive domain. I realized that the domains do not operate in isolation but instead strengthen each other as the child develops. I also learned that the environment plays a significant role in a child’s development. For instance, when a child grows up i ...
1
CHAPTER
4
BUSINESS-LEVEL STRATEGY
Chapter 2
The External Environment
Chapter 3
The Internal Organization
Vision
Mission
Chapter 4
Business-Level Strategy
Chapter 5
Competitive Rivalry and Dynamics
Chapter 6
Corporate-Level Strategy
Chapter 7
Merger and Acquisition Strategy
Chapter 8
International Strategy
Chapter 9
Cooperative Strategy
Strategy formulation
Strategic Competitiveness
Above-Average Returns
Chapter 10
Corporate Governance
Chapter 11
Organizational Structure and Controls
Chapter 12
Strategic Leadership
Chapter 13
Strategic Entrepreneurship
Strategy implementation
Analysis
Strategy
Performance
The Strategic Management Process
A-S-P model
Chapter 4:
BUSINESS-LEVEL STRATEGY
Chapter overview:
Defining business-level strategy
Customers: their relationship with business-level strategies
The purpose of a business-level strategy
Types of business-level strategies (link with Value chain and 5 forces)
3
Introduction
Strategy – increasingly important to a firm’s success and concerned with making choices among two or more alternatives. Choices dictated by
External environment
Internal resources, capabilities and core competencies
Examples from gaming industry (King Digital Entertainment vs. EA)
4
Introduction
Business level-strategy – integrated and coordinated set of commitments and actions the firm uses to gain a competitive advantage by exploiting core competencies in specific product markets
Generic strategy – a strategy that can be used by any organization competing in any industry
5
Introduction
6
A firm must use a Business Level Strategy
It is not necessary to use all the corporate level strategies, acquisition, restructuring, international…
From the dry cleaner to the multinational corporation – a firm must choose at least one business-level strategy
The business level strategy is the core strategy - the strategy that the firm forms to describe how it intends to compete in the product market
Introduction
7
In terms of customers, when selecting a business-level strategy the firm determines:
who will be served,
what needs those target customers have that it will satisfy, and
how those needs will be satisfied
Customers: Their Relationship with Business-Level Strategies
8
8
Strategic competitiveness results when firm can satisfy customers by using its competitive advantages
Returns earned are the lifeblood of firm
Most successful companies satisfy current customers and/or meet needs of new customers
Customers: Their Relationship with Business-Level Strategies
9
Five components in customer relationships
1. Effectively managing relationships with customers
Deliver superior value
Strong interactive relationships is foundation
2. Reach, richness and affiliation
Access and connection to customers
Depth and detail of two-way flow of information between firm and customer
Facilitating useful interactions with customers – viewing the world from the customer’s eyes
9
...
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBREttaBenton28
1
CHEMICAL, BIOLOGICAL,
RADIOLOGICAL AND NUCLEAR
(CBRN) TERRORISM IN
HISTORICAL CONTEXT
The attacks on the World Trade Centre and the Pentagon on 11 September
2001 (9/11) came as a complete surprise, but should not have been
unanticipated. Throughout the 1990s terrorism analysts from both inside
and outside government had been arguing that it was only a matter of time
before the first act of mass destruction terrorism. Yet threat assessments
had increasingly focused on acts of mass destruction terrorism involving
CBRN weapons. This raises questions about why attention was focused on
CBRN weapons when there was a greater potential threat from other forms
of attack. The starting point in searching for the answer to that question is
the history of CBRN terrorism, coupled with the nature of the public and
political debates that have surrounded it. This historical narrative shows that
some terrorist groups in the latter part of the twentieth century have always
been interested in CBRN weapons, with the first decade of significant
terrorist interest in CBRN terrorism being the 1970s.
CBRN Terrorism in the 1970s
Terrorism in the 1970s was dominated by ethno-nationalist separatist or
independence groups such as the Palestine Liberation Organization (PLO)
and the Irish Republic Army (IRA) in Northern Ireland. It was also the
decade when radical left- and right-wing political groups in Western Europe
such as the Red Army Faction (RAF) also known as the Baader-Meinhof
C
o
p
y
r
i
g
h
t
2
0
1
1
.
I
.
B
.
T
a
u
r
i
s
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 9/8/2021 10:11 PM via AMERICAN PUBLIC UNIVERSITY SYSTEM
AN: 355536 ; Benjamin Cole.; The Changing Face of Terrorism : How Real Is the Threat From Biological, Chemical and Nuclear Weapons?
Account: s7348467.main.ehost
6 The Changing Face of Terrorism
gang, and the Red Brigades were operating at their peak. Despite the high
levels of terrorist violence, particularly in the Middle East, security debates
in the West were dominated by the Cold War. Concerns about terrorism
and ethno-nationalist guerrilla movements assumed significance primarily
because of concerns that the Soviet Union was using them as proxies to
de-stabilize democratic regimes and spread communism.
Against this background of heightened terrorist activity, there was
significant, albeit limited, interest among some terrorists groups in using
CBRN weapons. These incidents can be divided into three broad groups:
those where there was a threat to use CBRN weapons but no evidence
that the group involved actually possessed them; incidents where a gro ...
1Child Growth and DevelopmentYohana MangiaficoHousEttaBenton28
1
Child Growth and Development
Yohana Mangiafico
Houston Community College
TECA 1354: Child Growth and Development
Linda Jones
March 26, 2022
Linda Jones
57280000000003184
Add one more space between the title and your name.
Linda Jones
57280000000003184
Add the department name.
2
My neighbor’s son is a seven-year-old child who has progressed to second grade and is
becoming less reliant on his parents. He is a bright and athletic child who can ride a bike, roller
skate, and play badminton and table tennis. The child is attentive and can read, recount stories,
and do puzzles with ease. He is physically fit, standing 3 feet 12 inches tall and weighing 24
pounds. The body of a child grows and changes as it prepares to become an adult (Papalia &
Martorell, 2018). Seven years is a remarkable age, especially for boys, because it marks the end
of the newborn years and the beginnings of adulthood. He is, nevertheless, going through a
seven-year crisis, a period of change in which the child gains a new perspective on the world. It
enables him to advance to the next stage of his growth. Both at home and on the playground, the
observation was made. This case study is based on observing and analyzing changes in a seven-
year-old boy's physical, psychosocial, emotional, and cognitive development.
The boy spends roughly an hour and a half every day on the playground. He interacts
with the kids, runs with them, jumps, plays the ball, and hangs from the crossbar. The muscles of
the legs, arms, chest, and back are all actively developed, according to the findings. He grows
tough and robust, and he can walk for several kilometers. He can change the speed of his
movement by running slowly or swiftly. He can hop over minor barriers and shift direction
without slowing down while in motion. He can jump forward, up, to the sides, and over tiny
obstacles on one foot. He climbs up and down the stairwell and the rope ladder with ease. The
child has no developmental limitations and can readily hang from the crossbar. He also has no
trouble socializing and communicating with his classmates and other youngsters on the
playground.
Observing him on the playground, it is apparent that the child has reached a high degree
of physical development. He develops strength, endurance, and dexterity needs constant
Linda Jones
57280000000003184
Add the heading for Physical Development
Linda Jones
57280000000003184
informal
Linda Jones
57280000000003184
Yohana, the introduction should be like those in the Observation papers.
Linda Jones
57280000000003184
Title of the Paper
Linda Jones
57280000000003184
7
Linda Jones
57280000000003184
Only report what you actually see the child do, or what the parents/guardians/teacher report.
Linda Jones
57280000000003184
No opinions. Opinions are allowed in the summary portion.
3
exercise. While participating in sports, he understands and respects the rules of team games as
we ...
1
CHAPTER
2
THE EXTERNAL ENVIRONMENT:
OPPORTUNITIES, THREATS, INDUSTRY COMPETITION
AND COMPETITOR ANALYSIS
Opening remarks
Company’s strategic actions are affected by
External environment
Internal environment
External environment is the source of:
Opportunities
Threats
The need for monitoring and analyzing external environment
The pace of change
Complexity
Uncertainty
2
The general, industry and competitor
analysis
3
General environment – broader society dimensions ( 7 dimensions)
Demographic, economic, political/legal, sociocultural, technological, physical and global
Out of firm’s control so must monitor and gather information
Industry environment – factors in competitive environment
Threat of new entrants, power of suppliers, power of buyers, threat of product substitutes, intensity of rivalry among competitors
Firm must assess industry’s opportunities for profit potential
Competitor analysis or competitive intelligence – the way firm’s can gather and analyze information on the industry competitors
Identifying their actions, responses and intentions
These three analyses influence and are influenced by the firm’s vision, mission and strategic actions
The general, industry and competitor environments
4
Three External Environments include:
General
Industry
Competitor
Segments of the general environment
5
DEMOGRAPHIC
Population size
Geographic distribution
ECONOMIC
Nature and direction of the economy in which a firm competes or may compete
SOCIO-CULTURAL
Refers to potential and actual changes in the physical environment and business practices that are intended to positively respond to and deal with those changes
Age structure
Ethnic mix
Income distribution
POLITICAL/LEGAL
PHYSICAL
TECHNOLOGICAL
GLOBAL
Arena in which organizations and interest groups compete for attention, resources, and a voice in overseeing the body of laws and regulations guiding the interactions among nations as well as between firms and various local governmental agencies
Concerned with a society's attitudes and cultural values
Includes the institutions and activities involved with creating new knowledge and translating that knowledge into new products, processes, and materials
Includes relevant new global markets, existing markets that are changing, important international political events, and critical cultural and institutional characteristics of global markets
External environmental analysis
6
The objective of this analysis is identification of
Opportunities and
Threats
Opportunity – a condition in the external environment that helps a company achieve strategic competitiveness, if exploited
Threat – a condition in the external environment that may diminish company’s efforts towards achieving strategic competitiveness
The four-step process includes
Scanning
Monitoring
Forecasting
Assessing
1. Scanning
Studying all the segments of the general environment
Early signals of changes an ...
