Tuesday, May 5, 2020

Cloud Privacy and Security for Traffic Lights -myassignmenthelp.com

Question: Discuss about theCloud Privacy and Security for Traffic Lights. Answer: Introduction: In this paper we are looking forward to look on the approaches undertaken by the government of Singapore and Hong Kong to manage information security and privacy. Deployment of smart sensors and cameras atTraffic Lights, bus stops, and rubbish bin. The deployment of smart sensors and cameras at the traffic lights, bus stops, and rubbish bin brings new scenario in the traffic management system of Hong Kong and Singapore. The smart traffic management system helps in controlling the fluctuation and brings coordination in the traffic (Chia, 2015). It helps in optimizing the flow of traffic and reducing vehicle stoppage at traffic junction. The advantage of using smart traffic signal system helps in limiting use of fuel without wastage, controlling the pollution; minimize wastage of time at traffic junction, and others. The controllers are used for setting standards for connector, intervals, and operating limits. The smart sensors are efficient in handling traffic at the road which results in increasing the capacity of the road. The chance of collision and waiting time is reduced to high extent. The vehicle operators and Pedestrians both can travel safer at road side. The vehicle operators have to keep constant speed to match up gre en signal at the traffic light which helps in reducing the waiting time at traffic junction. The traffic management involves elimination of unnecessary starting and stopping of the traffic. The smart traffic management system is capable of reducing the consumption of the fuel, reduction in the noise and air pollution of the city, and limiting the wear and tear of the vehicles. The travel time of the vehicle operator can be reduced due to the elimination of waiting time at the traffic junction. The use of sensor network helps in getting the display of information related to the position of bus from the bus stop. It will help to provide the information related to the arrival of the bus. The handling of the rubbish bin using the sensor network helps in making the city clean because it focuses on dumbing the waste into the dustbin. The cleanliness of the city helps in increasing the tourism in the country (Cerrudo, 2015). The cleanliness helps in ensuring the minimizing the occurrence o f death causing diseases and develops a healthy environment for the nation. As a Visitor of Singapore: The traffic management system helps the visitor to guide the path with the help of navigation system. The visitor can check the correctness of the path towards their destination. The GPS system helps in knowing the location of the visitor in the emergency situation. The safety procedures at the traffic junction helps in attracting the tourists towards the city helps increasing the profit of the tourist industry. The newer technology becomes the centre of attraction to the tourist. Everyone love their life and always prefer those destination which are safer and healthy. The traffic management system helps in reducing the air pollution which resolves the issues of breathing problems which is generally seen in the visitor because they are not familiar with the living condition of the city. The surveillance system makes use of cameras to monitor the central location of the visitors to act efficiently at the time of emergency. The video analytical tools are used for analysing the behaviou r of participants data objects. As a Resident of Singapore: The sensor traffic signalling system is the boon to the resident of the Singapore city because they can move around in the city freely without the headache of accidents. They can breathe in the pollution free air. The traveling cost of the people can be reduced by saving their fuel oils. The travelling time can be reduced by reducing the time wasted on the traffic signals. The cloud computing technology provides the data centre for managing machine to machine communication. The internet of things opens a new door for making the availability of the data to the new applications. The RFID technology is used by the Singapore to provide smart services like mass transportation, building access, library access, car parking, and shopping. It helps in providing the smooth life style with the innovation in the traffic management (Martin, 2016). The e-services at the traffic signals helps in making the political announcement, booking of the parking space, monitoring of the traffic, minimizing t he paper usage, and others. The GPS system improves the safety of the people because the GPS helps in analysing the current location of the vehicle operator which results in reducing the illegal activities to occur. Deployment of Sensor boxes to act as a Wi Fi hotspots throughout the city: The smart cities deployed the sensor boxes to act as a Wi Fi hotspots throughout the city. It helps in gaining attraction of the population, development of the budgetary plans, and helps in remaining ahead of the competitors. The sustainability of the ICT helps in evolving economic growth of the residential city. The use of Wi Fi brings an new scenario in driving economic competitiveness, sustainability of the environment, and development of the liveability conditions (Bemile, 2011). The economic growth of the city can be increased with the enhancement in the lifestyle of the people, creating new opportunities for urban development, initiatives taken for eco-sustainability, improving the condition of political process, and helps in improving the financial services provided to the resident of the city. The facility of Wi-Fi builds the high capacity communication infrastructure. The flawless sharing of information can take place between heterogeneous network which helps in improving th e efficiency of government, citizen, businesses, and others. As a Visitor of Singapore: The connectivity of the city through Wi-Fi brings a new scenario in providing better public services to the visitors. The facility of transportation has been improved to the high extent. The communication platforms connect the visitor with their loved ones who are far from them. It helps in resolving the issues of theft and carrying of the illegal activity. The Wi Fi connectivity helps the visitor to get transport service, first aid service, and etc. at their door step (Sarre, 2010). It provides the display of the availability of the taxis