Cloud Computing: Proposed Architectures, Risk Report, and Information Security Controls
Verified
Added on  2023/06/03
|25
|7627
|167
AI Summary
This report discusses the implementation of cloud computing for MetaSoft, proposed architectures for a hybrid cloud, risk report for hybrid cloud and microservices, and proposed information security controls. It also covers network security, data management, and privacy concerns related to cloud computing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD COMPUTING CLOUD COMPUTING Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 CLOUD COMPUTING Table of Contents Introduction......................................................................................................................................3 Proposed Architectures for a Hybrid Cloud....................................................................................4 Risk report for Hybrid Cloud and Micro services...........................................................................6 Proposed Information Security controls..........................................................................................9 Recommendation for Metasoft..................................................................................................12 BCP Changes.................................................................................................................................13 Hybrid Cloud Administration and SLA Management...................................................................15 SharePoint Migration Planning......................................................................................................17 Critical point and issues.............................................................................................................18 Conclusion.....................................................................................................................................20 References......................................................................................................................................21
3 CLOUD COMPUTING Introduction The concept of cloud computing is one of the domain of the technology which is playing an important role. The technology is directly impacting the overall sector of operation which is relate to the working of different kind of organisation. In majority of the cases it can be seen that the organisation tries to indulge into the concept of the clod computing due to the different forms of advantage which is gained from the it. The main sector of the advantage is that the concept takes control over the vital aspect of the working of the organisation so that the organisation can concentrate of different vital internal activity. In recent times it can be stated that above from the different advantage sector there are different forms of risk factor associated within the working. The main sector of the disadvantage mainly come in different forms which can be easily be indulged into and mitigation plan can be easily be implemented within the technology which would be making the technology more adoptable(Hilbrich, Petrlic & Becker,2015). There are different sorts of implementation details which should be focused and within the working of the technology there are different infrastructure which are available, it should be the role of the organisation to take into consideration different aspect and role which they want the concept of the cloud computing to be playing within the organisation. Physical and dynamic aspect of the working of the concept of the cloud computing can be one of the implementation sector details for an organisation trying to adopt to the cloud computing scenario is also one of the focus point of the report. The main focus point of the report is to indulge into the different working which is related to the concept of cloud computing. Metasoft is one of the organisation which is planning to move to the concept of cloud computing, in the report the main implementation details which is related to the sector of adaptation of the concept for the organisation is taken into focus. In the
4 CLOUD COMPUTING stages of implementation there can be different types of risk factor which are discussed in te report and the mitigation plan which can be adopted by the organisation are also taken into consideration which would be involving a proper adaptation process involving les security risk involved in it. Proposed Architectures for a Hybrid Cloud The proposed architecture for the MetaSoft ltd which deals with the sector of software development would be the Amazon web service. The concept of the hybrid cloud can be directly related to the aspect of the allocation of the on premise resources with the resources of the cloud. Organisations who adopt the concept of the on premise technology directly invest in the sector of the hybrid cloud which is a primary requirement relating to the cloud adaptation. The concept relating to the migration of the legacy can be stated to be involving some form of time concept involved into the approach(Fang & Zhang, 2016). One of the important point which should be considered is the selection of the cloud providers who would be helping the organisation to utilize different resources which are available within the concept of the hybrid cloud.The important consideration which can be focused in the sector of the implementation of the hybrid cloud without the need relating to the cost investment in the sector of the on premise software and hardware(Hilbrich, Petrlic & Becker,2015). The AWS can be very much beneficial in the sector of the closely working with the need of the organisation. some of the benefit which can be seen in the sector of the implementation of the propose architecture are stated below: ï‚·Complete control:The organisation would be having the overall control of the different features of the concept of the cloud computing. The organisation can directly root the access to each one of them and the interaction with the system would be done. The feature which is related to the concept can be stopped while directly retaining the data
