country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Data Warehousing And Data Mining Over Cloud

tag 0 Download12 Pages 2,951 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Data Warehousing and Data Mining over Cloud.
 
 

Answer:

Introduction

Kentico is an organization that is based out of Australia and deals in the domains of e-commerce along with online marketing. It provides web solutions and services to its customers which involves huge clusters of information. In order to deal with the information sets and streamline the activities, it has been decided by the senior management to move the database of the organization to cloud/NoSQL. It will provide enhanced storage options and will also carry out the operations on the data easily. SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis of the project has been explained and discussed in the report.

Description of current/new ICT service: In order to deal with the information sets and streamline the activities, it has been decided by the senior management to move the database of the organization to cloud/NoSQL. It will provide enhanced storage options and will also carry out the operations on the data easily.

The volumes of information that Kentico deals with is dynamic in nature which may show sudden rise and drops in a specified period of time. It is essential that the design of the database is done in such a manner that the database is flexible and scalable in nature. The recommended cloud and NoSQL databases will fulfill the need and the feature of scalability will be present in the same.

There are several users of the information that is associated with Kentico. These users may be internal to the organization and may also be external to the organization. The user privileges would therefore be required to be defined to control the access associated with each of the user type. Cloud and NoSQL databases will provide the opportunity as administration on the data will be convenient.

The data in the database will be easily monitored and there would be automated backing up of the data that would be allowed with the use of cloud and NoSQL database. There will also be enhanced disaster recovery mechanisms installed with the use of the database.

The management and financial team of the organization is efficient to carry out a detailed cost benefit analysis on the changes and will conclude that there will be a lot of cost savings with the implementation of the system.

 

Due to the presence of traditional databases, there are a number of operational issues and errors that come which bring down the morale of the employees. With the involvement of cloud databases, these errors will be avoided which will not only enhance the levels of employee satisfaction but will also increase the level of productivity and efficiency. It is not always easy to accept the changes and adapt easily to them. There will be many changes that will be introduced with the implementation of cloud or NoSQL databases which will bring a lot many changes in terms of strategy, methodology along with operations. The employees may show resistance to adapt to the new system in the initial stages.

There will be an extra share of costs that would be required to be spent towards training of the employees. Without providing the employees with the required amount of training, there will be confusion in their minds. It would therefore be necessary to spend on trainings.

There may be chances wherein the specific skill sets required for the cloud databases and related operations may not be present in the organization. It will demand external hiring which will turn out to be an expensive procedure.

The change in the database may be attacked with a lot many security risks and concerns which may become difficult to deal with (Hashizume, Rosado, Fernández-Medina, & Fernandez, 2013).

Migration from the traditional systems to the new system will not take place in a few minutes. It will require a considerable amount of time which may be considered as a downtime for the system as there will be a lot of maintenance activities that will also be carried out. System availability may get impacted negatively due to these reasons. 

The processing speed associated with the data and data operations will improve and there will also be better streamlining of the information that will be observed.

In spite of spending on the trainings of the employees, there will be a lot of cost saving that will be achieved with the medium of adaptation to the advanced databases.

Cloud databases and NoSQL databases have a huge demand in the market. It would therefore be beneficial for the employees to acquire the skills associated with the same to enhance their worth in the market.

The ability to carry out data related operations will become easy and convenient in case of Kentico which will provide the organization with a competitive edge above the rest of the organizations in the market.

Time and effort that is currently involved in certain unnecessary activities will be available to be applied to rest of the important functions and activities to enhance the quality and availability of the system for better user experience

Cloud databases along with NoSQL databases will bring in a lot many access points. These access points may be used by the attackers to gain unauthorized entry to the databases which may result in the security threat of information breaching (Amato, 2016).

Many of the malware have been developed to attack the cloud databases which may be launched and triggered to cause damage to the information present in the database of Kentico (Jansen, 2016).

The information will be exchanged frequently over the network which may bring in another threat in the form of information loss or information leakage.

 


Networks will be actively involved with the inclusion of cloud databases which will lead to the emergence of the network security risks and attacks such as man in the middle attack, spoofing attacks, integrity attacks and many more (Pearson & Benameur, 2016).

Database availability will be desired by the end users and it will be mandatory for the execution of certain functions and operations. However, there may be attacks on the availability of the database which may bring down the levels of satisfaction of the end users (Kshetri, 2016)

There are a lot many resources that are engaged with Kentico and these resources will be provided with the access to the database along with varied privilege on the same to perform data related operations. Some of the employees may take advantage of the privileges granted to them and may pass on the critical information to the malicious entities for their personal benefits. These attacks will come under the category of insider threats and will cause a lot of damage to the organization (Aws, 2016).