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (EttaBenton28
1
CHAPTER 6: CHINA
China
Book Reference
Terrill, R. J. (2016). World criminal justice systems: A comparative survey. Routledge.
Concepts to Know
· Kuomintang
· Cultural Revolution
· Deng Xiaoping
· National People’s Congress
· Standing Committee
· The “Mass Line”
· Ministry of Public Security
· Residents’ Committees
· Criminal Detention
· Adjudication Committees
· Political-legal Committees
· Supreme People’s Court
· Basic People’s Courts
· Procuratorate
· People’s Assessor
· Confucians
· Legalists
· Compulsory Measures
· Administrative Regulations
· Labor Camps
· Death Penalty
· Bang-jiao
Introduction
CHINA is an ancient country that has one of the oldest civilizations on earth. Its written history is almost 4,000 years old, and throughout much of its existence, its cultural traditions have had a profound impact on the entire East Asian region. China occupies much of the mainland of East Asia and shares land borders with 14 countries (Afghanistan, Bhutan, India, Kazakhstan, Kyrgyzstan, Laos, Mongolia, Myanmar, Nepal, North Korea, Pakistan, Russia, Tajikistan, and Vietnam). With a geographical area of about 3.7 million square miles, China is slightly larger than the United States (see Figure 6.1). Among the countries of the world, only Russia and Canada are larger in area. Unlike the United States, where almost 20 percent of the land is utilized for agriculture, China cultivates around 10 percent of its land on a permanent basis.
Because of rugged and inhospitable geographical conditions, particularly in the western regions, large areas of China are uninhabited. As a result, approximately two-thirds of the population live along the east coast, which represents about one-fifth of the land. China has long held the distinction of having the world’s largest population at more than 1.3 billion. This figure is greater than the combined populations of Europe, Russia, and the United States. More than 91 percent of the people belong to the Han ethnic group. All of the other ethnic minorities represent less than 1 percent of the population, with the exception of the Zhuang minority at 1.3 percent of the total population.
Approximately 31 percent of the labor force is employed in agriculture and forestry, with industrial and service ventures employing 30 and 36 percent, respectively. Iron, steel, and textiles are among the more prominent industries. In 1978, Chinese leaders initiated a program to modernize agriculture, industry, science and technology, and national defense. Their goal was to achieve a fairly advanced industrialized country by the year 2000. This program was prompted, in part, by the fact that the standard of living had been in a considerable state of decline since the 1950s.
Throughout China’s more recent political history under communism, the state essentially owned the industrial enterprises and commercial ventures of the country. Because people were guaranteed life-long employment, concerns about workforce productivity had been negl ...
1Chapter 9TelevisionBroadcast and Beyond2EttaBenton28
1
Chapter 9
Television:
Broadcast and Beyond
2
Sinclair Broadcast Group
Family run group of 173 stations in 81 markets; affiliated with Fox, ABC, CBS, NBC and Univision
Questions about corporate “must run” messages sent to affiliates brought company into the news
3
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
3
Sinclair Broadcast Group
Required broadcast of conservative commentaries
Biggest controversy was script complaining about “fake news” sent out to all stations to be recorded by local anchors
4
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
Invention of Television
Philo T. Farnsworth
1922: diagrams plans for television at age 16
1930: receives patent cathode ray tube
RCA attempted to promote its own Vladimir Zworykin as inventor of TV
1947: Farnsworth’s television patent expires just before TV starts to take off
5
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
5
Beginning of Broadcast Television
1939: NBC starts broadcasting, most sets in bars, restaurants
1942: TV manufacturing suspended for duration of WW II; most stations go off air
Licensing of new TV stations suspended 1948–1952, leaving many cities without television
6
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
6
Lucy & Desi End Live TV
1951: Lucille Ball and Desi Arnaz create I Love Lucy
One of the first sitcoms to be filmed, rather than live
Lucy and Desi hold onto syndication rights to the show, still being broadcast today
7
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
7
Color Television
1950s: early experiments in color television
1965: Big Three networks broadcasting in color
NBC peacock logo designed to tell B&W viewers show was in color
Early color TVs cost equivalent of big screen TVs today
8
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
8
Beginning of Cable Television
Community antenna television (CATV)
Early form of cable television used to distribute broadcast channels in communities with poor television reception
Relatively expensive, was source of a good TV signal, not additional programming
9
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
9
Rebirth of Cable
By mid-1970s, FCC began loosening rules on cable companies
1975: HBO starts providing programming nationwide, sending signal to local cable companies via satellite
Key point: HBO could send programming to 1,000 cable companies as cheaply as to one
10
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
10
Ted Turner – Cable Pioneer
1963: inherits failing billboard company from father
1970: buys Channel 17 in Atlanta
Buys Atlanta Braves and Hawks sports franchises to provide programming for channel
Turns Channel 17 into Superstation WTBS in 1976, takes local station national
11
Hanson, Mass Communication: Living in ...
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.EttaBenton28
1
CHAPTER 5: RUSSIA
Russia
Book Reference
Terrill, R. J. (2016). World criminal justice systems: A comparative survey. Routledge.
Concepts to Know
· Marxism–Leninism
· Mikhail Gorbachev
· Democratization
· Constitution of the Russian Federation
· President of the Russian Federation
· Federal Security Service (FSB)
· Propiska
· Constitutional Court of the Russian Federation
· Judicial Department
· Procuracy
· Defense Counsel
· Justices of the Peace
· Jury
· Material Definition of Crime
· Measures of Restraint
· Plea Bargaining
· Ministry of Internal Affairs (MVD)
· Commission on Juvenile Affairs
Introduction
THE LONGEST-RUNNING social science experiment of the twentieth century officially ended on December 25, 1991, with the resignation of Mikhail Gorbachev as president of the Soviet Union. From the Bolshevik Revolution of 1917 until Gorbachev’s resignation, the rulers of the Soviet Union had attempted to create a communist society that would be the envy of the world. Support for this goal was continual for more than 70 years, but the sense of purpose and direction began to unravel during the late 1980s. The principal cause for this shift in opinion was Gorbachev’s alternative rationale for achieving socialism. Although his ideas were a radical departure from some of the basic tenets of Leninism, Gorbachev generally favored implementing them incrementally. Nevertheless, disaffection with these ideas became quite pronounced among devoted communists, which led to the attempted coup of August 1991. This was followed by Gorbachev’s resignation and the formal dissolution of the country by year’s end.
The Soviet Union had been composed of 15 republics: Armenia, Azerbaijan, Byelorussia, Estonia, Georgia, Kazakhstan, Kirghizistan, Latvia, Lithuania, Moldavia, Russia, Tadzhikistan, Turkmenistan, Ukraine, and Uzbekistan. Russia was not only the largest republic in terms of territory and population, but it also dominated the policies of the Soviet Union—so much so that the words Russian and Soviet were often used interchangeably when referring to the foreign and domestic policies of the Soviet Union. Today, Russia is the largest country in the world, almost twice the size of the United States. It encompasses more than 6.5 million square miles that stretch from Eastern Europe through the northern half of Asia. The population of about 139 million has become more urban over the past 50 years. In fact, it has reached about 80 percent of the population— almost an exact reversal of the urban and rural ratio at the time of the 1917 Revolution (see Figure 5.1).
Russia is a federation consisting of six categories of administrative units. These include 21 republics, nine territories, 46 provinces, two federal cities, one autonomous republic, and four autonomous regions. Among these administrative units, the republics have the greatest claim to self-government. Although Russians comprise more than 80 percent of the country’s population, there are some 126 national ...
1Chapter 6Newspapers and the NewsReflections of aEttaBenton28
1
Chapter 6
Newspapers and the News:
Reflections of a Democratic Society
2
When Is It News That an Entire City
Is Being Poisoned By Its Water Supply?
