Cloud Security and Data Control

Verified

Added on  2020/03/23

|8
|2601
|266
AI Summary
This assignment delves into the security challenges posed by cloud computing. While traditional security functions are employed in cloud services, hackers have found ways to circumvent these protocols with ease due to diverse vendor practices and the migration of data to unknown locations via cloud providers. The lack of control over databases in this context is highlighted, raising concerns about data security and confidentiality.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Student name CLOUD COMPUTING
CLOUD COMPUTING
Student Name:
Student id:
Course Code:
Lecturer Name:
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Student name CLOUD COMPUTING
Table of Contents
1. IaaS instance hosted by AWS/Azure.............................................................................................3
1.1. Security Controls implemented by Aws/Azure to protect IaaS instance................................3
1.2. Benefits and limitations of the Security Controls...................................................................3
2. Risks associated in the Database Migration...................................................................................4
2.1. Risks associated with the migration of the database..............................................................4
2.2. Risks associated with the migration of IaaS infrastructure.....................................................4
2.3. The communications between Webb’s and their IaaS database in the cloud..........................4
3. Using Cloud for Backup and Archival of Records.........................................................................5
3.1. Backing up data to the Cloud.................................................................................................5
3.2. Storage of data in the Cloud...................................................................................................5
3.3. Retrieval of data from the cloud............................................................................................5
3.4. DR plan of the CSP................................................................................................................6
4. Cloud Management........................................................................................................................6
4.1. Their IaaS infrastructure........................................................................................................6
4.2. Their Ms SQL Server 2012 R2 cloud instance.......................................................................6
4.3. Their Cloud network infrastructure........................................................................................7
4.4. Their Cloud backup and restore infrastructure.......................................................................7
References.............................................................................................................................................8
2
Document Page
Student name CLOUD COMPUTING
1. IaaS instance hosted by AWS/Azure
The Webb’s retailer store has decided to move their database MS SQL Server 2012 R2 to the IaaS
instance in the cloud. There are some consequences faced by the organizational database regarding the
privacy and security of their information (Banerjee et al., 2015). The whole idea of this report is to
discuss the aspects of the Cloud approach in the organization and thus how much is it efficient to
increase the productivity and security of the database in the company selected. In this section we will
be discussing about the impact of the strategies.
1.1. Security Controls implemented by Aws/Azure to protect IaaS instance
The cloud server for SQL has been selected on Azure VMs (IaaS) over the database of MS SQL
Server 2012 R2 database. A SQL server on Azure Virtual offers total control over the Windows but
also executes cross-database transaction and offers the SQL server (Callegati et al., 2014). This cloud
server permits facilitating of different databases according to require and is perfect with SQL server.
The hosting of the SQL Server in the Clouds are done on the Windows Server Virtual Machine
(VMs) which runs on Azure (Bourguiba et al., 2014). This platform is also called the IaaS
(Infrastructure as a Service). Migrating the present application of SQL servers where every other SQL
server application’s version and edition are present. This likewise executes cross-database exchange
however offers add up to control over the SQL server and Windows (Bruneo, 2014). SQL Server or
the Azure Virtual Machines (VMs) goes in close vicinity to the class Infrastructure as a Service (IaaS)
that has the office to run SQL Server inside the virtual machine in the mists essentially for the online
business site in the retail location inside the private cloud that is versatile and secure (Drutskoy, Keller
& Rexford, 2013). The execution of Hybrid Cloud is mainly IaaS for the most part has this Policy
based for the e-commerce websites. And are private clouds that are scalable and secure.
1.2. Benefits and limitations of the Security Controls
Reduction in the operational costs along with increase in the effectiveness of Information
Technology (Ferretti et al., 2013)
Reduction of increase in traffic that may makes difficulty for resource scaling
Faster implementation of the applications as well as deployment for the customers
Helps in business expansion (Kumar & Charu, 2015)
Problems such as over growth of the storage can be reduced strategically
Though there are several security issues regarding then scenario of the retail shop:
Hardening of Infrastructure
End to End Reporting and Logging
Authentication and Authorization (Lin, Chen & Lin, 2014)
End to end encryption
3
Document Page
Student name CLOUD COMPUTING
Usage Monitoring and Data Leakage Protection
2. Risks associated in the Database Migration
The risk and drawbacks associated with the migration are generally associated with the IaaS
infrastructure, database and Communications between the Webb’s store and their IaaS database in the
cloud (Malhotra, Agarwal & Jaiswal, 2014).
