Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment item 5 Project Closure: Project Report (Blog) and Seminar Value: 40% Due date: 30-May-2018 Return date: 21-Jun-2018 Submission method options Alternative submission method Task For...

1 answer below »
Assessment item 5
Project Closure: Project Report (Blog) and Semina
Value: 40%
Due date: 30-May-2018
Return date: 21-Jun-2018
Submission method options
Alternative submission method
Task
For the Group OPTION: The Capstone Seminar is submitted by the group as a group seminar.
WHAT TO DO:
1. Project Closure: Final Blog Entry and Evaluation of the Value of the Project Documentation (10%)
1. The purpose of this assessment is to produce a discussion that will be supported by and include your literature review with references from respected sources from Assessment Item 2.
2. your references in APA style (http:
student.csu.edu.au/study
eferencing-at-csu)
3. Ensure that the Project Blog by you is your own work and has not been submitted elsewhere and complies with the University's requirements for academic integrity.
2. Present a Capstone Project Seminar (30%).
1. The time has been deliberately limited to 10 minutes to force you into selecting the most appropriate subset of information to present for this situation and you will be heavily penalised if you take more than 15 minutes.
2. NOTE: If doing a video presentation (YouTube, Vimeo etc) then try to halve the time for the online audience. (Question time does not count as part of the presentation time.)
3. This seminar can be to a live class of peers or online as a video presentation, outlining the results of your Capstone Project.
4. The seminar should be accompanied by appropriate audio/visual tools such as a set of presentation slides or examples of hardware/software/systems that are necessary for the audience to understand and follow your presentation.
5. You may be asked questions from the audience after your presentation.
6. Please ask your local supervisor for the date, time or the URL of the Online Video you will be presenting. Presenting a seminar also demonstrates that you have understood the project work that has been ca
ied out.
Seminar Logistics Planning
The seminar format will vary within the context of each cohort, but these notes will act as a guide to the seminar format.
The recommended format is to follow the 6 plus 4 model: This means that for "live" seminars you will get 6 minutes to talk about the project plus 4 minutes of question time, with a further 5 minutes allocated for "overtime speakers" and change of presenters. In this format then the "live" classroom seminar can handle 4 seminars per hour. For recorded or online seminars, the "plus 4" for question time will be replaced by assessing the time, effort and quality of the recording.
The “live” classroom seminar for large classes will not be practical, so you may also be asked to do the seminar as a recorded 6-minute video (YouTube, Vimeo etc or on flash drive, CD or DVD – as long as the marker has access) to increase the throughput of presenters.
For individuals then the seminar is 6 minutes long however for a single group seminar report, each member speaks for 2 minutes of the total of 6 minutes and is assessed individually on their contribution to the team effort.
Answered Same Day May 19, 2020