City of Flint, Mich., had high levels of lead in its water after changing from lake to river water
Local journalists say they were slow to respond because officials said water was ok
But local journalists eventually drove the story to receive national attention
3
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
National journalists saw it as heartland story, followed national stories instead
Communities depend on local journalism for news about important local occurrences
When Is It News That an Entire City
Is Being Poisoned By Its Water Supply?
4
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
Early Newspapers
1618: Curanto, published in Amsterdam, is first English-language newspaper
1622: newspapers being published in Britain, distributed through coffeehouses
Followers of church reformers John Calvin and Martin Luther among earliest publishers
5
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
5
Colonial Publishing
1690: Publick Occurrences, first paper published in American colonies
Colonial newspapers subject to British censorship
6
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
6
Colonial Publishing
1721: New England Courant
Published by James Franklin, Ben’s older brother
First paper published without “By Authority” notice; James sent to prison for doing so, Ben takes over publishing paper
7
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
7
Early American Newspapers
Audience primarily wealthy elite
Published by political parties
Focused on opinion, not news
Expensive and had small circulation
Generally bought by prepaid subscription
8
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
8
Penny Press Revolution
Benjamin Day’s idea: The New York Sun – “It shines for all”
Sold on the street for one or two cents
Supported primarily by advertising
9
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
9
Penny Press Revolution
First papers to shift focus on news
Journalistic objectivity developed as a way to appeal to larger audiences
Rise of working class supported penny press growth
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
10
10
A Modern Democratic Society
Rapidly growing number of papers
Growing number of people working for wages
U.S. transforming from rural to urban society
Expanding interest in national and global events
Newspapers promoted democratic market society
People acquire the news “habit”
11
Hanson, Mass Communication: Living in a Media World, 7e
SAGE Publishing, 2019
11
Newspaper Wars: Hearst vs. Pulitzer
Joseph Pulitzer’s New York World
Creation of the front page
Often staged sensational ...
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·EttaBenton28
1
CHAPTER 4: SOUTH AFRICA
South Africa
Concepts to Know
· Afrikaner
· Apartheid
· Natives Land Act (1913)
· African National Congress
· National Party
· Group Areas Act (1950)
· Nelson Mandela
· Freedom Charter (1955)
· Truth and Reconciliation Commission
· Ubuntu
· National Assembly
· Public Protector
· Independent Police Investigative Directorate
· S v. Makwanyana (1995)
· Judicial Service Commission
· Law Reform Commission
· Constitutional Court
· Advocates
· Assessors
· Inspecting Judge
· NICRO
· Child Justice Act (2008)
Introduction
SOUTH AFRICA encompasses the southern tip of the African continent. It is the ninth largest country on the continent and the thirty-third largest in the world. Its northern border is shared with Namibia, Botswana, Zimbabwe, Mozambique, and Swaziland. Its coastline borders the Indian Ocean on the east and south and the Atlantic Ocean on the west. In addition, South Africa surrounds the small country of Lesotho, which is approximately the size of the state of Maryland. Lesotho is a constitutional monarchy that gained its independence from the United Kingdom in 1966 (see Figure 4.1).
The population of South Africa is almost 53 million and consists of 79.5 percent black, 9 percent white, 9 percent “colored,” and 2.5 percent Asian or Indian residents. The use of the word “colored” in the South African context refers to people of mixed race and often is associated with people of African and Dutch ancestry. The principal industries of the country are minerals, mining, motor vehicles, and machinery. South Africa is a significant producer of platinum, manganese, gold, and chrome. Its major trading markets include China, Germany, the United Kingdom, and the United States.
South Africa has 11 official languages: Afrikaans, English, isiNdebele, isiXhosa, isiZulu, Sepedi, Sesotho, Setswana, siSwati, Tshivenda, and Xitsonga. With the exception of Afrikaans and English, the other languages are all Bantu languages. Bantu languages are spoken by more than 100 million Africans in east, central, and southern Africa. Afrikaans is a seventeenth-century variation of Dutch that has been considered a distinct language since the nineteenth century. Approximately 7 percent of the South African population are Afrikaners, that is, people who trace their roots to the early Dutch, French, and German settlers. Most of the English spoken is by nonwhites, along with approximately 2 million English-speaking whites who trace their ancestors to British immigrants and to the 1 million people of Asian/Indian origins.
Throughout the second half of the twentieth century South Africa was associated most with its policy of apartheid, a white supremacist ideology that emphasized white domination and racial discrimination. More will be said about apartheid shortly. First, an outline is offered of the arrival of white Europeans to this part of Africa and the pre-apartheid policies of racial segregation that had been introduced and in practice for a num ...
1Chapter 3 JAPANIntroductionJAPAN is an island countrEttaBenton28
1
Chapter 3: JAPAN
Introduction
JAPAN is an island country located off the eastern coast of the Eurasian continent. It is generally considered a small country, in part because its geographical proximity to China and Russia dwarfs its size. However, compared to western European countries, Japan’s 145,902 square miles make it larger than England or Italy. In terms of the United States, it is slightly smaller than the state of California (see Figure 3.1). Japan’s population of 126.5 million is more than twice that found in England, and they are among the world’s most literate people. It is also interesting to note that Japan’s population is growing older faster than any other country in the world. This fact raises a host of economic and social issues for the country’s future. Because the terrain is very mountainous and the habitable land limited, Japan is one of the most densely populated regions in the world.
Although the climate is conducive to farming, less than 15 percent of the land is fertile enough for agriculture. Fishing has long been a significant source of income, but the attention Japan receives regarding its economy generally centers on its industrial production. Before the middle of the nineteenth century, Japan was one of the most isolated countries in the world, and this insular position was by design. The political leadership realized, however, that it could no longer maintain that posture completely. As a result, the leaders made a conscious decision to industrialize. Although the country is not rich in mineral deposits, Japan has emerged as an industrial giant since World War II. Japan is unique in that it is the only non-Western country that has become completely industrialized, exporting a wide range of products that include motor vehicles, electronic equipment, and mechanical tools.
Like the Scandinavians, the Japanese have remained one of the most homogenous of the advanced peoples in the world. More than 98 percent of the population is Japanese, and the largest minority group is Korean. The Japanese have a common history, language, and race. The dominant religions are Shintoism and Buddhism, but these are viewed more as features of Japanese custom than as beliefs that attract devoted followers. It has been estimated that between 70 and 80 percent of the people do not practice any religion. The homogenous qualities of the Japanese are enhanced further by their insular society and entrepreneurial spirit. This may appear somewhat contradictory from a Western perspective, but it is an example of a curious blending of the country’s traditions with modern pragmatism.
The Japanese recognized the value of expanding their trade routes and introducing industrialization to an economy that for centuries had been based on feudal principles. Because of their commitment to this change, the Japanese are recognized today for a competitive spirit that had long been associated with capitalist countries in the West. However, it is a group ...
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
1Chapter Two Literature ReviewStudents NameName of the
1. 1
Chapter Two: Literature Review
Student's Name
Name of the Institution
Course Number and Name
Professor
Due Date
Privacy Issues in Multi-Tenant Cloud Computing
Chapter Two: Literature Review
Introduction
A multitenant cloud is a cloud computing architecture that
allows customers to share computing resources in a public or
private cloud. Multitenant involves different cloud computing
clients using or transferring a single computing infrastructure.
This arrangement exposes the clients who have agreed to
various privacy issues relating to their data and information
stored in the cloud (Al-Ruithe et al., 2018). Evidence indicates
that some of the privacy issues involved in multitenant cloud
computing include data leakage, data breach, and exposure of
the private data relating to clients involved in the agreement. As
the number of people using cloud computing balloon, privacy
issues are becoming a significant problem for many consumers
who use the same cloud computing architecture in a private or
public setting. It is essential to define what multitenant cloud
entails before developing a clear concept or problem that can be
investigated. According to Park et al. (2018), "A multitenant
cloud is a cloud computing architecture that allows customers to
2. share computing resources in a public or private cloud" (Park et
al., 2018). Each tenant's data must be isolated in this cloud
computing arrangement and cannot be accessed or seen by the
partner tenant. However, the recent growth in technology has
made data privacy in cloud computing challenges, posing a big
problem to cloud computing providers.
The theoretical foundation for the current privacy issues in
multitenant cloud computing is drawn from the study done by
Park et al. (2018). According to Park et al. (2018), the most
significant privacy issue in multitenant cloud computing is the
lack of configurability. Configurability poses a colossal privacy
issue in this infrastructure because the tenants have to share the
same configuration. However, there is little evidence to provide
this theory, and this study will play a significant role in
contributing to this theoretical framework (Meng et al., 2021).
The purpose of the current study is to investigate privacy and
confidentiality issues in multi-tenancy cloud computing.
Specifically, in this chapter, studies that have been done in the
last five years focusing on this topic will be reviewed through a
professional literature review.