2.1. Risks associated with the migration of the database
Data Loss Risk: In the midst of the data migration process, data adversity can happen. Right
when the data is migrated to the new system or target structure, a bit of the data may not
move over from the source structure (Bourguiba et al., 2014). This peril can be avoided by
coordinating data movement testing.
Data Corruption Risk: Information defilement can simply happen at whatever point the
association applies terms and condition and approval over the focused on framework
(Callegati et al., 2014). This may make the undesirable information relocate to the new
framework influencing the framework with accidents and data debasement. The end client of
the application consequently may confront a few issues with respect to the framework.
Target Application Parameterization Risks: The parameterization chances dependably
identifies with the focused on applications (Ferretti et al., 2013). In the event that there are
couple of limitations, the focused on framework can wind up noticeably inconsistent with
projects of information movement, prompting potential blunder in the framework presented.
Movement of information is an extraordinary procedure to battle these dangers.
2.2. Risks associated with the migration of IaaS infrastructure
Semantics Risk: Semantic mistakes can happen at whenever if even the relocation procedure
of information has been done proficiently (Tao et al., 2014).
Extended Downtime Risk: The extended out down time the risk comes when the information
relocation process takes substantially more time than anticipated.
Application Stability Risk: The focused on framework or the focused on application gets
temperamental now and again for various reasons that may incorporate uncalled for
advancement, wrong coding or shameful coding of the new application in the prerequisite of
the business in the new framework (Swathi, Srikanth & Reddy, 2014).
Interference Risk: Interference Risk can make trouble when more than one partner influences
utilization of the application when the relocation to process invigorates.
2.3. The communications between Webb’s and their IaaS database in the cloud
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Student name CLOUD COMPUTING
The IaaS Providers provides development option to more than one platforms: mobile, browser,
and so on. This is an easy way to do things that the organization wants to develop the software, and
thus this can be accepted from multiple platforms (Sharma et al., 2016).
3. Using Cloud for Backup and Archival of Records
By and large the current applications that require quicker relocation with least changes in the
mists are executed by the SQL Server in Azure Virtual Machine.
There is a prerequisite of quick advancement and analyse the situations in the event of not
purchasing the SQL server equipment (Hu & Kaabouch, 2014).
There are groups which can oversee and design the higher accessibility, recuperation from
calamities and fixing for SQL servers. To disentangle the administration issues some
robotized include are given significantly in the framework programming (Callegati et al.,
2014).
The occasion of 64TB SQL Server bolsters numerous databases according to the prerequisite.
Aides in movement and developing ventures and additionally Hybrid application.
With IaaS out in the open cloud, the VMs and the administration running can be controlled
(Banerjee et al., 2015).
Eliminated the cost of Hardware.
3.1. Backing up data to the Cloud
There are four risks which are to be considered with backup data to the cloud (Swathi, Srikanth &
Reddy, 2014):
Security
Lack of standardization
Control over data
Outage
3.2. Storage of data in the Cloud
There are six main risks associated while storage of data to the clouds (Lin, Chen & Lin, 2014):
No control over the data
Key management
Snooping
Leakage of data
BYOD (Bring Your Own Device)
Cloud Credential
3.3. Retrieval of data from the cloud
5
Document Page
Student name CLOUD COMPUTING
Requires higher internet connectivity: High internet speed is required. The accessibility of the
database can be let down by any of the issues related to loss of data. Bad connection of
internet may result in interruption of data retrieval (Ferretti et al., 2013).
Data storage in the third party server: It is vital to search for a valued and trusted cloud
service provider to avoid getting loss of data by third party server. This may also provide the
offers of top-level and contending service (Bourguiba et al., 2014).
Determine the bandwidth allowance: It is important to limit the allowance since most of the
service provides unlimited bandwidth for the retrieval of data that may cost more.
3.4. DR plan of the CSP
The disasters occur often without any notice and strikes down the business any time. Hence there
are several advantages of hosting DR program in the clouds:
Efficiency: large servers and associated hardware are eliminated since the data is stored in the
clouds.
Scalable: The options of the cloud can easily be scaled depending on the business requirement
(Kumar & Charu, 2015).
Cost effective: The cloud server provider often changes the service thus business has to pick
properly which cost should be effectively used. Delay of this may cause immense loss in the
cost.
Elimination of Disks, back-up tapes and many more: In real time data backups can be done
hence there is no requirement to keep maintaining the backups by using tapes and disks
(Ferretti et al., 2013).