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5 CLOUD COMPUTING which would be residing in the boot partition. Then the same sequence can be started again by the same instance using the web service APIs. The instances can be directly rebooted using the web service APIs. ï‚·Integrated:The concept of the AWS can easily get nitrated with the different working of the organisation which can be related to the overall sector of implementation(Fang & Zhang, 2016). Some of the aspects which can be directly be linked to the aspect can be in the sector of the amazon simple storage service, amazon virtual private network, amazon relational database service which directly provides a secure solution of computing, processing f query and the cloud storage across an application which has a wide range of service. ï‚·Security:The data which would be stored in the concept of the AWS would be very muchsecured.IntheorganisationwhichfocusedwhichistheMetaSoft,the implementation of the AWS would be removing the burden which is related to the protection mechanism which should be implemented within the data. The security of the data of the organisation which would be saved in the concept would be provided from the end of the service providers and the organisation can directly deal with different other important factors. ï‚·Access:The data which would be stored within the concept of the AWS can be directly be accessed at any time. This mainly means the with regards to the security the data can be available to the organisation when they would be needing the data(Hilbrich, Petrlic & Becker,2015). This can be stated as one of the major advantage which is related to the implementation of the AWS. It can be stated that if the data is not accessed and retrieved during the need of the organisation it can be a major problem which is mainly taken into
6 CLOUD COMPUTING focus by the AWS so that the retrival of the data within the concept would be not involving time constraint. On the other hand, the quality of the data which would be retrieved from the AWS would be maintained so that there are no problem relating to the distribution of the data. Risk report for Hybrid Cloud and Micro services There can be different types of risk factor which can be included into the concept of the working of the hybrid and the micro services. The main aim of the sector is to disrupt the normal functionality which is related to the concept. The risk factors which are related to the concept can be discussed with the help of a tabular form which would be affectively discussing all the sectors of risk which is related to the concept. The table given below describes all the risk factor which is involved into the concept which can be affecting the sector of operation which is related to the concept. Hybrid cloudMicro service strategy Cloud securitySecurity Loss of overall control of the dataSynchronization of the data. DiscoveryCompliance Management of the dataTesting Latency and bandwidthMonitoring Failure and disaster recoveryData staleness Architecture design of the ITLogging and debugging
7 CLOUD COMPUTING The different risk factor which is associated with the concept of hybrid cloud are majorly discussed below: Design of thee IT architecture:the concept of the hybrid cloud can be considered to be a very complex due to the factor that the concept is a mixture of different sector of the working which is related to the concept. It can be considered to be a mixture which is related to the private cloud, public cloud and the on premise cloud(Singh et al.,2015). In order to manage the overall service, it can be stated that there are many operational details which is linked to the concept which play a major risk factor in the sector of the working of the concept. Datamanagement:The concept of the data management can be stated as one of the factor which can be termed as one of the major risk factor which is related to the concept. This is due to the factor that there are different types of crucial data which is stored in the concept which should be taken care of and the security implications which are provided from the end of the cloud providers are not proper(Fang & Zhang, 2016). In the concept it can be stated that there are no predefined rules which directly define the sector of the security which would be directly be implemented within the working of the organisation with the data which is stored within the concept. These data are crucial for the organisation and if there are any form of intruder activity it be directly impacting the overall operation which is related to the working of the organisation. Privacy:The privacy of the data which is stored in the concept can be stated to be one of the major factor which is related to the concept. There are different aspect of privacy dwelling within the concept which makes the leakage of the data of the organisation(Hilbrich, Petrlic & Becker,2015). These activities are usually done from the end of the hacker who use the concept in order to gain their own profit from the sake of the data which is retrieved from the system.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8 CLOUD COMPUTING Unauthorised access:The sector of the unauthorised access of the data which is stored in the concept can be a factor of concern(Tebaa, Zkik & El Hajji, 2015). There can be different sectors of activity which can be linked to the concept which means that there can be alteration of the data, modification of the data and deletion of the data which would be directly hammering the overall functionality of the organisation. The different types of risk factor which is associated with the micro service are stated below: Security:the security of the API can be stated as one of the concern areas which can be related to the concept. The security of the API can be very much important in the sector of the working of the data which would be present in the system(Moro, Cortez & Rita, 2015). There are different implications which can be seen in the sector relating to the concept which can be the implementation of Kong which is one of the most popular source which can be used in the sector of the removing the barrier which is related to the security aspect. DataSynchronization:Theconceptwhichisrelatedtotheaspectofthedata synchronization can be stated to be one of the concern area which is related to the concept which would be directly beneficial in the sector of the implementation of the technology(Singh et al.,2015). In most of the cases it can be stated that the sector of the async messaging system is one of the major areas of concern which is related to the concept. Data stainless:The database which is related to the concept should be ideally be engaging into the different updating and modification so that they are always kept updates. It can be stated to be a major problem if the data which is stored in the sector of the database is not updated which can directly impact the operation which is related to the organisation. There is