Access and identity management are some of measures that are adapted to enhance the basic security of the system and any loopholes present in these measures will cause a lot of damage to the organization (Jing, 2014).  

It would be required to immediately create a training plan for the resources engaged with Kentico to allow the employees, management along with the heads of the departments to be clear on the features and functions of the new database that will be implemented. Security framework associated with the database and information sets will also be required to be modified with immediate actions taken on the security plan modification along with implementation of changes in the security strategy.

It will be extremely necessary to ensure that the training plan and the security strategy that is created in the initial phase is implemented successfully and there are measures taken to bring improvements to the same by collecting the feedback from the users at regular intervals.

Maintenance will be an ongoing process in the case of cloud databases along with that of the NoSQL databases. A detailed assessment of the level of improvements that will be necessary in terms of maintenance and support will be required to be done. The overall security infrastructure along with the security framework will also be required to be re-designed so that the latest measures can be adopted to enhance the basic as well as the advanced security of the database (Ryan, 2016). It would also be necessary to make sure that verification and validation activities are carried out in a frequent manner.

 

Cloud Database and Associated Database Operations

Expansion of cloud and NoSQL databases in the market has been rapid and there are a lot many organizations that are moving to these databases from the traditional ones. Cloud databases are the ones that make use of cloud computing for data storage along with the data management. NoSQL databases are the ones that do not involve the use of SQL queries and statements (Takabi, 2016).

Due to the presence of traditional databases, there are a number of operational issues and errors that come which bring down the morale of the employees. With the involvement of cloud databases, these errors will be avoided which will not only enhance the levels of employee satisfaction but will also increase the level of productivity and efficiency. The volumes of information that an organization deals with is dynamic in nature which may show sudden rise and drops in a specified period of time. It is essential that the design of the database is done in such a manner that the database is flexible and scalable in nature. The recommended cloud and NoSQL databases will fulfill the need and the feature of scalability will be present in the same.

Cloud databases and NoSQL databases have a huge demand in the market. It would therefore be beneficial for the employees to acquire the skills associated with the same to enhance their worth in the market. The ability to carry out data related operations will become easy and convenient in case of organizational implementation which will provide the organization with a competitive edge above the rest of the organizations in the market. Time and effort that is currently involved in certain unnecessary activities will be available to be applied to rest of the important functions and activities to enhance the quality and availability of the system for better user experience

Data Warehousing and Data Mining over Cloud

Business intelligence is an umbrella that comprises of numerous technologies and concepts within it. Two of the essential technologies that come under Business Intelligence are data mining and data warehousing. These technologies allow the user to carry out a detailed analysis of the data that is associated with the organization and to also manage the data easily and efficiently.

Cloud databases also support the use and implementation of logical data warehouses which are also termed as Logical DW. There are several properties, attributes and parameters that are associated with the data sets stored in the database. Logical DW will provide a logical view of the entire information sets which will allow the administrators and data managers to carry out the tasks of monitoring and maintenance easily.

Also, the analysis on the data will be easily carried out through the medium of these tools which will reveal a lot many trends and patterns associated with the data.

There are several risks and attacks that are associated with the cloud and NoSQL databases in terms of the security of the data and information (Sen, 2016).

Cloud databases along with NoSQL databases will bring in a lot many access points. These access points may be used by the attackers to gain unauthorized entry to the databases which may result in the security threat of information breaching. Many of the malware have been developed to attack the cloud databases which may be launched and triggered to cause damage to the information present in the database of an organization. The information will be exchanged frequently over the network which may bring in another threat in the form of information loss or information leakage. Networks will be actively involved with the inclusion of cloud databases which will lead to the emergence of the network security risks and attacks such as man in the middle attack, spoofing attacks, integrity attacks and many more (Bhabad, 2015).

Database availability will be desired by the end users and it will be mandatory for the execution of certain functions and operations. However, there may be attacks on the availability of the database which may bring down the levels of satisfaction of the end users (Mahmoud, 2015). There are a lot many resources that are engaged with an organization and these resources will be provided with the access to the database along with varied privilege on the same to perform data related operations. Some of the employees may take advantage of the privileges granted to them and may pass on the critical information to the malicious entities for their personal benefits. These attacks will come under the category of insider threats and will cause a lot of damage to the organization. Access and identity management are some of measures that are adapted to enhance the basic security of the system and any loopholes present in these measures will cause a lot of damage to the organization (Sun, Zhang, Xiong, & Zhu, 2014).

 

Countermeasures to Data Security

The security risks and threats that have been defined above can be controlled, prevented and detected with the application of a lot many security countermeasures (Lu, 2014).

The primary step to security would be in the form of enhancement of the basic security of the database which will include the use of automated tools and equipment such as that of anti-malware packages along with anti-denial tools. It will also be necessary to install proxy servers and firewalls to control the access.