Chapter Outline
The current chapter will be structured using headings and
subheadings to ensure that each aspect is captured during the
literature review. The study will be structured in 12 different
sections, of which some may have sub-sections. The twelve
sections in the current chapter will include introduction, chapter
outline, search strategy, introduction to cloud computing, multi -
tenancy cloud computing, and cloud computing deployment
models. The other sections will consist of cloud computing
service models, multi-tenancy characteristics and architecture,
privacy issues in multi-tenancy cloud computing, solution
models to the challenges, contributions to the study, and a
chapter summary.
Search Strategy
3. The purpose of the current study is to investigate privacy and
confidentiality concerns in multi-tenancy cloud computing. The
present chapter focused on reviewing the studies that have been
done in the past few years on this topic. To achieve the
chapter's goals, inclusion and exclusion criteria were developed
based on the year of the study publication and the relevancy of
the findings to this study. Only articles that had been published
between 2017 to date were selected for review in this study. All
the identified articles came from reliable peer-reviewed journals
such as the Journal of Cloud Computing: Advances, Systems
and Applications (JoCCASA), government institutions,
computer engineering professional association publications,
symposiums, and whitepapers from the relevant field. Google
search was undertaken to access the articles in which keywords
such as cloud computing, multi-tenancy, and privacy in multi-
tenancy were used.
Introduction to Cloud Computing
Al-Ruithe, Benkhelifa, and Hameed (2018) noted that there had
been a considerable surge in the adoption of cloud computing
services in the last few years and the trend is likely to upsurge
further as organizations continue to realize the benefits of the
concept. According to the industry forecasters, the cloud-
computing market will likely generate $241 billion in revenue
by 2020 compared to the estimated $185 billion. The range of
the benefits that are offered by the use of cloud computing and
the constant maturity of the concept from an organizational
perspective and the vendors is one of the reasons why the
concept will increase in popularity not only in data storage but
in other parts of organizational management (Barona & Anita,
2017, April). Most organizations and enterprises are using
cloud-computing technology because they have realized that it
accelerates the business processes by allowing them to enhance
their agility and flexibility, which reduces costs that
organizations incur (Meng et al., 2021). Cloud computing as a
concept can be defined as a technology model designed to
4. enable organizations to access ubiquitous, on-demand, and
convenient networks to the shared configurable resources
configured. By design, cloud computing platforms are described
by five main characteristics that include the following.
Cloud computing provides on-demand self-service, which are
unilateral computing services to organizations and end-users.
Provide broad network access capabilities, accessed through the
clients' platforms, ranging from desktops to mobile phones and
tablets. Alsmadi et al. (2018) revealed that the platform
providers have access to a pool of resources, serving many
customers using different tenant models, which assigns
resources based on customer demands. They provided elastic
capabilities designed to be rapid and are released based on the
customers' scalabilities. They can provide measured services to
ensure that the services provided match the client's scalability
and are monitored, controlled, and reported as one-way of
ensuring transparency to the vendor and the client.
As much as the five mentioned features of cloud computing
describe the significant attributes of cloud computing, there are
different techniques that the end-users use to access cloud
computing infrastructures. Marinescu (2017) noted that the
decision to pick the most appropriate technique would depend
on many factors, including the volume of data managed,
sensitive data, and data confidentiality. Some organizations that
operate in regulated industries may find it easy to identify the
type of cloud computing infrastructure with the features they
want because of the commercially available recommendations.
However, such organizations still have to task their information
technology teams to perform due diligence on potential
providers to determine the best cloud computing infrastructure
that meets the organization's needs (Barona & Anita, 2017,
April). However, the characters mentioned in this area must be
considered. Four main types of cloud computing include hybrid,
public, private, and community cloud computing.
Cloud Computing Deployment Models
5. Cloud deployment models are classified or described based on
how the cloud platform is implemented, who has access to it,
and is hosted. According to the findings of a study that was
done by Smallwood (2019), "All cloud computing deployments
operate on the same principle by virtualizing the computing
power of servers into segmented, software-driven applications
that provide processing and storage capabilities" (Smallwood,
2019). There are four cloud computing deployment models and
are discussed below.
Private Cloud Deployment Model
In many instances, a private cloud model is hosted behind a
firewall and can be utilized by a single organization or a group
of organizations that share the same model. Shaikh and Iyer.
(2018, August) Note that private could models are becoming
popular today because they allow the organizations or users to
exhibit a high level of confidentiality. It is relevant for
organizations that operate in industries with increased
regulatory requirements. The commonly known colocation
providers provide this type of cloud model. Authorized private
cloud users can access, utilize and process data in the private
cloud from anywhere, just like they could do with public and
other cloud models (Barona & Anita, 2017, April). Evidence
indicates that some of the privacy issues involved in multitenant
cloud computing include data leakage, data breach, and
exposure of the private data relating to clients involved in the
agreement. As the number of people using cloud computing
balloon, privacy issues are becoming a significant problem for
many consumers who use the same cloud computing architecture
in a private or public setting. It is essential to define what
multitenant cloud entails before developing a clear concept or
problem that can be investigated.
The difference between the private cloud computing platform
and the public deployment is that access is limited to the
authorized persons alone, unlike in the public deployment
6. model. Private cloud model, which is designed to provide
clouding services to a single organization. Shaikh and Iyer.
(2018, August) argued that the provider both hosts this type of
platform on the premise of and might be owned by the
organization, the provider's client, or the third-party, which may
be the vendor. Tight confidentiality and data privacy are one of
the main benefits of these deployment models. However, as
Guerbouj et al. (2019) noted, its main shortcoming is that it is
expensive to deploy because the company that owns it has to
cater to the software and infrastructure that support the model,
making it expensive to install.
Public Cloud Deployment Model
Unlike the private cloud platforms, public cloud deployment
models are designed to be shared by many organizations willing
to outsource their cloud computing services. These cloud
computing models include those offered by Amazon, Google,
and Microsoft, among other entities that offer cloud computing
services. Public organizations provide the software and the
infrastructure that support the cloud computing services that the
clients share. This type of cloud computing model is
characterized by high scalability because of the enormous
storage volume or space. This model is mainly consumed by the
organizations involved in collaborative projects because of their
flexibility, and different organizations can access them.
According to Baig (2021), the public cloud model is another
form of a model designed to be accessed by the public. The
government organization, a single business, academic, or a
partnership of the two public cloud models can form this model.
This type of cloud computing model is hosted at the premises of
the service provider. Many organizations that offer public
computing services offer the resources in packages as part of
the services. Stergiou et al. (2018) noted that "Public cloud
examples range from access to a completely virtualized
infrastructure that provides little more than raw processing
7. power and storage (Infrastructure as a Service, or IaaS) to
specialized software programs that are easy to implement and
use (Software as a Service, or SaaS)," (Stergiou et al., 2018).
There are several factors that prompt cloud computing users to
adopt the public cloud deployment model. One is that it is cheap
to install since the organization must install no software and
infrastructures. However, the main shortcoming of the model is
that the confidentiality and privacy of the data can be
compromised.
Community Cloud Deployment Model
The community cloud deployment model is not commonly
utilized as compared to the other three types of platforms. Al-
Ruithe et al. (2018) noted that community cloud computing
platform is highly collaborative and are utilized in many multi -
tenancy arrangements. The model is designed to allow cloud
computing clients to share the applications. According to
Venkatesh and Eastaff (2018), many community cloud
computing model consumers are in the same industry, field,
practice, or share exact compliance requirements,
confidentiality concerns, and performance needs. The other
form of cloud computing model is the community cloud model.
This model is designed to be accessed and used by a specified
community of end-users from identified organizations. Studies
have defined the community cloud model differently based on
the perceptions of the scholars. El-Zoghby and Azer (2017,
December) noted that cloud computing is a private cloud model
that functions as a public model. The service may be owned,
operated, or managed by one or more organizations included in
the community, a third party, or a partnership. The service may
be hosted on or off the premises (Xue et al., 2018). The
community cloud computing platform users are segmented on
their service needs and are common in healthcare, banking and
finance, government agencies, and non-profit organizations.
8. Hybrid Cloud Deployment Model
The last and final form of the model is the hybrid model, which
combines two or more models. This model combines private and
public models to form a single and more compelling cloud
computing deployment model. The model is designed to enable
seamless interaction between the public and private data and
applications from one model to another. According to Azeez et
al. (2019), the decision to adopt a hybrid deployment model
depends on the industry's size and nature. Many large
organizations with multiple branches have favored this type of
cloud computing service. Hybrid cloud models are grouped into
two categories: cloudbursting that uses a private model as a
primary cloud, application, and storage. The hybrid cloud model
also runs most applications and houses data in a private cloud
environment but outsources non-critical applications to a public
cloud provider. This form of cloud computing model is in the
form of an application (Azeez et al., 2019). For instance, this
model form can be formed through a combination of the private
and public models infused on specific technology formations.
The benefits of the hybrid cloud deployment model are
overwhelming and include privacy and confidentiality of the
data and the cost-effectiveness of installing the services.
Figure 1: Cloud Computing Deployment Models
Multi-Tenancy Cloud Computing
Several scholars have directed their interests and energy in
investigating multi-tenancy in cloud computing today. There are
a plethora of studies that have been published focusing on the
issues around multi-tenancy cloud. According to Gupta et al.
(2018), data privacy concerns and confidentiality have been the
primary issues bedeviling and limiting the concept of multi -
tenancy cloud computing. Evidence suggests that organizations
and individuals consuming cloud computing services need to be
concerned with the privacy and confidentiality of their
9. information stored in the cloud. Multi-tenancy is defined
differently. However, many scholars have agreed that the
sharing of resources in cloud computing facilitates the
community cloud deployment model. Ghorbel et al. (2017)
noted that although the users of multi-tenancy cloud computing
services enjoy many benefits, they are also faced with integrity
and confidentially risks. To better understand privacy issues in
multi-tenancy cloud services, exploring what constitutes a
multi-tenancy cloud is imperative.
Many organizations and individuals have adopted the multi -
tenancy cloud because of its economic benefits from sharing
and virtualization of computing resources. Hathaliya and
Tanwar (2020) noted that "Multi-Tenancy implies different
meanings from different points of view and services. In SaaS,
Multi-Tenancy implies; when two or more users use the same
software or application that is provided by the Cloud Service
Provider irrespective of the resources" (Sahmim &
Gharsellaoui, 2017). Similarly, multi-tenancy occurs differently
in the case of PaaS. In PaaS, multi-tenancy is only achieved
when different clients share a platform or VM. This is different
for IaaS, where multi-tenancy occurs when different platforms
that belong to different users share the same cloud resources.
The idea of multi-tenancy explains the significance of sharing
resources as SaaS by the clients and reducing cloud computing
costs. However, it is interesting to note that using multi-tenancy
cloud computing can apply different techniques to attain their
multi-tenancy needs.
In this cloud computing arrangement, the service consumers are
known as tenants who choose and subscribe to a package that
they feel can satisfy their computing needs. This can be done in
all cloud computing service models that include IaaS, PaaS, and
IaaS. However, Stergiou and Psannis (2017) noted that SaaS is
the best platform for multi-tenancy because it allows the clients
to own, maintain, and host software and infrastructure
10. applications of the service provider. In many ways, the
application level of multi-tenancy is compared to SaaS. It
includes a structure and design that enable many clients to host
through a single application or server. Maliszewski et al. (2018,
July) noted that many of the prevailing multitenant models are
not flexible apart from the operational and maintenance costs
benefits and the multiple software types it provides to the users.
Many of the available multi-tenancy applications are designed
to align with SaaS applications that enable many different
consumers with different computing needs to share the same
software, the infrastructure of applications (Stergiou & Psannis,
2017). One of the main features of multi-tenancy is that the
applications are designed more flexibly, allowing each client to
customize it to meet their cloud computing requirements, needs,
and demands. Similarly, it is predictable in terms of use, and
therefore, consumers are allowed to pay for what they have
consumed at the end of the month.
Although multi-tenancy is highly associated with SaaS, it can
also be supported by PaaS to a certain level. Sahmim and
Gharsellaoui (2017) noted that PaaS platforms support multi-
tenancy in designing and developing applications. However,
many PaaS platforms do not have the features that support
tenant customization, as are SaaS and IaaS to a certain extend.
Chenthara et al. (2019) noted that "The mechanism of multi-
tenancy provides application data partitioned between tenants,
including the ability to offer a unique namespace string ID for
each tenant supported by various vendors of multi-tenancy
services, such as data isolation, data store, and caching
service," (Chenthara et al., (2019). Finally, Kumar et al. (2017)
revealed that the main benefits of multi-tenancy are reducing
computing costs and enhancing resource sharing among cloud
computing clients with similar needs. However, the drawbacks
of the concept are also far-reaching. They are in many cases
related to scalability of the services, privacy of the data due to
confidentiality and integrity risks, and high risks of data
11. leakage since the applications are shared. These issues
compromise the confidentiality of data in multi-tenancy,
limiting its use or adoption by cloud computing clients.
Cloud Computing Service Models
There are three types of cloud computing service categories
categorized as a platform, services, and applications. The
categories include Software-as-a-service (SaaS), Platform-as-a-
service (PaaS) and Infrastructure-as-a-service (IaaS)
(Marinescu, 2017). These are the types that the cloud computing
team must understand when evaluating cloud service-providing
vendors to ensure that the needs of the organizations are met.
Many service providers are flooding the cloud computing
market, but some do not have the knowledge that may be
required to serve sensitive organizations. Available evidence
indicates that cloud computing teams should not just consider
the hypes in the market since no one platform can meet the
requirements of the organization's networking (Ma et al., 2018).
The team should perceive cloud computing as a logical
evolution of utility networking to enrich themselves on how the
preferred platforms will secure the organizational data and
networking services.
Software as a Service
Under the Software as a Service, the service provider provides
application software as an on-demand service. Consumers using
this platform may acquire application software from different
providers or vendors, which increases the flexibility of the
infrastructure and software supporting customization of the
platform in the process. This is a platform that highly supports
multi-tenancy because of the minimi zed privacy issues
associated with the platform. Although getting the applications
from different providers is an advantage in this platform, it is
also a considerable risk to the privacy and confidentiality of the
data. This is because it becomes challenging to compose the
12. different applications into one platform and protect the
information contained in the operating system. According to Gai
et al. (2017), "SaaS, providers typically enable services with a
large number of integrated features, resulting in less
extensibility for customers" (Gai et al. (2017). The merit of the
platform is that the service provider is responsible for the
privacy and confidentiality of the applications, data, and
services. This is common in the public cloud deployment model,
where many consumers have tight confidentiality requirements
that the provider must meet before a deal is completed.
Similarly, private IaaS users may require enhanced
confidentiality and privacy to safeguard their customized
requirements.
Platform as a Service
Platform as a Service is a bit different from other delivery
models because it focuses on a programming environment to
allow the clients to access and use more application building
blocks. Almusaylim and Jhanjhi (2020) noted that these
programming environments have some limitations to application
architecture, such as controlling the application's services or
access from the operating system. According to Almusaylim and
Jhanjhi (2020), "a PaaS environment might limit access to well -
defined parts of the file system, thus requiring a fine-grained
authorization service" (Almusaylim & Jhanjhi, 2020). One of
the main reasons PaaS has found use in multi-tenancy is that it
gives the clients the freedom to build their applications apart
from the ones provided by the delivery model. This means that
the platform is more flexible and allows customization of the
services. However, just like IaaS, the consumers are responsible
for the platform's privacy and confidentiality, making it less
secure. Similarly, consumer s are responsible for differentiating
between workspaces and applications in the platform that limits
its use.
13. Infrastructure as a Service
Based on the tenets of the IaaS, the providers of the cloud
computing services provide the consumers with a set of
virtualized components such as the virtual machines and storage
space that consumers are allowed to anchor their applications
and operate in the process. Consumers who design and operate
using this platform are found in virtual operating systems and
virtual machines. In this platform, many issues limit the
application of this type of service delivery model. Some of the
issues include the hardening of the host, the confidentiality of
the inter-host communication, and the ability to trust virtual
machines. According to Khodashenas et al. (2017, June), these
are some of the issues that limit the use of IaaS in multi -tenancy
cloud computing because it is vulnerable to confidentiality and
integrity issues. However, in other application areas, IaaS is the
most extensible service delivery model but provides few
application-like features absent in some instances. Under this
platform, the consumers must secure the applications, operating
system, and content, limiting its application in multi-tenancy
cloud computing. Despite the client's responsibilities in the
confidentiality of the platform, the provider also has the
mandate to provide low-level privacy and confidentiality
assurances and services.
Figure 2: Cloud Computing Service Deployment Models
Multi-Tenancy Characteristics and Architecture
According to Kumar et al. (2018), understanding the
characteristics and architectures of multi-tenancy cloud
computing is essential towards comprehending the privacy and
confidentiality issues in this field of cloud services. This
section of the literature review focused on understanding the
studies investigating the characteristics and the architecture of
multi-tenancy cloud computing.
14. Characteristics of Multi-Tenancy Cloud Computing
Sharing Of the Hardware Resources
Kumar et al. (2019) noted that each customer has their virtual
machines customized to meet their computing needs in a
conventional single-tenant computing setting. Kumar et al.
(2019) revealed that the number of tenants who can use the
platform is limited because of the nature of virtual machines
used in their perspective. This is different for multi -tenancy,
where many different tenants can share the same software or
application, increasing resource utilization and cutting
operation costs.
High Level of Configurability
Karthiban and Smys. (2018, January) focused on investigating
the degree of configurability in multi-tenancy cloud computing.