and bus with their timings. The use of Wi Fi brings a new scenario in driving economic competitiveness, sustainability of the environment, and development of the liveability conditions. As a Resident of Singapore: The WI Fi connectivity helps in developing the strong communication medium between the heterogeneous networks used by the participating units such as government, businesses, and citizen. The growth of the city will increase with the expansion of relationship between government to government, government and business, government and citizens, business and citizen, and others. The flawless communication plan increases the capability and performance of the government, businesses, and employees (Wang, 2009). The cloud computing technology provides the data centre for managing machine to machine communication. The internet of things opens a new door for making the availability of the data to the new applications. The sustainable environment is created for the resident of the city by having control on the pollution, waste, and lighting. The accessing of the information at mobile location increases the quality of services provided by the employees and high officials of the business which res ult into the growth of nation economy. The quality of life can be improved with the advancement in economic activity, increasing efficiency of the infrastructure, accessing of data on mobile location, distribution of energy and its consumption, safety measures for environment, digital inclusion, better practices of the government, and works in the welfare of the citizen Sensitive information in the mobile Device The sensitive data of the mobile phones requires the data protection techniques for ensuring the restriction to the unauthorised access of data. The integration of data protection strategies helps in exploring the flow of data in the smart cities. The Smart sustainable cities require protection measures to secure data from the potential cyber threats. The RFID security mechanism should be used for protecting data from the occurrence of the privacy risks. The explosion of data can be protected by involving the real time information management system which is used for storing and retrieving the data securely (Cheung, 2015). The security system should involves the development of the key management system, technical management system, and identity management system. The cyber security governance framework should be deployed for coordinating the efforts of the government and the citizen to cope up with the problem of data leakage in the smart city. The multiple sensors are used for collec ting information at the central location so that only the authorised person will get the access of the information. The proactive monitoring tools are used for triggering the alarm to provide immediate response by the participating units. The integration of the data helps in taking better decision at the time of emergency. The smooth flow of knowledge transfer can efficiently carried out in the smart city. Maintenance of the privacy while using mobile phones: The communication between the mobile devices takes place through the unique digital identity of the user. The digital identities help in making interaction participating units for enhancing the sharing of information. The digital identities help in making secure relationship between users. The set of credentials are provided to the user for secure transfer of information. The security is the major concern in the development of smart cities. The devices working on the heterogeneous network faces the problem of insufficient authentication methods. Sometimes the devices are not able to encrypt data for transferring over the network. The vulnerabilities are associated with the management of poor session, weak credentials used for encryptions, and other cross site vulnerabilities (Lau, 2015). The configuration of the default credential should be done for providing secure communication. The management of the privacy can be done by performing the analysis of the base devices which are used for the communication. The flow of information between the connected devices through digital identity helps in restricting the flow of confidential information between the participating units. The security properties of the base devices should be checked. The verification of the interfaces should be done periodically. The validation and verification procedures should be checked for securing the high level requirement. The authorization and authentication protocols should be used for deploying the software as a service platform to check the identity of the participating units. The cyber security governance framework should be deployed for coordinating the efforts of the government and the citizen to cope up with the problem of data leakage in the smart city. The review of the secure code helps in creating sensitivity and security of the booting process by making use of encryption modules. The digital identity can be managed from the attacks by making use of mitigation policies and methods. The following tables helps in determining the attacks and what are the countermeasures to overcome the current scenario: Particulars Scenario of the Attacks Mitigation methods and policies Gateway The tampering and interception activities can occurred in performing the communication between the participating units The secure socket layer should be used incorporation with transport layer security for overcoming the situation of tampering and interception in the communication process (Shacklett, 2013) Service Denial of service attack is the main concern area for the spoofing of identifier The secure socket layer should be used incorporation with transport layer security (Gong, 2015) Monitoring of the server for keeping proper management of the traffic control Web Interface The data theft can occur in the MySQL database by making us of SQL query The parameterised SQL statement should be used for creating the databases Sanitizing should be done for SQL injection Communication with the third party application The tampering and interception activities can occurred in performing the communication between the participating units The secure socket layer should be used incorporation with transport layer security for overcoming the situation of tampering and interception in the communication process Data stores The use of weak credential can be easily hacked by the hackers to get the authorization of the