9 CLOUD COMPUTING different implication which can be seen in the sector to directly mitigate the different problem which is related to the stainless of the data. Debugging:the concept which is related to the domain of the micro service can be a indicated as an complex sector due to the involvement of different functionality which is related to the concept(Fang & Zhang, 2016). Due to this factor it can be stated that when there are any types of risk factor associated with the concept of risk issue seen the mitigation aspect control can be one of the concern areas which is related to the concept. Sometimes it can be seen that the risk factor directly gets included into the internal working of the organisation which can directly disruptor the normal functionality which is related to the concept(Tebaa, Zkik & El Hajji, 2015). It should be taken into consideration that risk identification should be one of the primary factor which can be related to the concept so that there are no problem relating to the risk identification and the concept of the implementation of a mitigation plan which would be directly resolving the risk factor. Proposed Information Security controls In the concept of the hybrid cloud there can be different types if security risk which is involved into the information which is stored in the concept. One of the factor which can be stated here is that most of the organisation save their important and crucial data in the concept of the cloud and if these data goes into the hand of another person or intruder it can hamper the overall working of the organisation(Gangwar, Date & Ramaswamy, 2015). It can be stated here that the AWS and its different partner directly offer different types of features and tools which would be helping the security of the data and the controlling aspect of the data which would be stored in the concept. These security control measures can be directly being placed upon the on premise architecture which can be used in the sector of the deployment environment. Some of
10 CLOUD COMPUTING the areas which are covered in the concept can be in the range of the access control, network security, management of configuration and the data security(Hilbrich, Petrlic & Becker,2015). On the other hand, the concept also provides an enhanced feature relating to the logging and the mentoring of the tools which can directly provide full visibility into what is happening and being executing into the environment. Some of the information security aspect which can be seen in the conceptcanbediscussedtakingintoconsiderationsomeofthecrucialareasofthe implementation which are explained below: Network security There are different types of aspect which can be directly be related to the aspect of the security capability and services which would be enhancing the aspect of the control access of the network and the aspect of the increasing of the privacy of the system. One of the important feature which can be stated here is the build in firewall, this directly allows the organisation to create a private network within the concept of the AWS and control access features which is related to the subnets and the instances(Singh et al.,2015). Encryption it can be stated to be another aspect which is included into the concept which would be transited with the concept of the TLS across the different services which are provided. Relating to the connectivity aspect it directly enables the concept of the private and connections which are dedicated for the on premise and office environment. The implementation of the technique of the DDoS can be considered to be a part of the auto scaling process or the strategy relating to the content delivery. Data encryption The concept of thee data encryption can be considered as a technique which can be used in the sector of the encrypting of the data so that it cannot be accessed by anyone apart from the authorised user(Laudon & Laudon, 2016). Some of the data encryption technique which are
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11 CLOUD COMPUTING implemented within the concept can be stated in the sector of the data base services and the AWS storages such as thee S3, Glacier, EBS, oracle RDS, Redshift and SQL server RDS. In this concept it can be stated that the implementation of a flexible key management option is very crucial which directly allow the organisation to choose whether to have an AWS to manage the encryptionkeyortomaintainthecompletecontroloverthedifferentkeyswithinthe organisation. hardware based key relating to the cryptography option of storage gives the option to the customer to get themselves satisfied with the compliance requirement(Tebaa, Zkik & El Hajji, 2015). In addition to this the AWS also provides a API which would be helpful in the sector of the data protection and the integrated encryption with any of the different services to engage and deploy the AWS environment. Configuration and management of inventory The AWS directly provides a range of tools which directly allow fast and reliable access of the different features which is related to the concept of the access control and configuration control which would be directly beneficial for the organisation who would be implementing the sector(Gangwar, Date & Ramaswamy, 2015). It directly gives the provision of tools of deployment which would be beneficial in the sector of creation and decommissioning the sector of the resources which are available in the AWS according to the need of the organisation, the configuration and the inventory management tools can be implemented in the sector of the AWS resources which can be managed and tracked according to the changes to the different resources which are available in the sector. In this sector the template design and the management tools can be implemented in the sector of the creation of a standard which is predefined and hardened with the virtual machine for the concept of the EC2 instances. Monitoring
12 CLOUD COMPUTING The aspect of monitoring can be stated to be one of the important features which can be related to the concept of the control mechanism which is related to the data and the information whichissavedintheconcept(Laudon&Laudon,2016).Thereisdifferentsectorof implementation which can be seen in the sector that any form of risk factor which is associated within the concept can be mitigated before it actually gets indulged into the concept of the working of the organisation(Schlagwein, Thorogood & Willcocks, 2014). Hence risk evaluation matrix can be implemented in the sector which would be helping in the sector of the detection of the problem and planning a risk mitigation aspect so that the security of the data would be directly prevailing in the system. The main consideration which is taken into focus is that from were any to were the data is being accessed and delivered so that any form of intruder activity cannot get indulged into the overall access of the data. Hence it can be stated that monitoring of the risk can be helpful in the sector of the implementation of the concept so that there is different sector of working which is related to the concept(Singh et al.,2015). The concept of alert notification can also be very much helpful in the sector of the working so that whenever there are nay from of intruder activity detected within the system, the system would be directly notifying about the circumstances and immediately a plan should be implemented which would be directly affecting the overall working satiation and providing a control measure which is related to the concept. Recommendation for Metasoft Recommendation 1:The system which is recommended for the organisation should be very much maintained and understood. This mainly deals with the sector of the implementation of proper standard of working which is related to the concept so that there are no errors of problem relating to the adaptation of the concept(Gangwar, Date & Ramaswamy, 2015). The
13 CLOUD COMPUTING system maintenance can be stated as one of the concern areas which would be helping the organisation to adopt to the different sector of operation which is estimated from the system. The installationofrecentpatchesofthesoftwareshouldbedonesothatenhancedsecurity mechanism can be included into the working. Recommendation 2:security management can be another important recommendation which can be given in the domain of the implementation of the technology(Schlagwein, Thorogood & Willcocks, 2014). It should be taken into consideration that security is prevailing into the working of the system due to the factor that there can be different types of crucial data which are seen in the sector of the working and if there are no security implications implemented it can be a huge problem for the organisation and would be affecting the internal and the external working of the organisation. Recommendation 3:Backup of the data can be stated to be one of the factors which should be taken into consideration. This implementation is very much important due to the factor that if there are any sort of intruder activity it can directly result in the loss of the data. On the other hand, if the data is saved with the concept of another server it can be beneficial in the sector of not getting the data loss in the sector(Cleary & Quinn, 2016). Back up can be stated as one of the most important implementation which should be done in the areas were dealing with crucial information. Recommendation 4:Authorised access to the data should not be given to the employee who does not need the access of the data(Tebaa, Zkik & El Hajji, 2015). It can be stated as one of the areas were the data integrity aspect can be removed from the concept. In most of the cases it can be stated that if there are any form of unauthorised access it can directly impact the quality
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
14 CLOUD COMPUTING of the data which would be present in the concept. The restriction should be done at the entry point of the data so that there is no possibility of unauthorised access(Laudon & Laudon, 2016). BCP Changes The concept which is related to the business continuity plan can be considered as a technique which can be very much crucial for the working of the organisation. In the plan it can see that alteration of the business processes is done which is going to directly impact the sector of operation which is related to the organisation(Moro, Cortez & Rita, 2015). There are different sorts of basics which is related to the aspect of the BCP which can be implemented within the organisation. The following changes which would be directly impacting the sector of the operation of the organisation relating to the BCP are stated below: ï‚·Personal changes:It can be considered to be a good move to plan the changes within the working of the organisation. These changes are directly impacted within the sector of the operation which directly impact the sector of the operation of the business as well as alter the overall benefit which is seen from the point of view of the employee who is engaged in the working. In the concept of the plan change it should be considered that the plan is well informed to the different employee who are engaged into the working of the concept. Training can be also given to the employee so that they can easily adopt the changes and make the implementation in the working of the different parts of projects in the concerned areas. ï‚·Software and hardware changes:In the domain of the moving to the concept of the cloud it can be seen that there are different types of hardware and software changes which can be implemented within the sector in a manner of the adaptation of the concept of the cloud(Schlagwein, Thorogood & Willcocks, 2014). The main motive behind the
15 CLOUD COMPUTING changes is the implementation stages of the cloud computing so that the different resources which are present within the concept of the cloud can be adopted and utilised. ï‚·Hot site infrastructure:the concept which is related to the aspect of the hot site is that it would be taking direct control of all the resources which are placed within the working of the organisation. In the sector of the implementation it should be taken into consideration that the system would be able to adopt to the different changes which are seen in the sector of the implementation of the technology. The concept not only takes control of the various aspects which are related to the working but also helps in the sector of the monitoring so that everything within the concept is running properly or not. On the other hand,italsotakesintoconsiderationtheaspectwhichisrelatedtothebudget prioritization which can be helpful in controlling of the overall budget which is seen in the sector of the operation. ï‚·Back up procedure change:In the concept of the working it can be stated that there can be different types of risk factor associated with the concept so the concept of the backup can be stated to be very much important due to the factor that if there are no type of data lose it can directly impact the overall functionality which is related to the concept. One of the recommendation which can be given in the sector of the backup is the tape to disk to disk which would be helping in the sector of the backing up of the data and the control mechanism of the data if there are any type of intruder activity seen within the working of the organisation(Schlagwein, Thorogood & Willcocks, 2014). It should be taken into consideration that the key up areas should be restructured to the accessed and security of the data which would be prevailing in the concept should be secured from any type of intruder activity. This concept would be changing the overall functionality which is
16 CLOUD COMPUTING related to the concept of the operation and the storing of the data within the concept of the cloud. Hybrid Cloud Administration and SLA Management In the sector of the SLA management it can be stated that for the organisation there can be a recommendation which is related to the implementation of an application which is named as the ManageEngine application manager(Cleary & Quinn, 2016). This application can be very much beneficial in the sector of the SLA monitoring which is related to the monitoring and the performance of the critical mission application which is related to the business which would be directly ensuring high performance of the different criteria which is related to the concept. The concept which is related to the aspect can be stated to be out of the box support which is related to the monitoring of the infrastructure which is heterogeneous which can directly empower the organisation to focus on the different functionality which is related to the core business operation which is related to the concept(Oliveira, Thomas & Espadanal, 2014). On the other hand, it can be stated that the implementation would also be beneficial in the sector of providing valuable insight into the IT infrastructure which is related to the end user of the mission critical application. The concept can be beneficial in different sector for example the monitoring of the database, application, website, mail server, web application and the other services which is related to the IT sector. In order to ensure that there is high availability relating to the mission applicationwhichiscriticalbusinessorganisationtrytoembraceupon-nthedifferent functionality with the information technology infrastructure library(ITIL) processes. Some of the main advantage which can be seen in the sector of the SLA management are stated below:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
17 CLOUD COMPUTING ï‚·In the concept the business application which is involved into the concept would be having a holistic view point. ï‚·It gives direct support to the concept of the industry best practice. ï‚·TheSLAmanagementgivesdirectlyaccesstobettervisibilityonwhetherthe organisation is meeting the requirement of the organisation and the need of the customer. In this sector it can be stated that the need of the customer is one of the most important things which can be stated here. ï‚·The concept gives standardized approach which is related to the concept of the managing of the IT resources. ï‚·High ROI and low TCO. ï‚·The concept gives agent less monitoring which would be beneficial in the sector of the decreasing the cost which is related to the concept. SharePoint Migration Planning The Metasoft organisation has planned to initially to set up a share point instance and the movement of the SWL server 2012 database server to another kind of the cloud service provider which is the AWS(Oliveira, Thomas & Espadanal, 2014). The main aspect which can be stated here is the concept of the migration along with the testing which would be included into the strategy. In the sector of the migration it can be stated that there are certain steps which can be followed which would be very much beneficial in the sector of the SharePoint migration which are stated below: Triage:The concept can be directly related to the planning which is done prior to the step of the migration which would be included into the concept. This step can be considered to be very much useful in the sector of the implementation of the different condition which is
18 CLOUD COMPUTING related to the working which is seen in the sector. The framing of the concept in the sector is very much important due to the factor that the overall implementation of the concept would be dependent on this step. Site inventory:This concept can be directly related to the aspect of the control which is related to preserving the older system. This approach can be stated to be very much beneficial due to the factor that there are different types of need of the customers which can be directly be gained from the concept(Moro, Cortez & Rita, 2015). The site inventory can be beneficial in the sector that it would be dealing with the need of the customer and how the overall working of the concept can be controlled. The framing up of the different sectors of the business can be dealt in the sector which would be helping in the sector of the initial planning of the organisation. Migration test:The test which is related to the migration can be stated to be very much important due to the factor of checking the overall transition of the system. In this concept the working of the system can be seen and it can be also indicating whether the overall working of the business needs is matching with the migration. In most of the cases there are different sectors of implementation which should be checked. One of the sector which is very much important in the sector is the security which would be prevailing into the system after the migration has to launched and initiated. It takes into consideration that the different steps which are related to the migration aspect is working properly so that there is no problem seen in the sector of the working of the organisation. The rate which is related to the success factor can also be important in the sector due to the factor all the crucial working of the Metasoft organisation would be involved into the concept and if there are any form of problem or issue seen in the sector it would be directly affecting the overall business aspects of the organisation.
19 CLOUD COMPUTING Critical point and issues The final step which is related to the migration can be stated to be the critical point. It majorly takes into consideration weather all the needs of the Metasoft organisation are taken into consideration which would be very much beneficial in the sector of the working of the organisation. One of the most important step which should be a concern area is the data which is related to the concept(Cleary & Quinn, 2016). The SharePoint content database is directly detached with the aspect of the SQL server in the given section of the sharepoint. In most of the cases there are different functionality which can be considered as the retrieval of the data from the concept and the access of the data which is seen in the sector. It should be a care area that the data which is stored in the concept can be easily be retrieved by the organisation at the time of need without any form of time lagging concept involved into it. One of the issue which can be seen in the aspect can be the integrity of the data and the security of the data which would be prevailing into the system. It can be considered that the organisation wold be dealing with crucial data which form the backbone of the operations if there are any form of error or intruder activity involved into the aspect it can be big a problem for the organisation. The mitigation plan which can be stated here is the restriction of the entry point of the data which is seen in the domain(Oliveira, Thomas & Espadanal, 2014). The data which would be dealt in the system should be secured so that the integrity and the confidently of the data would be directly prevailing into the concept. Hence indulgence of the aspect of security can be stated to be one of the prime sector which can be seen in the sector which should be adopted as a primary importance area. The range of control mechanism from the sector of the initial planning of the movement to the sector of the working of the concept and the complete migration are very much important so that there is no problem seen in the sector of the working
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
20 CLOUD COMPUTING of the organisation after the implementation stages are being conformed and the working of the process is started(Moro, Cortez & Rita, 2015). The aspect which is related to the flexibility of the data can be another area of issue due to the factor that there can be different sector of movement of the data within the Working of the organisation and moreover the security of the data in the section of the movement can be considered to be a primary factor due to the factor that that the data are crucial and it should be involving any approach which would be affecting the overall integrity and the quality of the data within the sector of the movement of the data (Cleary & Quinn, 2016). The cost factor which is related to the implementation can be one of the issue factor which play a vital role in the sector of the movement of the overall working of the organisationintotheconceptofthecloud.Sometimesitcanbestatedthatafterthe implementation or the adaptation of the concept it can be a very difficult job to discounting from the sector of the operation which is related to the concept of the cloud computing. Conclusion The concept of the cloud computing and the relating to it the aspect of the AWS can be stated to be one of the areas of implementation which is done by most of the organisation. In the sector of the report for the Metasoft the AWS is recommended due to the factor that there are different types of advantage which can be gained from the end of the organisation after the implementation is done. It can be concluded on a note that risk factor within the working of any technology can be stated to be one of the common factor but it should be taken into consideration that the risk factor does not impact the overall working which is related to the organisation. The concept of the cloud computing and the AWS are in the verge of research and it can be stated that in the near future the concept would be playing a more dominating role. If the risk factor
21 CLOUD COMPUTING which are involved within the concept are focused and mitigation plan is implemented in each of the sector more organisation would be trying to adopt to the concept of the AWS.