All the customers share the same application instance in multi -
tenancy, unlike a single-tenant where each consumer has a
customized application instance. Because of this, different
consumers or tenants sharing the same application have
different computing needs, which must be met in the process.
Because of these, the services under multi-tenancy are designed
with a high degree of configurability to ensure that they can be
configured and customized to meet the needs of different
tenants.
Similarly, Guerbouj et al. (2019) noted that all product designs
are integrated with configuration options in a multi-tenancy
setting. Because of these reasons, many applications in the
multi-tenancy setting are run next to each other to enhance
sustainability. This ensures that the platform's functions are
enhanced by also increasing data privacy in the operating
system.
Shared Database and Application Instances
Applications in the multi-tenancy are runtime configured and
15. are therefore not different, as is the case in single tenancy,
where customization may create application variations.
According to Karthiban and Smys. (2018, January), the number
of instances is few or one in many cases, but all the applications
may be duplicated to enhance scalability in multi-tenancy cloud
computing. In this way, deploying applications in this setting is
easy and faster as compared to single tenancy.
Similarly, Alrawais et al. (2017) argued that "new data
aggregation opportunities are opened because all tenant data is
in the same place. Hence, user behaviors traces can be collected
easily, which can help improve user experience" (Alrawais et
al., 2017). In this way, there is the high and effective utilization
of hardware resources in multi-tenancy, enhancing cheaper and
swift maintenance of the applications. The platform is cost-
effective and presents opportunities for data aggregations.
Data Management Architecture in Multi-Tenancy
Studies have indicated that cloud computing can be defined by
multi-tenancy. This is because the shared applications in multi -
tenancy change dynamics in the area achieve the economic
benefits of cloud computing. In this setting, many clients can
access and utilize the same application, although they are
exposed to some privacy issues in the process. However, Ali et
al. (2018) noted that the application designs in multi-tenancy
are designed to distinguish between users to ensure that no user
uses data of another user. Therefore, Ali et al. (2018) revealed
the three techniques utilized in the multi-tenancy perspective:
physical separation, using a database, and virtualization.
Similarly, Guan et al. (2018) noted that multi-tenancy could be
achieved through using dedicated technology which provides or
allow users to access resources individually. This model has
been relied on to assure the platform users of their privacy,
confidentiality, and data integrity. This is called physical
separation in multi-tenancy, and it is less commonly used
because it is the most expensive method of achieving multi -
tenancy.
16. The three main architectures for managing multitenant data in
the cloud include storing data relating to each tenant on a
separate database. This is also the most common and most
accessible form of data isolation. Secondly, using a single
database to house different tenants with their tables classified
into schema created or designed for a specific tenant. Marwan et
al. (2018) termed this approach effective as it allows more data
to be stored in the same space, making it easy to retrieve. The
final framework stores data of different tenants in the same
database and similar sets of tables. This has been the riskiest
approach to data storage in multi-tenancy and exposes the
information to privacy issues. Goyal et al. (2019, February)
noted that "multi-tenancy, on Cloud environments provides
seemingly limitless scalability and an alternative to the
expensive data center infrastructure, it raises confidentiality and
privacy issues because it hands the processing and storage task
over to third parties" (Goyal et al., 2019, February).
Conceptual Architecture in Multitenant Application
Management
All layers of applications are affected in multitenant cloud
computing. However, to enhance data privacy in multitenant
cloud computing, three areas have to be focused on by the
service providers and the consumers. Separating user data is
warranted in multitenant settings because the applications and
databases are shared in many instances. To ensure that privacy
issues are managed in multitenant cloud computing, access
control and authentication must be implemented to ensure that a
user cannot access the data of another user. Secondly, Park et
al. (2018) noted that consumers could feel that their data is
secure if the processes and procedures are configured from a
multitenant perspective. This includes general configuration,
workflow configuration, data input-output configuration, and
layout style configuration. Finally, there must be a high level of
17. data isolation in multitenant settings to enhance data privacy.
Data isolation is necessitated by the fact that applications and
databases are shared in many instances. Therefore, data
isolation using techniques such as authentication will limit the
platform users to their data alone.
Figure 3: Multitenant Architecture With Tenant-Isolated
Components
Privacy and Confidentiality Challenges in Multi-Tenancy Cloud
Computing
The benefits of multitenant cloud computing are overwhelming
based on the recent findings. However, these benefits are
limited to some privacy and confidentiality challenges that the
platform face today. According to Sun (2020), privacy issues
limit the concept regarded as one of the essential components of
cloud computing. Sun (2020) noted that multitenant cloud
computing has contributed to resource utilization and the cost-
effective nature of the practice. However, many organizations
using cloud computing services cannot shift to multi-tenancy
computing because of the privacy issues that put client data at
risk of being compromised by other system users. Despite the
benefits, the challenges that stop the implementation of this
type of cloud computing are many. According to Xiong et al.
(2018), physical data isolation considered a measure of privacy
and confidentiality in multi-tenancy, may not be effective
enough based on the technique used to implement the approach.
Physical isolation of data needs to be done more effectively to
achieve its obstructing intrusion goals. Considering this
argument, it becomes apparent that a malicious tenant may
infiltrate another tenant's data sharing the platform with others
through the shared components of multi-tenancy. The violation
of privacy, in this case, can be done by introducing the code to
the SaaS platform, utilizing the loopholes in the applications
that are shared, or through advanced hacking.
18. Singh et al. (2021, July) noted that one of the main challenges
to multi-tenancy privacy is that much of the software is not easy
to test for the confidentiality of the data. However, many of the
producers of developers of the software will argue that their
products are secure, yet they are not. Many service providers
have no confidentiality software and applications yet promote
that their servers are secure and limit data privacy issues. This
has been an enormous problem that has slowed down the use of
multitenant cloud computing. Similarly, Joshi et al. (2018)
argued that human error in data privacy and confidentiality
management in cloud computing is another privacy challenge.
Indeed, many recent data breaches involving colossal amounts
of money have been instigated due to human errors. Many
employees or system administrators are, in many instances,
likely to contravene the authentication of the users allowing
unauthorized persons to access private data in the servers. If
this occurs, data privacy violations will likely occur (Joshi et
al., 2018). Similarly, some organizational employees have
violated the confidentiality and information privacy policies of
their organizations intentionally or accidentally. Data privacy
will be violated if this is the case in any organization giving
way to unauthorized access.
Khoso et al. (2021) noted that multi-tenancy in cloud computing
could set an environment where the attacker and the victim
share the same platform. This is a huge privacy issue that many
confidentiality and privacy models or literature have not
provided solutions to. The hypervisor or resident operating
system may not detect attackers on the same platform as the
victim. George Amalarethinam and Rajakumari (2019) argued
that any tenant within the multitenant arrangement could attack
the neighbor because simple methods such as side channels can
be used to infiltrate the database of tables of another tenant.
Similarly, multi-tenancy is considered a privacy risk in cloud
computing because privacy and confidentiality of the
information can be menaced. Although the system users are
19. virtually isolated, they are still connected concerning hardware
since tenants share the same hardware. Amalarethinam and
Rajakumari (2019) related multitenant to multitasking where
many resources such as network, CPU, software, and
applications are shared. And just like it is the case of
multitasking, multi-tenancy is prone to privacy and
confidentiality lapses.
Virtualization
Virtualization, which refers to the abstraction of computer
resources, is one of the key features in cloud computing
privacy, confidentiality, and security. Through utilizing
virtualization technology, dynamic resource allocation and
providing services are possible. It also enables the user to
install several OSs in one physical machine without interfering
with one another. According to Kaur et al. (2020), different
virtualization technologies have been developed and
implemented in different industries, and some of them include
VMware and Xen. Privacy issues in multi-tenancy cloud
computing arise because there is a high level of sharing the
resources such as the machines and databases provided by the
computing services provider. According to Singh and
Dhurandher (2020, December), virtualization causes losing
control over personal and private data. The client may lose
control over the location where data is stored, security and
privacy policies, and over the people who may access the data,
which is common in multi-tenancy cloud computing services.
Singh and Dhurandher (2020, December) noted that privacy and
confidentiality could easily be breached in multi-tenancy
because the attacker can easily manipulate the hypervisor (the
software layer between the operating system and the hardware)
and gain access a virtual machine that different tenants share.
The presence of a hypervisor in this architecture increases the
attack surface since it adds the application program interfaces
20. (APIs) and the sockets, enhancing the system's complexity.
However, there are contrary accounts that authors have
observed on this issues; according to Pulkkinen (2018), the
existence of a hypervisor in the multi-tenancy cloud computing
infrastructure increased the privacy and confidentiality of the
data in the architecture because it reduced the number of attacks
because of its efficiency as compared to conventional operating
systems. Pulkkinen (2018) focused on several issues
undermining the effectiveness of multi-tenancy cloud services
because of virtualization. Privacy issues that are instigated by
virtualization in cloud computing services, according to the
available publication, include cross-virtual machine attacks
(instigated by another tenant in the cloud arrangement),
malicious system administration attacks (instigated by insiders
working for the cloud vendor), and another area of vulnerability
is virtual machine hopping.