information Collection of required data High level credentials The flow of information between the connected devices through digital identity helps in restricting the flow of confidential information between the participating units. The procedure of authentication and authorization helps in managing the flow of confidential and sensitive information between the units which have the authorization for it. The hackers are not able to break the information of the remote command. The robust identity technology management system should be used for managing the flawless communication between the users and preserving the confidentiality of the information. Steps which should be undertaken to maintain digital Identity: The steps which should be undertaken to ensure the security and privacy of digital identity while working on mobile devices in the smart cities are as follows: The transfer of data should be equipped with the end to end encryption of the data stored in the mobile devices. This is the cost effective methods for carrying secure transmission of data (Kelvin, 2015). The strong password should be created for restricting the data transfer to the unauthorised person. It is not easy for the hackers to crack the strong password to get the access of the information to perform illegal activities. Periodically, the firewalls and antivirus should be kept updated. The steps should be taken to create audit logs The trusted resources should be kept isolated from the public resources The manuals should be incorporated with the use of every system The data protection strategy should be developed to restrict the profiling and collection of process data (Eriks, 2016) The digital access control system should be used for ensuring the authorisation to the people to access the sensitive data of the mobile devices. It is used for allocating the information to the authorised party only. Privacy enhancing technologies are used for protecting the information related to the digital identity of the person. The coherent system for ICT technology is used for eliminating the personal data. It helps in securing the digital identity of the person and helps in retaining the confidentiality of the information. This technology is used for handling the information of the data brokers and web browsers. The tools which are used by the PET technology are classified as ad blocker, removers, cookie blocker, detection of the malware, blocking of the site, encryption tools, and services used by the data brokers (Brown, 2015). The cyber security framework should be adopted Cyber security checklist should be issued. Encryption, authentication, and authorisation programmes should be implemented. The relationship can be developed between the users with the use of digital identities (Morris, 2015). The encrypted messages should be sent between the communicating units to preserve the confidentiality of the information. Conclusion: The development of the sensor network in the city helps in bringing the vast changes in the lifestyle of the resident citizen of the Hong Kong and Singapore. The deployment of mitigation technologies helps in managing the security of the free flowing information between the participating units. The confidential information should be kept private with the public resources to reduce the chance of data leakage. References: Lau, Y. (2015).Cyber in cloud: Risks and Response in Hong Kong, Singapore. Retrieved from https://books.google.co.in/books?id=meycBAAAQBAJpg=PA17lpg=PA17dq=Cyber+crime+in+cloud:+Risk+and+response+in+hong+kong,+Singapore+(Lau,+2015)source=blots=E74oC22JImsig=F5YeKV3Qr8zqRcenWz9kgHFONaUhl=ensa=Xved=0ahUKEwi_vdmnquvVAhXBo48KHWB-DUcQ6AEIOzAC#v=onepageq=Cyber%20crime%20in%20cloud%3A%20Risk%20and%20response%20in%20hong%20kong%2C%20Singapore%20(Lau%2C%202015)f=false Cheung, C. (2015).Cyber crime risks and responses: Eastern and western perspectives. Retrieved from https://www.palgrave.com/us/book/9781137474155 Sarre, R. (2010).Cybercrime and computer digital forensics. Retrieved from https://onlinelibrary.wiley.com/store/10.1111/(ISSN)1365-2575/asset/homepages/Ver05FinalverISJSpecial_Issue_ICCCf2017Aus.pdf;jsessionid=884F13F162E5FDC3F1394EC75F571EED.f01t02?v=1s=72299830be90d546796cdd5b89e67424a69b4b67isAguDoi=false Martin, A. (2016).Security and privacy impact of a unique personal identifier. Retrieved from https://www.politics.ox.ac.uk/materials/publications/14987/workingpaperno4martinmartinovic.pdf Bemile, R. (2011).Digital identity management. Retrieved from https://www.oecd.org/sti/ieconomy/49338380.pdf Eriks, R. (2016).Consumer digital identity. Retrieved from https://diacc.ca/wp-content/uploads/2017/02/Consumer-Digital-Identity-Companion-Paper.pdf Wang, W. (2009).The role of digital identity management in the internet economy. Retrieved from https://www.umic.pt/images/stories/publicacoes5/eID%20Management.pdf Gong, L. (2015).Smart Traffic light. Retrieved from https://www.cmu.edu/epp/people/faculty/course-reports/SURTRAC%20Final%20Report.pdf Morris, D. (2015).Smart cars meet smart signals. Retrieved from https://fortune.com/2015/08/20/smart-traffic-signals/ Kelvin, M. (2015).Issues paper on smart cities and infrastructure. Retrieved from https://unctad.org/meetings/en/SessionalDocuments/CSTD_2015_Issuespaper_Theme1_SmartCitiesandInfra_en.pdf Brown, R. (2015). Smart cities and the internet of things. Retrieved from https://h20195.www2.hpe.com/v2/getpdf.aspx/4AA6-5129ENW.pdf?ver=2.1 Shacklett, S. (2013).Cyber security, data protection, and cyber resilience in smart sustainable cities. Retrieved from https://www.google.co.in/url?sa=trct=jq=Sensitive%20information%20in%20the%20mobile%20Device%20can%20be%20affected%20with%20the%20wifi%20connection%20to%20develop%20smart%20citiessource=webcd=3cad=rjauact=8ved=0ahUKEwix-qrfm-3VAhWLO48KHVNwBPoQFggwMAIurl=https://www.itu.int/en/ITU-T/focusgroups/ssc/Documents/website/web-fg-ssc-0090-r7-technical_report_on_ICT_infrastructure_for_resilience_security.docusg=AFQjCNEng1BIXOnPYOfO-TqMEMAH1wPy0Q Chia, J. (2015).Cyber security a necessary pillar of smart cities. Retrieved from https://www.ey.com/Publication/vwLUAssets/ey-cyber-security-a-necessary-pillar-of-smart-cities/$FILE/ey-cyber-security-a-necessary-pillar-of-smart-cities.pdf Cerrudo, C. (2015).Keeping smart cities smart: Preempting emerging cyber attacks in U.S. cities. Retrieved from https://icitech.org/wp-content/uploads/2015/06/ICIT-Smart-Cities-Brief1.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.