The next step would include the enhancement of advanced security. The security strategy that shall be designed in this regard shall include the countermeasures in three categories as administrative, logical and physical controls. There shall be use of automated tools for evaluation and auditing purposes to make sure that any of the deviations are immediately tracked (Panetta, 2016).

There shall also be application of logical and technical controls that shall be done on the database. These controls will include use of intrusion detection and prevention systems, implementation of encryption of information, authorized monitoring of the network and so on (Wood, 2016).

Physical security is something that is usually not paid much attention; however, the case shall not be the same over here and physical security shall be enhanced across all the entry and exit points (Microsoft, 2016).

Conclusion

Data and information are the assets for any organization and it is extremely necessary to make sure that there is no damage caused to these assets and the operations that are executed around them are done in a smooth manner. The use of traditional databases in the organizations is creating a lot many problems in terms of handling, management and execution. It is therefore necessary to migrate to the cloud databases and NoSQL databases for efficient data management along with enhanced storage of the data. These databases will bring in a lot many benefits to the users in terms of processing speed, security framework, storage options, data backup and recovery measures and many more. Also, these are now being synced with the Business Intelligence and Big Data tools to enhance the quality and performance of the same.

 

References

Amato, N. (2016). The hidden costs of a data breach. Journal of Accountancy. Retrieved 3 May 2017, from https://www.journalofaccountancy.com/news/2016/jul/hidden-costs-of-data-breach-201614870.html

Aws. (2016). Overview of Security Processes. Retrieved 3 May 2017, from https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf

Bhabad, M. (2015). Internet of Things: Architecture, Security Issues and Countermeasures. Retrieved 3 May 2017, from https://www.ijcaonline.org/research/volume125/number14/bhabad-2015-ijca-906251.pdf

Hashizume, K., Rosado, D., Fernández-Medina, E., & Fernandez, E. (2013). An analysis of security issues for cloud computing. J Internet Serv Appl, 4(1), 5. https://dx.doi.org/10.1186/1869-0238-4-5

Jansen, W. (2016). Cloud Hooks: Security and Privacy Issues in Cloud Computing. Retrieved 3 May 2017, from https://www.computer.org/csdl/proceedings/hicss/2011/4282/00/10-03-01.pdf

Jing, Q. (2014). Security of the Internet of Things: perspectives and challenges. Retrieved 3 May 2017, from https://csi.dgist.ac.kr/uploads/Seminar/1407_IoT_SSH.pdf

Kshetri, N. (2016). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Sciencedirect.com. Retrieved 3 May 2017, from https://www.sciencedirect.com/science/article/pii/S0308596112000717

Lu, C. (2014). Overview of Security and Privacy Issues in the Internet of Things. Retrieved 3 May 2017, from https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf

Mahmoud, R. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures - IEEE Xplore Document. Ieeexplore.ieee.org. Retrieved 3 May 2017, from https://ieeexplore.ieee.org/document/7412116/

Microsoft. (2016). Core Infrastructure Optimization: IT & Security Processes - Best Practices for Business IT. Retrieved 3 May 2017, from https://www.microsoft.com/india/infrastructure/capabilities/itprocesses.mspx

Panetta, K. (2016). Gartner's Top 10 Security Predictions 2016 - Smarter With Gartner. Smarter With Gartner. Retrieved 3 May 2017, from https://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/

Pearson, S. & Benameur, A. (2016). Privacy, Security and Trust Issues Arising from Cloud Computing. Retrieved 3 May 2017, from https://barbie.uta.edu/~hdfeng/CloudComputing/cc/cc05.pdf

Ryan, M. (2016). Cloud Computing Privacy Concerns on Our Doorstep. Cacm.acm.org. Retrieved 3 May 2017, from https://cacm.acm.org/magazines/2011/1/103200-cloud-computing-privacy-concerns-on-our-doorstep/fulltext

Sen, J. (2016). Security and Privacy Issues in Cloud Computing. Retrieved 3 May 2017, from https://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf

Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal Of Distributed Sensor Networks, 2014, 1-9. https://dx.doi.org/10.1155/2014/190903

Takabi, H. (2016). Security and Privacy Challenges in Cloud Computing Environments. Retrieved 3 May 2017, from https://csis.pace.edu/~marchese/SE765/Paper/security2.pdf

Wood, P. (2016). Social hacking: The easy way to breach network security. ComputerWeekly. Retrieved 3 May 2017, from https://www.computerweekly.com/tip/Social-hacking-The-easy-way-to-breach-network-security
OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Data Warehousing And Data Mining Over Cloud. Retrieved from https://myassignmenthelp.com/free-samples/data-warehousing-and-data-mining-over-cloud.