Cross Virtual Machine Attack
This privacy and security vulnerability enables the system
attacker to steal data from the information system without
leaving any trace or raising the alarm. According to Kumar et
al. (2018, December), system hackers can achieve this by
placing the malicious virtual machine on the physical server
where the targeted client’s virtual machine is installed. System
hackers achieve this by determining the location of the target
client’s VM instance is installed. To determine where the VM is
located, the adversaries used networking probing tools such as
the nmap, wget, and hping, among others. The adversary should
determine if there are two VM instances by comparing IP
addresses to see if they match and measure the small packet
round-trip time.
A study done by Kumar et al. (2018, December) noted that
providers such as Amazon had launched new instances of virtual
machines installed on a single physical machine which increases
21. the vulnerability of the physical machine because malicious
VMs can easily be placed on the physical machine. Privacy and
confidentiality of the client’s data are therefore violated once
the malicious and the client’s VMs have been aligned on a
particular physical machine since they can share some
resources, including CPU pipelines, data cache, and network
access, among others. Maliszewski et al. (2018, July) noted that
it is therefore easy for the attacker to steal a user’s passwords
because the attacker measures cache usage to estimate the
server's current load, estimate traffic rate, and keystroke timing
by attacking the virtual machine. Similarly, Maliszewski et al.
(2018, July) provide several mitigating strategies to combat
cross-VM attacks such as co-residency, placement prevention,
and NoHype.
Malicious System Administration (malicious SysAdmin)
Campanile et al. (2020) noted that malicious system
administration vulnerability is caused by the privileged
administrators who have access to the memory of the client’s
virtual machine. In many instances, systems with xenaccess can
allow the administrators to access virtual machines' memory
during run time by running the systems user’s level process
domain0. Kumar et al. (2017) noted that this vulnerability could
be enhanced by the increasing number of multi-tenants and
demand for cloud computing services, increasing privacy and
confidentiality of data vulnerabilities. Several frameworks have
been proposed to mitigate this vulnerability of data to privacy
and confidentiality. According to Khodashenas et al. (2017,
June) and Kaur et al. (2020), the vulnerability can be solved by
implementing a trusted cloud computing platform (TCCP). The
trusted cloud computing platform effectively protects the
privacy and confidentiality of new client’s virtual machines.
Kaur et al. (2020) noted that “TCCP is a set of technologies
developed by the Trusted Computing Group (TCG) to face the
concern of untrusted execution environment.
22. TCCP guarantees that the execution of virtual machines doesn't
leak any information and keeps data confidential” (Kaur et al.,
2020). The tool solves the problem because it bars any
privileged administrator from accessing the virtual machine
memory and closes the execution in a protected perimeter. This
privacy protection model is founded on the Trusted Platform
Module, which is installed or incorporated on the motherboards
of the machine and includes other peripheral technologies such
as authenticated booting, sealed storage, and remote attestation.
Similarly, Khodashenas et al. (2017, June) noted that privacy
could be achieved in multi-tenancy using the TCCP by
combining TCCP and virtualization technology. The
combination is effective because it helps the user to gain greater
confidentiality on virtual machines. Privacy is enhanced in this
model because the virtual machine operating system is
customized. Privacy can also be increased since the combination
of the TCCP and virtual technologies protect code from the
cloud service providers and disable less useful virtual devices.
Kaur et al. (2020) noted that clients’ data confidentiality is
significantly improved against the service provider. Only valid
users can boot the target virtual machines if the listed
procedures are implemented.
Figure 4: Trusted Cloud Computing Platform (TCCP)
architecture.
Virtual Machine Hopping
This is a kind of vulnerability where the adversary hacks into
the virtual machine using different techniques and takes control
of other virtual machines in the system. The hacker can achieve
the goals by manipulating or exploiting the hypervisor’s
vulnerabilities. However, according to Yadav et al. (2021),
virtual machine hoping vulnerability is founded on the
assumption that the software layer between the operating system
23. and the hardware or physical machine has a security lapse.
Yadav et al. (2021) noted that hackers could not achieve their
goals when targeting a cloud service system with a robust
hypervisor. This implies that multi-tenancy cloud computing
infrastructures and architectures should be designed with a
robust hypervisor to mitigate the issue of privacy breaches
through virtual machine hopping.
Data Location
Once the information or data has crossed borders which may be
country borders or company boundaries, it is faced with
numerous privacy and security risks. According to Lejaha,
2017), many of cloud computing service users do not know
where their data is stored. For these reasons, concerns relating
to privacy, accessibility, and protection of personal data have
dominated regional and national data protection policies. The
whereabouts of data location is a huge concern that
organizations handling private data have today because it
balloons their worries over data safety and protection. In multi -
tenancy cloud computing, data is stored in multiple locations in
different countries and regions with no information provided to
the consumers about the location where their data is stored.
Stergiou et al. (2018) noted that because of a lack of knowledge
on the whereabouts of consumer data in multi-tenancy cloud
computing, consumers are constantly worried about the legal
and compliance requirements of their data. The situation is even
more complex considering the different laws and data regulation
policies that different countries have implemented. Studies have
indicated that data location issues are divided into three main
categories according to literature. The study done by Kumar et
al. (2018, December) indicates that the three data location
categories include data combination and commingling,
outsourcing, and offshoring.
24. Data Outsourcing Privacy Challenge
Data outsourcing is a major privacy issue in multi-tenancy
cloud computing because data leaves the company jurisdiction
and is stored in locations known by the cloud service providers
alone. According to Ali et al. (2018), “customers physically
lose control on their data, and this loss of control is one of the
main causes of cloud insecurity and raises governance and
accountability questions in data outsourcing architecture” (Ali
et al., 2018). Since the data owner does not know where data is
stored and who has access to it, clients in a multi-tenancy cloud
service become more concerned because they share several
resources in this arrangement.
General Issues in Data Outsourcing. Literature provides several
privacy and security issues related to data outsourcing in cloud
computing, especially in multi-tenancy clouds services. Many
consumers using cloud computing services ask how they are
sure that their data is stored safely and in compliance with the
law and how private and confidential their data is. Maliszewski
et al. (2018, July) noted that in a traditional operating system,
the user is sure of where the data is stored and can ensure that
data privacy and confidentiality are met by implementing
different measures. However, this is different in multi-tenancy
cloud computing as the system user trusts the data with other
third parties responsible for the storage, safe, confidentiality,
and privacy of their data. Campanile et al. (2020) noted that
outsourcing data would lead to data privacy violations because
the data is in the storage system of a third party. The data owner
has no control over the private data in this arrangement.
Nevertheless, regardless of the risks that data is exposed to in
outsourcing arrangement, Kumar et al. (2017) and Khodashenas
et al. (2017, June) argued that outsourcing of data maybe even
secure as compared to the traditional data storage systems. This
is because cloud computing service providers have a team of
experts with experience and skills to safeguard and store data,
25. unlike individual storage systems where the individual computer
user may not have the skills to safeguard data in the computer.
Because of this finding, many consumers embrace cloud
computing services for their data storage compared to indoor
data storage systems. However, Singh and Dhurandher (2020,
December) do not agree with this argument. Singh and
Dhurandher (2020, December) noted that “the levels of privacy
and anonymity for a user will be lower than a desktop user, and
some consensus on this topic is required as future research”
(Singh & Dhurandher, 2020, December). This argument cannot
be overlooked, and it is because of this, the issue has to be
explored further through research.
Yadav et al. (2021) noted that several measures had been
implemented to enhance consumers' confidence in the multi-
tenancy cloud computing g category by assuring them that their
data privacy is guaranteed. NIST guidelines have been provided,
and cloud computing providers with or without multi-tenancy
cloud services must adhere to the guidelines. Yadav et al.
(2021) note that “a framework outlining which activities and
steps an organization should follow to ensure that the
outsourcing of data is done securely and compliance with all
organizational policies while maintaining privacy” (Yadav et
al., 2021). Several requirements need to be followed when
uploading and accessing the stored data in a multi-tenancy
setting and include requirements specification, privacy and
security risk assessments, and determining the competency of
the service provider. Adhering to these requirements will ensure
that data privacy is assured in using multi-tenancy cloud
services and enjoy the benefits of the cloud architecture.
Customers’ Privacy Requirements, Policies, and Lack of
Execution Control. Different organizations and individuals
using multi-tenancy cloud services have different privacy levels
requirements for their data. Lejaha, R. (2017) noted that
healthcare, finance and banking, legal and consultancy, and
26. technology organizations need a high level of data privacy
compared to small and medium enterprises or business start-ups.