Solution

Amar answered on May 28 2020
143 Votes
Security of Internet of Things (IoT) and Big Data
First Name Last Name
Email ID
School of Computing and Mathematics, Charles Sturt University, Melbourne, Victoria
Abstract
IoT makes it possible for any of the device in having the ability for connecting to any of the other devices by way of internet. In cu
ent scenario, new devices that has ability to link to internet becomes a key selling point and with IoT laying emphasis over collection of data across various sources, the same makes it highly useful over the many ways for enhancing in which even normal day to day activities are undertaken. The significant volume in data which shall be arising from that of devices offers increased level of challenges for the solution providers concerning IoT. The solutions from Big Data shall aid in overcoming these challenges by way of offering the capability for analysing data, as well as discovering the relevant form of trends as well as patterns. In this context, this study with a focus to study the security aspects with respect to IoT and Big Data offers critical significance to enhance and add value to cu
ent studies in this context. The aims of this research include the determination of factors that impact the security level of Big Data, proposing the measures which are required to maintain the security level of big data, and proposing the levels of security IoT need to possess for not harming privacy of big data and limit access of data to secured devices alone. The data collection entailed detailed searching of literature by employing suitable search criteria and appropriate search strategy for undertaking detailed review of literature in the context of this study. The data analysis of the data collected was by way of employing a qualitative form of critical, logical and comprehensive analysis. The results, outcome, analysis, discussions, etc. are presented in detail in this report.
Key Words – Internet of Things (“IoT”), Big Data, Big Data Analytics, Data Security, Privacy, and, Device Security
Contents
Abstract    2
1.    INTRODUCTION    4
Section 1: Significance of the research    4
Section 2: Research Approach    5
Section 3: Literature Review    5
Section 4: Research Gap    14
Section 5: Research Aims    14
2.    MATERIAL & METHODS    15
Section 1: Data Collection    15
Section 2: Data Inclusion Criteria    15
Section 3: Data Analysis    15
3.    RESULTS    16
4.    DISCUSSION    16
Section 1: Factors that Impact the Security Level of Big Data    16
Section 2: Measures Required to Maintain the Security Level of Big Data    17
Section 3: Level of Security IoT Needs to Possess for not Harming Privacy of Big Data & Secure Data Access    19
5.    CONCLUSION    20
References    21
1. INTRODUCTION
Section 1: Significance of the research
Internet of things (“IOT”) makes it possible for any of the device in having the ability for connecting to any of the other devices by way of internet. In cu
ent scenario, new devices that has ability to link to internet becomes a key selling point and with IoT laying emphasis over collection of data across various sources, the same makes it highly useful over the many ways for enhancing in which even normal day to day activities are undertaken. The significant volume in data which shall be arising from that of devices offers increased level of challenges for the solution providers concerning IoT. The solutions from Big Data shall aid in overcoming these challenges by way of offering the capability for analysing data, as well as discovering the relevant form of trends as well as patterns.
The overall collection, its storage, manipulation as well as retention concerning significant amount of data had led to serious considerations of security as well as privacy issues. The varied set of regulations from regulating bodies is being identified for handling Big Data such that privacy for individuals cannot be violated. To take an example, even in case personally identifiable form of information gets removed from data, while the data gets combined with different other data, the concerned individual could be identified. The same can essentially be noted as inference as well as the aggregation related problem which researchers in data security are continuing to explore over years decades. The said problem can be stated to be further exace
ated on account of the management concerning Big Data with varied sources for data at present exist which are affiliated with various individuals.
In this context, this study with a focus to study the security aspects with respect to IoT and Big Data offers critical significance to enhance and add value to cu
ent studies in this context.
Section 2: Research Approach
At the outset the research approach can be stated to be inductive with the research undertaken in an exploratory manner. The approach shall encompass detailed review of literature in the context of this study, determine the research gaps, develop suitable research aims and then proceed to address them based on the data collected from the review. A detailed literature searching shall be pursued employed suitable search criteria and appropriate search strategy.
Section 3: Literature Review
Patil & Seshadri (2014) in their study "Big data security and privacy issues in healthcare" state that by way of the cost affiliated to healthcare that is ever-increasing as well as the increased levels of premiums for health insurance, there seems to be requirement for the proactive form of healthcare as well as wellness measures. Further additionally, the newer trends with respect to the digitizing of medical records have led to significant shifts within healthcare industry and on account of the same healthcare domain experiences increases with respect to increased volume over data with respect to timeliness, diversity and complexity. While the experts in healthcare domain seek for all possible ways for lowering costs and at the same time enhancing the process of healthcare, management / delivery, Patil & Seshadri (2014) state that big data can be considered as the effective solution that encompasses potential for transforming overall healthcare industry. The said paradigm transformation from that of reactive one to that of proactive healthcare could lead to overall reduction with respect t0 healthcare costs as well as consequently result in an economic growth. Whilst the overall healthcare industry shall harness this opportunity, Patil & Seshadri (2014) state that big data, privacy as well as security issues forms the crucial point as the threats as well as vulnerabilities which emerge continue in growing. Patil & Seshadri (2014) present various critical security as well as privacy concerns pertaining to big data in the context of its application for the healthcare industry.
Ahmed & Saeed (2014) in their paper titled "A survey of big data cloud computing security" state that Big Data as well as cloud computing represent two of the key issues over the recent times, enabling computing resources for being provided in the form of Information Technology (“IT”) services possessing higher levels of efficiency as well as effectiveness. In the present times, big data represents one amongst the key problems which the researchers strive in resolving as well as focus over their researches with respect to the same for addressing the the problems concerning the ways in which big data can be managed within the context of advanced systems as well as managed within cloud of computing. Further one amongst the highly critical issue shall be ways for gaining the ideal security with respect to big data within the contexts of cloud computing. Ahmed & Saeed (2014) undertake review of the survey concerning big data in terms of security in clouds computing as well as modes that were employed for protecting as well as securing in addition have the privacy with respect to big data available within cloud platforms.
Al Mutairi et al. (2015) in the paper titled "Security and privacy of big data in various applications" state that on account of increasing trends with respect to application of technology as well as the all of the affiliated resources like that of computers, Internet network, smartphones, social media platform / networks, levels of data that is already existing, etc. are also on an increasing trend. The outcome from this growth can be leading to Big Data and in the cu
ent scenario big data has become essential form of source with respect to information which effectively feed the organizations as well as affect economies as well as the global level decisions in the manner of enhancing the operational level efficiencies as well as enhancing the overall performances as well as that of detection concerning threat of attacks at a global level. Data essentially comprises private as well as the sensitive form of information which is required in being kept safe and secure, and in this context, Al Mutairi et al. (2015) discuss highly critical set of security concerning big data with respect to various set of applications.
Khan & ur Rehman (2017) in the study titled "A review on big data security and privacy in healthcare applications" state that with respect to increasing levels of utilization concerning equipment that ere technologically advanced within the domains of healthcare, biomedicine as well as medicine wherein collection of the data from patients across various hospitals becomes highly essential. The accessibility with respect to data in a centralized location shall be appropriate such that the same could be utilized when required with respect to any of the pharmaceutical related feedback, reporting of equipment, analysis as well as the results pertaining to any of the disease as well as much more. The data so collected could in addition be suitably employed for purposes of predicting or else manipulating as well as the health crisis that are upcoming on account of any virus epidemic, disaster, or else other climatic changes. The data collected from varied set of health affiliated entities or else from the patients shall lead to certain serious questions over integrity, leakage, privacy as well as security concerning the said data. Khan & ur Rehman (2017) discuss in detailed various aspects pertaining to Big Data, application within healthcare, affiliated issues and challenges with respect to its pre-deployment, platforms / solutions etc. In addition, Khan & ur Rehman (2017) also discuss data security, data privacy, accessing mechanisms of the users, procedures for authentication as well as the privileges
Ma & Jiang (2014) in their study titled "Chances and challenges confronting securities industry and the countermeasures in big data and cloud computing era" state that in addition to the increasing levels of application concerning big data mining that are based over cloud computing are being undertaken across the global in daily life and application. The same in addition has
ought about significant transformation within the securities industry....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here