Easily implemented with high reliability: Difficulty is faced while restoring the functions that
are carried out, other than that the tapes, disks, flash drives are suppose to be durable.
Mission-critical data can be kept off-site: The cloud providers have the DR plans within
places thus the servers are redundantly designed and are huge.
4. Cloud Management
4.1. Their IaaS infrastructure
There are several advanced choices given by the IaaS providers like the programs, portables and
many more. The preferable security can be provided by the IaaS cloud provider. IaaS is itself an
infrastructure that provides resources to the virtualized computing over the internet. The security
provided by the association’s primary business (Tao et al., 2014).
4.2. Their Ms SQL Server 2012 R2 cloud instance
The SQL Server are installed and thus hosted in the clouds. This is done over the Windows Server
Virtual Machine (VMs) which runs on Azure which is also known the IaaS (Infrastructure as a
Service). On Azure Virtual machine the SQL server has been optimized to migrate to the existing
application of SQL server (Swathi, Srikanth & Reddy, 2014). Cross-data transaction has been
included but this also offers total control over the Windows and SQL server. SQL server or the Azure
6
Document Page
Student name CLOUD COMPUTING
Virtual Machine (VMs) serves IaaS and allows running SQL server inside the virtual machine in the
clouds.
4.3. Their Cloud network infrastructure
Profoundly adaptable assets have been offered by the IaaS stages which are balanced as per the
requirement. The regulatory assignments mechanization are different in qualities if IaaS situations
incorporations, desktop virtualization, dynamic scaling and administration that are policy based
(Malhotra, Agarwal & Jaiswal, 2014).
4.4. Their Cloud backup and restore infrastructure
The primary security functions are used by the cloud services in traditional ways but the hackers
found the ways to log in or access through the security protocol very easily. Every vendors follow
different protocols to support the business. Migrates all the information to the cloud server in some
unknown location via the cloud providers. This can make one feel like they no longer have the control
over the database (Drutskoy, Keller & Rexford, 2013).
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Student name CLOUD COMPUTING
References
Banerjee, A., Cho, J., Eide, E., Duerig, J., Nguyen, B., Ricci, R., ... & Wong, G. (2015). Phantomnet:
Research infrastructure for mobile networking, cloud computing and software-defined
networking. GetMobile: Mobile Computing and Communications, 19(2), 28-33.
Bourguiba, M., Haddadou, K., El Korbi, I., & Pujolle, G. (2014). Improving network I/O
virtualization for cloud computing. IEEE Transactions on Parallel and Distributed Systems,
25(3), 673-681.
Bruneo, D. (2014). A stochastic model to investigate data center performance and QoS in IaaS cloud
computing systems. IEEE Transactions on Parallel and Distributed Systems, 25(3), 560-569.
Callegati, F., Cerroni, W., Contoli, C., & Santandrea, G. (2014, October). Performance of Network
Virtualization in cloud computing infrastructures: The OpenStack case. In Cloud Networking
(CloudNet), 2014 IEEE 3rd International Conference on (pp. 132-137). IEEE.
Drutskoy, D., Keller, E., & Rexford, J. (2013). Scalable network virtualization in software-defined
networks. IEEE Internet Computing, 17(2), 20-27.
Ferretti, L., Pierazzi, F., Colajanni, M., & Marchetti, M. (2013, August). Security and confidentiality
solutions for public cloud database services. In Proc. Seventh Int’l Conf. Emerging Security
Information, Systems and Technologies.
Kumar, R., & Charu, S. (2015). An importance of using virtualization technology in cloud computing.
Global Journal of Computers & Technology, 1(2).
Lin, J. W., Chen, C. H., & Lin, C. Y. (2014). Integrating QoS awareness with virtualization in cloud
computing systems for delay-sensitive applications. Future Generation Computer Systems,
37, 478-487.
Malhotra, L., Agarwal, D., & Jaiswal, A. (2014). Virtualization in cloud computing. J. Inform. Tech.
Softw. Eng, 4(2).
Sharma, G. P., Singh, S., Singh, A., & Kaur, R. (2016). Virtualization in Cloud Computing.
Swathi, T., Srikanth, K., & Reddy, S. R. (2014). Virtualization in cloud computing. International
Journal of Computer Science and Mobile Computing, 3(5), 540-546.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and
internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial
Informatics, 10(2), 1435-1442.
8
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]