However, many of the available multi-tenancy cloud service
providers offer their consumers the same level of data privacy
protection with similar and inflexible Service Level Agreements
(SLA). This practice of holding to the SLA compromises the
data privacy requirements of organizations dealing with
sensitive data, which causes privacy concerns. According to
Stergiou et al. (2018), “a poor provider selection can affect
company reputation, customer trust, and service delivery. If
cloud service providers could include better policies and
practices, users could be able to assess better privacy and
confidentiality risks they face” (Stergiou et al., 2018).
Similarly, consumers who have consented to the multi-tenancy
like other consumers of cloud computing do not have complete
control over the execution of the resources remotely since many
of the resources are shared. Again, the consumers have no
remote execution and control of their data, so they cannot
determine whether their data is stored according to the
applicable laws. Therefore, consumers in multi-tenancy cloud
service arrangements cannot inspect and monitor how the data is
being stored, safeguarded of telling people or entities that have
access to their data hence raising privacy issues or concerns.
This means that dishonest employees in a cloud computing
service organization may compromise consumer data without
the owner knowing. It is a fact that many service providers deal
with large volumes of data from different tenants in multi-
tenancy cloud computing arrangements. In this way, meeting the
different data privacy demands of the consumers in this setting
requires a high level of commitment and determination from the
providers’ perspective.
Xue et al. (2018) recommended cloud computing vendors “cloud
computing industry to establish standards in the paradigm, as
the current lack of them makes it difficult to users to analyze
27. and assess the differences between cloud service vendors” (Xue
et al., 2018). This is important because the privacy policy of the
tenant may not align with that of the vendor. Therefore, having
established standards to control data privacy policies will
enhance the confidence of the consumers in the provider to
safeguard their data.
Audit, Monitoring, and Accountability. Audit monitoring is the
only way tenants in multitenant cloud service arrangements can
hold their service providers accountable for their data privacy
and security. Al-Ruithe et al. (2018) argued that the purpose of
data audit and monitoring is “the purpose is to watch what
happened in the Cloud system to ensure that privacy
requirements, SLAs and compliance with laws are enforced
when their personal information is in the cloud” (Al-Ruithe et
al., 2018). However, this is one area that is very limited
regarding consumer access as they have no access to
information relating to the collection, usage, user profiling to
ensure high privacy recommendations.
Some consumers may not like how their data content is
monitored or is audited, but they may not change this because
they have no access to such information. Hathaliya and Tanwar
2020) noted that some cloud service providers might be required
to disclose and provide reports to the authorities, government
agencies, and security committees or organizations on the
nature of the information stored in their databases. This is done
in many cases without the knowledge of the data owners,
something that violates their privacy in the process.
Data Offshoring
Offshoring is the movement of the data from one region to the
other or region to the other. In a nutshell, offshoring is the
mobility of data across different jurisdictions, including
companies, among individuals and countries. However, in many
28. instances, this area of data privacy literature has focused on
data mobility across international boundaries. As expected, data
movement or offshoring of data increases the risks that data
from different organizations face today due to legal and
compliance regulation complexities. In a multi-tenancy setting,
cloud service providers serve consumers from different parts of
the world.
In contrast, these providers may not have data locations in some
countries where the consumers reside. According to NIST, the
“organization’s responsibility to operate in agreement with
established laws, regulations, standards, and specifications”
(NIST). Compliance also includes the understanding of who is
maintaining the outsourced data.
General Issues in Offshoring. Several studies have been done to
investigate privacy issues related to data offshoring in multi -
tenancy cloud computing. The studies have provided consumers
privacy concerns regarding g to offshoring while providing the
frameworks to mitigate the concerns. Some cloud service
providers do not inform their consumers of the location of their
data because of the data governance and processes safeguards or
policies. One of the main issues found in this perspective
reflected in the study of Campanile et al. (2020) is which laws
are applied to information in offshore perspective and how this
is determined. The nature and location of the data is an
important issue and significantly affects data privacy since
some jurisdictions have laws and regulations that may limit
access to information stored in their jurisdiction. Similarly,
some jurisdiction, for instance, China has different laws relating
to data security and privacy which many other jurisdictions
have noted as vague. Therefore, consumers whose data is stored
in countries such as China may feel or may have privacy
concerns because of the poor regulation of the cyber industry in
China.
29. Another privacy issue that has been identified from a study
done by Campanile et al. (2020) is the compliance regulations
that the company or the consumer has to follow before joining
or moving data to multi-tenancy cloud service. In the European
Union, the legislation bars the processing of personal
information to the cloud if the data subject is not aware of the
processing and the purpose for the actions. This is different
from other jurisdictions that allow the processing of personal
information to the clouds without necessarily notifying the
subject of the action or the purpose of the action. When this is
the situation, it becomes difficult for the tenants to upload or
access their data when they need to do so at their own time.
Similarly, it is imperative to understand that cloud computing
service vendors are in business, and they generate huge
revenues based on the number of subscribers. In this way, they
will promise consumers who intended to buy their data privacy
and security services. These promises may include disclosure of
their data location to motivate such clients to buy their services.
The promises may enhance the consumers' confidence in their
data privacy, but in a real sense, data may not be stored in the
locations that the providers have disclosed. According to
Khodashenas et al. (2017, June), cloud service providers split
their data storage facilities into many different jurisdictions to
reduce the risks of data breach and damage experienced when
data is stored in the same jurisdiction. This is a critical concern
for the consumers because they cannot tell which laws and
regulations apply to their data. This is also a huge privacy issue
because the tenants may violate the policies and regulations
relating to data handling without their consent because they are
unaware of the laws that apply to their data.
Legal and regulatory issues. As already mentioned in the
general privacy issues related to the offshoring section,
different jurisdictions have varying privacy laws that regulate
data storage and access. To make it worse, many of the legal
30. issues relating to data privacy are involved or addressed during
the assessment of the contract formed. These include Service
Level Agreements (SLA) and User Licensing Agreements
(ULA). According to Pulkkinen (2018), the privacy concern
here is that some of the privacy laws in different jurisdictions
are outdated or ambiguous and do not capture the essence of
cloud computing, especially multi-tenancy cloud services.
Several studies have investigated legal and regulatory
compliance effects on the privacy of data stored offshore. One
of the privacy issues in this perspective is the dissimilar
perception of the jurisdiction of what constitutes privacy or
what amounts to privacy violation. These concerns have
resulted in different legal battles in courts, which have refused
to fade because of other jurisdictions' different interpretations
of privacy. The authors explain some examples of conflicting
regulations are the U.S. Federal Rules of Civil Procedure
(FRCP) and the EU Directive. For instance, the definition of
privacy in the United States and the European Union is broad. It
is regulated by different laws, including data security, privacy,
cyber, and human rights laws. According to Yadav et al. (2021),
“even though many laws have been published to protect users'
privacy and businesses secrets, they are out of date and
inapplicable to scenarios where more parties enter in action
(like Cloud Computing)” (Yadav et al., 2021). Yadav et al.
(2021) believe that such complex and multiple laws that define
privacy make it difficult to determine what exactly constitutes
data privacy.
Similarly, Yadav et al. (2021) noted that many established laws
control or regulate data privacy offshore. Interestingly, privacy
laws are different and apply differently to different industries or
sectors. For instance, in the United States, financial sector data
and information privacy is regulated by Gramm Leach Bliley
Act which provides additional requirements compared to the
health insurance portability and accountability act (HIPAA) that
31. apply to the healthcare industry. Given the difference in the
laws that apply to different sectors, privacy regulation
experiences gaps and making it difficult to define what
constitutes privacy data violation. Lejaha, R. (2017) noted that
“some of the laws do not regulate activities of the third-party
providers of health care businesses, so a legal demand by a
private party to a CSP for disclosure of protected health
information would lead users’ private information to be
disclosed,” (Lejaha, 2017). This makes it difficult to understand
which law applies to areas that are not regulated by the
established privacy laws in the sector.
Data Combination and Commingling In Multi-Tenant Cloud
Computing
Data combination and commingling is a major privacy issue in
multi-tenancy cloud computing. Ali et al. (2018) defined data
combination as separating customers’ stored private data in the
cloud from other tenants. Considering the definition of data
combination, it is one of the main processes in cloud computing
that focuses on cloud computing data privacy in multi-tenancy
clouds service arrangement. According to Ali et al. (2018),
multi-tenancy cloud computing consumers need to be assured
that their data is stored separately from other tenants. In a
situation where private data is stored in the same database, the
risks of privacy violations became evident and became exposed
to attacks and virus transmission. When information is kept in
the same database, an attack on a single tenant may likely
spread to other tenants and cause a huge privacy violation and
reduce data integrity. Therefore, cloud service providers need to
be careful when handling data in a multitenant environment.
Hathaliya and Tanwar (2020) noted no evidence linking data
commingling and combination to virtualization. However,
virtualization is frequently applied to data combination and
commingling to reduce the risks associated with this privacy
concern in a multi-tenancy setting.
32. Solution
Models to the Privacy Challenges in Multi-Tenancy Cloud
Computing
Literature on Privacy