Question

In: Computer Science

(a) If you have both sensitive and non-sensitive data, how will you achieve precision in terms...

(a) If you have both sensitive and non-sensitive data, how will you achieve precision in terms of disclosure? (b) In the context of Cloud Computing Security, give an example of a SAS product and briefly explain it. (c) As a client, what solution will you implement if your cloud service provider does not offer TNO. In that particular implementation, how are two levels of encryption used? What is the additional advantage of this kind of implementation?

Solutions

Expert Solution

Question :

(a) If you have both sensitive and non-sensitive data, how will you achieve precision in terms of disclosure?

Answer : Sensitive data means the data which should be protected or keeping as secret from others. If we have both sensitive and non-sensitive data , we apply encryption methods on sensitive data to secure from others. By encrypting the sensitive data , even hackers access the data they don't the original data. By this way we achieve the precision interms of disclosure.

(b) In the context of Cloud Computing Security, give an example of a SAS product and briefly explain it.

Answer : SAS is defined as the Software as a Service , the cloud providers design a software, that allows users to access it over internet. Google meet is the example of SAS product. It allows users to make virtual meetings online. Users are provided with credentials to login into the software to do theirs work. By this way ,cloud computing provide security for their work or communications.

(c) As a client, what solution will you implement if your cloud service provider does not offer TNO. In that particular implementation, how are two levels of encryption used? What is the additional advantage of this kind of implementation?

Answer : TNO(Trust no one) is the security provided to data stored on the cloud.By this TNO , it minimizes the trusting third parties who want to access the data. If it is not offered by the cloud provider, as a client we will implement another solution is "Authentication".

Authentication verifies the person identity before accessing data. In this authentication implementation, digital signatures are considered as the user identity uses for authentication. For these digital signature creation, encryption methods are used. The two levels of encryption is used to encrypt the key of creating digital signature. Encrypted key is again encrypted to provide more Security to the private key used to create digital signature. The advantage of this implementation is avoids the access of data from unauthorized users or third party persons. It adds more and more Security to the data.


Related Solutions

In JAVA, Briefly explain how objects are able to achieve both data hiding and implementation hiding.
In JAVA, Briefly explain how objects are able to achieve both data hiding and implementation hiding.
4. Explain how the following computations are performed using both IEEE single precision and double precision...
4. Explain how the following computations are performed using both IEEE single precision and double precision floating point representation. a. 11716 +2A916 b. 1011.112-11.1510 c. 1.0010102 x 0.011012 d. Comment on any differences you see in accuracy and precision.
a) how can instrument resolving time impact the precision of the counting data you obtain in...
a) how can instrument resolving time impact the precision of the counting data you obtain in a Geiger-Müller Detector? b)Why is an end-window GM detector not the detector of choice for alpha and gamma radation?
Explain how you can secure passwords and other sensitive data on a website. Provide code snippets...
Explain how you can secure passwords and other sensitive data on a website. Provide code snippets to explain your approach. Your answer can be based on the use of PHP/MySQL or ASP.NET/SQL based solution. Explain how online advertisements will be stored and served.
How can you achieve financial success? What aspects are you considering in order to achieve this...
How can you achieve financial success? What aspects are you considering in order to achieve this situation?
proximal upper extremities what are they? how would you define them in non medical terms?
proximal upper extremities what are they? how would you define them in non medical terms?
describe how you can use a magnet to exert both a contact force and a non-contact...
describe how you can use a magnet to exert both a contact force and a non-contact force on another magnet?
In applying t-tests to your data and you find that your data are very non-normal. How...
In applying t-tests to your data and you find that your data are very non-normal. How would you expect that non-normality to affect your results if corrected by family-wise error rate (FWER)? How about by false discovery rate (FDR)?
What do you hope to achieve, both personally and professionally, by obtaining an MS in Finance?...
What do you hope to achieve, both personally and professionally, by obtaining an MS in Finance? And how do your experience, and background in public relations, entrepreneurship, and future goals align with all that Miami Herbert Business School has to offer?
You have isolated two temperature-sensitive strains of yeast (which you have named giant and tiny) that...
You have isolated two temperature-sensitive strains of yeast (which you have named giant and tiny) that show very different responses to elevated temperature. At high temperature, giant cells grow until they become enormous, but no longer divide. By contrast, tiny cells have a very short cell cycle and divide when they are very much smaller than usual. You are amazed to discover that these strains arose by different mutations in the same gene. Based on your understanding of cell cycle...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT