student name and number2 Introduction Cloud infrastructure is a complete solution of all the problems. It provides all the solutions, which are related to the organization's operations(Schouten, 2014). Cloud infrastructure mechanism provides different services, such as data storage, software development kit, and many others.
student name and number3 Logical network perimeter Virtual private network provides a different network environment to the organization for security purpose Different purposes of logical network 1. it secure their IT-sources from unauthorized access 2. It provides secure access t internal and external sources (Dinh, Lee, Niyato, & Wang, 2013). 3. It isolate IT resources of an organization, such as servers, data storage and bandwidth for cloud consumers.
student name and number4 Logical network perimeter (2)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
student name and number5 Case study (DTGOV) DTGOV requires many resources to manage their operations which are as mention below: 1. Routers : it connects external network from internal network and forward data packets to the desired node (Garg, Versteeg, & Buyya, 2013). 2. DMZ : it is a secure zone for creating virtual network hosting for proxy servers of company. 3. Firewalls : it is used to provide , controlling, isolation of traffic, monitoring and filter network traffic.
student name and number6
student name and number7 Victual Servers Virtual servers provide virtualization to emulates a physical server s issues It is a best way to remove physical server problem for an organization (Krutz, & Vines, 2010). Cloud-based server is provide it for resources sharing in between different clients
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
student name and number9 Cloud-Storage Devices Mechanism Data storage is an important service of cloud(Mahalle, Yong, Tao, & Shen, 2018). it provide a virtual storage to save and secure data. These devices have facility to be virtualized This services is based on the pay-per-use mechnishm (Rittinghouse, & Ransome, 2016).
student name and number10 Cloud storage level Objects Files Datasets Blocks
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
student name and number11 Technical Interfaces Network storage interface: provides virtual data storage Object storage interface: provide instance of stored data Database storage interface 1. Relational data storage 2. Non-relational data storage
student name and number12
student name and number13 Cloud Usage-monitor Mechanism Software is used to manage all the processing and usages of different sources of cloud It has a record of all the activities in the cloud, such as usage time, amount of data, and many others Provide a analysis report to monitor suspicious activities in the network
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
student name and number14 Format of agents Monitoring agent – this agent is used for monitoring different activities(Sen, 2014). Resource agent – all the IT resources are managed by resource agent such as initiating, vertical scaling, resuming services Polling agent – this agent is responsible for uptime and downtime of IT resources
student name and number15 Resource replication & Ready-made environment It is a concept that makes multiple instances of the same IT resources Platform-as-a-Service (PaaS)- it is a platform that have all the IT resources, which are required by the user, such as software development kit (Zhang, Wuwong, Li, & Zhang, 2010).
student name and number16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
student name and number17 References Schouten, E. (2014).Cloud computing defined: Characteristics & service levels. Retrieved September 11, 2018, from https://www.ibm.com/blogs/cloud-computing/2014/01/31/cloud-computing-defined- characteristics-service-levels/ Dinh, H., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing, 13(18), 1587-1611. Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems, 29(4), 1012-1023. Krutz, R., & Vines, R. D. (2010).Cloud security: A comprehensive guide to secure cloud computing. .London: Wiley Publishing. Mahalle, A., Yong, J., Tao, X., & Shen, J. (2018). Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure. IEEE Explore, 407-413. Rittinghouse, J., & Ransome, J. F. (2016).Cloud computing: implementation, management, and security. .Florida: CRC press. Sen, J. (2014). Security and privacy issues in cloud computing. In J. Sen,In Architectures and protocols for secure information technology infrastructures(pp. 1- 45). USA: IGI Global. Zhang, X., Wuwong, N., Li, H., & Zhang, X. (2010). Information security risk management framework for the cloud computing environments.In Computer and Information Technology (CIT)(pp. 1328-1334). IEEE.