22 CLOUD COMPUTING References Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds.Future Generation Computer Systems,57, 24-41. Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds.Future Generation Computer Systems,57, 24-41. Cleary, P., & Quinn, M. (2016). Intellectual capital and business performance: An exploratory study of the impact of cloud-based accounting and finance infrastructure.Journal of Intellectual Capital,17(2), 255-278. Clemente-Castelló, F. J., Nicolae, B., Rafique, M. M., Mayo, R., & Fernández, J. C. (2017, May). Evaluationof data localitystrategiesfor hybrid cloud burstingof iterative Mapreduce. InCluster, Cloud and Grid Computing (CCGRID), 2017 17th IEEE/ACM International Symposium on(pp. 181-185). IEEE. Dobre, D., Viotti, P., & Vukolić, M. (2014, November). Hybris: Robust hybrid cloud storage. InProceedings of the ACM Symposium on Cloud Computing(pp. 1-14). ACM. Fang, B., & Zhang, P. (2016). Big data in finance. InBig data concepts, theories, and applications(pp. 391-412). Springer, Cham. Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud computingadoptionusinganintegratedTAM-TOEmodel.JournalofEnterprise Information Management,28(1), 107-130. Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical review.International Journal of Computer Network and Information Security,6(3), 20. Hilbrich, M., Petrlic, R., & Becker, S. (2015). Towards a secure cloud usage for financial IT.Open Identity Summit 2015.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
23 CLOUD COMPUTING Huang,X.,&Du,X.(2014,April).Achievingbigdataprivacyviahybridcloud. InComputerCommunicationsWorkshops(INFOCOMWKSHPS),2014IEEE Conference on(pp. 512-517). IEEE. Kuijs, H., Reich, C., Knahl, M., & Clarke, N. (2015). Towards privacy for ambient assisted living in a hybrid cloud environment.BW-CAR| SINCOM, 41. Laudon, K. C., & Laudon, J. P. (2016).Management information system. Pearson Education India. Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication.IEEE Transactions on Parallel and Distributed Systems,26(5), 1206-1216. Lu, P., Sun, Q., Wu, K., & Zhu, Z. (2015). Distributed online hybrid cloud management for profit-driven multimedia cloud computing.IEEE Transactions on Multimedia,17(8), 1297-1308. Luna, J., Taha, A., Trapero, R., & Suri, N. (2017). Quantitative reasoning about cloud security using service level agreements.IEEE Transactions on Cloud Computing,5(3), 457-471. Mason, S., Fletcher, J. K., Haynes, J. M., Franklin, C., Protat, A., & Jakob, C. (2015). A hybrid cloud regime methodology used to evaluate Southern Ocean cloud and shortwave radiation errors in ACCESS.Journal of Climate,28(15), 6001-6018. Moro, S., Cortez, P., & Rita, P. (2015). Business intelligence in banking: A literature analysis from 2002 to 2013 using text mining and latent Dirichlet allocation.Expert Systems with Applications,42(3), 1314-1324.
24 CLOUD COMPUTING Niu, Y., Luo, B., Liu, F., Liu, J., & Li, B. (2015, April). When hybrid cloud meets flash crowd: Towards cost-effective service provisioning. InComputer Communications (INFOCOM), 2015 IEEE Conference on(pp. 1044-1052). IEEE. Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors.Information & Management,51(5), 497-510. Pluzhnik, E., Nikulchev, E., & Payain, S. (2014, June). Optimal control of applications for hybrid cloud services. InServices (SERVICES), 2014 IEEE World Congress on(pp. 458- 461). IEEE. Schlagwein, D., Thorogood, A., & Willcocks, L. P. (2014). How Commonwealth Bank of Australia Gained Benefits Using a Standards-Based, Multi-Provider Cloud Model.MIS Quarterly Executive,13(4). Singh, A., Mishra, N., Ali, S. I., Shukla, N., & Shankar, R. (2015). Cloud computing technology: Reducing carbon footprint in beef supply chain.International Journal of Production Economics,164, 462-471. Tebaa, M., Zkik, K., & El Hajji, S. (2015). Hybrid homomorphic encryption method for protecting the privacy of banking data in the cloud.vol,9, 61-70. Wilson, B. M. R., Khazaei, B., & Hirsch, L. (2015, November). Enablers and barriers of cloud adoptionamongSmallandMediumEnterprisesinTamilNadu.In2015IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)(pp. 140- 145). IEEE.
25 CLOUD COMPUTING Zhang, H., Jiang, G., Yoshihira, K., & Chen, H. (2014). Proactive workload management in hybrid cloud computing.IEEE Transactions on Network and Service Management,11(1), 90-100. Zkik, K., Tebaa, M., & El Hajji, S. (2016). A new secure framework in mcc using homomorphic signature: application in banking data. InTransactions on Engineering Technologies(pp. 413-427). Springer, Singapore.