"Data Warehousing And Data Mining Over Cloud." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/data-warehousing-and-data-mining-over-cloud.

My Assignment Help (2018) Data Warehousing And Data Mining Over Cloud [Online]. Available from: https://myassignmenthelp.com/free-samples/data-warehousing-and-data-mining-over-cloud
[Accessed 08 April 2020].

My Assignment Help. 'Data Warehousing And Data Mining Over Cloud' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/data-warehousing-and-data-mining-over-cloud> accessed 08 April 2020.

My Assignment Help. Data Warehousing And Data Mining Over Cloud [Internet]. My Assignment Help. 2018 [cited 08 April 2020]. Available from: https://myassignmenthelp.com/free-samples/data-warehousing-and-data-mining-over-cloud.


MyAssignmenthelp.com is the only dissertation service provider in Australia that provides cheap dissertation help while maintaining all quality standards. Hence, students, from various Australian cities prefer taking dissertation help from us. Sydney, Brisbane, Perth and Melbourne rank to when it comes to availing dissertation writing assistance from MyAssignmenthelp.com. Our dissertation writers, editors and experts work together to provide students highest quality dissertation help solutions. buy dissertation online from to acquire the final degree without any hassle.

Latest Samples

BUS700 ECONOMICS 3

Download : 0 | Pages : 11

Answer: Macroeconomic performance of Australia and USA Real GDP growth of Australia and USA   Column1 REAL GDP GROWTH RATE OF AUSTRALIA   Mean -0.07749512   Standard Error 0.221400338     Median -0.081144834   Mode #N/A   Standard Deviation 1.01458381   Sample Variance 1....

Read More arrow

MHP601-Problem Of Poor Mental Health For Adolescents

Download : 0 | Pages : 10
  • Course Code: MHP601
  • University: Laureate International Universities
  • Country: United States

Answer: Introduction with problem statement: Bullying and victimization is a global health concern that disproportionately affects adolescents or teenagers across the world. The statistics on prevalence of bullying in Australia suggest that one in every four year 4 to year 9 Australian students report being bullied in schools. Peers play a central role in bullying process and 72% of schools report at least incident of bullying in the previous...

Read More arrow

BUS106 Marketing Principles For Designing And Production Of Boats

Download : 0 | Pages : 6

Answer: Introduction OzCo Boats is a family-owned boat building industry based in Coffs Harbour, situated in New South Wales has been operating since 1961. It builds high quality and luxury boats that are made from traditional material. In the current scenario of technological developments, they have to embrace innovative technologies to compete with its competitors and needs to transform its traditional methods of production. If it is contin...

Read More arrow

MMM132-Analysis Of The Scentre Group with Organization System

Download : 0 | Pages : 3
  • Course Code: MMM132
  • University: Deakin Business School
  • Country: Australia

Answer: Analysis of the Scentre Group with Organization System Open System of Scentre Group  Open system is referred to as a non proprietary system which this based on a standard set of interfaces those are publicly known. It is responsibility of the company to design and develop the most suitable organizational system so that the company can deliver approximately equal or additional beneficial result as outcomes. The open system o...

Read More arrow

MBA502 Professional Workshop For Self Awareness And Work Performance

Download : 0 | Pages : 7
  • Course Code: MBA502
  • University: Kaplan Business School
  • Country: United States

Answer: Part one  Chosen topic- Self awareness (From workshop week 2) Activity name Description   Time needed   Expected Outcomes   Things to consider (instructions)   Expected barriers   1. Adjective game  This activity is about giving an adjective to own self and to others and then to see whether self given adjectives and the adjectives chosen by others ...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,247,995

Orders

4.9/5

Overall Rating

5,068

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

610 Order Completed

100% Response Time

Cheryl Zhao

PhD in Statistics

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1265 Order Completed

97% Response Time

James Cook

Masters in Management

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Good work. it was on topic base, understandable and relevant. Help me to achieve great mark. Really appreciate.

flag

User Id: 78040 - 08 Apr 2020

Australia

student rating student rating student rating student rating student rating

got assignment completed on time. I had lot of important information and up to the point.

flag

User Id: 299002 - 08 Apr 2020

Australia

student rating student rating student rating student rating student rating

I was so excited to share my experience. I had Peter help me with assignment. He did and exceptional job that I couldn\'t believe it. I got an A+ PERFECT SCORE! ALL i can say is WOW! THANK YOU.

flag

User Id: 307193 - 08 Apr 2020

Australia

student rating student rating student rating student rating student rating

Excellent work from the teacher. I got excellent marks and Assignment help had given the. assignment in the time.

flag

User Id: 213317 - 08 Apr 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?