Thanks in advance
(1)The team has successfully examined the phases of a software development life cycle, defined the scope, and analyzed requirements for the project. Now you must begin your research into the Hadoop cloud environment to better understand what it takes to secure data in the cloud. To learn more about databases, review the following: Database Models
Do some quick independent research on Hadoop and the cloud as it applies to this assignment.
(2) Once the team members have completed their functional analysis and design in the previous step, provide a summary on analysis and planning for the evaluation of the technologies and/or techniques examined for protection of client data in transit. To prepare, click the following links and learn more about virtualization and cloud computing:
Server Virtualization
Benefits and Features of Cloud Computing
Mobile Cloud Computing
To be completed by a designated team member:
Compare different technologies and techniques, including encryption, access control, and other technique; consider their efficiency, effectiveness, and other factors that may affect the security of the data in the cloud. Include your reasoning and conclusions in your evaluation. Conclude which is generally a better, stronger technique and why.
You will include this summary in your report.
In the next step, the team will work on system design specifications.
(3) In the last step, the team completed an analysis of technologies and techniques. For this step, provide system design specifications for a data-in-transit protection model.
Describe a fictitious infrastructure or model a real-world key management Infrastructure, citing sources using APA format.
You will include these specifications in the final report.
For the next step, the team is ready to explain the software development plan.
“0.
Discount Code: 0
: +1 0 0-0
0..