Cloud Computing: Selection of Cloud Architectures for a Hybrid Cloud

Verified

Added on  2023/06/11

|26
|7544
|430
AI Summary
This report outlines a brief discussion on the entire case study of Regional Gardens Ltd. It is a specific organization that eventually runs various and several number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. The report focuses on the shifting of hybrid cloud and the selection of cloud architectures for a hybrid cloud. The benefits and issues for the deployment of the selected cloud architectures are discussed. Risks associated with hybrid cloud and micro services strategy and their controls are also discussed.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CLOUD COMPUTING
Cloud Computing
Name of the Student
Name of the University
Author’s Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
CLOUD COMPUTING
Table of Contents
Introduction...............................................................................................................................2
Discussion...................................................................................................................................3
1. Selection of Cloud Architectures for a Hybrid Cloud.........................................................3
1.1. Description of the Selected Cloud Architectures and the Reasons for this
Deployment........................................................................................................................5
1.2. Benefits and Issues for the Deployment of the Selected Cloud Architectures...........6
2. Risks Associated with Hybrid Cloud and Micro Services Strategy and their Controls.......8
3. Information Security Steps and Controls for Securing Hybrid Cloud...............................12
4. Business Continuity Planning for Hybrid Cloud and Micro services Approach................13
5. Remote Server Administration, Resource Management and SLA Management............16
6. Migration of email instances to the Amazon Web Services Cloud..................................17
6.1. Various Steps for Migrating the Organizational Services.........................................17
6.2. Critical Point as well as Issues for the Steps with Proper Explanation.....................18
Conclusion................................................................................................................................19
References................................................................................................................................21
Document Page
2
CLOUD COMPUTING
Introduction
Cloud computing can be defined as the specific part of the information technology or
IT, which has the ability to enable the ubiquitous access in every shared pool of several
system resources that could be configurable (Pahl, 2015). Moreover, the high level services
could be easily as well as rapidly provisioned with extremely lesser amount of managerial
effort, on the connection of Internet. The most significant characteristic of this particular
technology of c loud computing is that a specific client server model is present, which could
easily distinguish between the service requestors or clients and the service providers or
servers (Hwang, Dongarra & Fox, 2013). The next important feature of this technology is
that a service bureau is present that helps in providing computer services. Moreover, grid
computing as well as fog computing is also possible here. Thus, the distributed computing
paradigm, providing data, storage and finally application services remain close to the client
or near user edge devices like network routers. There are various types of cloud architecture
models. They are the infrastructure as a service or IaaS, platform as a service or PaaS and
software as a service or SaaS. All of these are extremely important for the organizations as
they provide virtual infrastructures, platforms and software to the client (Brender & Markov,
2013). There are four service models also present for the organizations. They are private
cloud, public cloud, hybrid cloud and finally community cloud. Hybrid cloud is the mixture of
other two clouds and hence is termed as the most effective of all.
The following report outlines a brief discussion on the entire case study of Regional
Gardens Ltd. It is a specific organization that eventually runs various and several number of
related gardening enterprises. It has a large display garden that it opens for public
inspection a number of times a year. These enterprises include the Regional Gardens
Document Page
3
CLOUD COMPUTING
Nursery which sells plants and garden supplies to the public, and Regional Garden Planners
which provides garden advice, design and consultancy services. This particular company has
taken the decision to consider various strategic proposals. They have planned to shift their
entire web services to Hybrid cloud and for gaining flexibility and scalability, they have
thought of moving to the model of Micro services. This report will be focusing on this
shifting of hybrid cloud.
Discussion
1. Selection of Cloud Architectures for a Hybrid Cloud
Cloud computing architectures are considered as the most important and significant
features of this technology cloud computing that helps all the users in understanding this
technology perfectly and properly. There are three types of cloud architectures. They are as
follows:
i) Infrastructure as a Service or IaaS: The first and the foremost cloud computing
architecture model is IaaS or infrastructure as a service. It is the significant form of the cloud
computing, which helps in providing virtualized computing resource on the connection of
Internet (Zhan et al., 2015). The cloud provider eventually hosts the components of
infrastructure, which present in any on premises centre of data, involving storage, servers,
networking hardware, hypervisor layer and the virtualization layer. The provider of this
infrastructure as a service or IaaS subsequently supplies the wide range of various services
for accompanying all those components of infrastructure. All these components majorly
involve monitoring, detailed billing, load balancing, security, clustering, log access as well as
the storage resiliency like recovery, replication and back up (Ramya & Ramya, 2013). All

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
CLOUD COMPUTING
these services are increasingly driven by policy, which helps to enable all the users of this
infrastructure as a service in properly implementing the greater level for automation as well
as orchestration.
ii) Platform as a Service or PaaS: The second cloud architecture model after the
infrastructure as a service is the PaaS or platform as a service. Platform as a service is the
particular model of cloud computing, where the third party provider delivers all the tools
and technologies of hardware as well as software (Bora & Ahmed, 2013). All these are
required for developing the applications to their clients with the connectivity of Internet.
The provider of this platform as a service significantly hosts the software as well as
hardware over its own infrastructure. Thus, the platform as a service helps in freeing the
users from getting installed the in house hardware or software for either developing or
running the new application. The main feature of this platform as a service is that it never
replaces the complete infrastructure of the information technology and instead it relies on
the providers of the platform as a service like development of Java and application hosting
(Al-Roomi et al., 2013). The building as the supplying of the resilient as well as the optimized
environment by the provider of a platform as a service, over which the clients could easily
install the sets of data and applications are done easily. All these features help the users in
acquiring the cloud architecture model under any circumstances.
iii) Software as a Service or SaaS: Software as a service of SaaS is the third most
important cloud architecture model or software distribution model, where the third party
provider eventually hosts every application in making them completely available to the
customers on the Internet. The software as a service eradicates the need for the companies
in installing as well as running the applications over their own computers or over their own
Document Page
5
CLOUD COMPUTING
data centres (Hsu, Ray & Li-Hsieh, 2014). This feature helps to eliminate the costs of the
provisioning as well as maintenance, acquisition of hardware, software installation, software
licensing and finally support. The most significant advantages of this software as a service
model mainly include flexibility in payments, scalability in usage, automatic updates,
persistence as well as accessibility and many more.
For the organization of Regional Gardens Ltd, they should select the cloud
architecture model of Platform as a service or PaaS. The main reason for this suggested
architecture model is that this organization is shifting to the hybrid cloud (Ali, Khan &
Vasilakos, 2015). Platform as a service or PaaS is the most suitable for this approach of
hybrid cloud.
1.1. Description of the Selected Cloud Architectures and the Reasons for this Deployment
The platform as a service or PaaS is the specific category of the several services of
cloud computing that is based on platforms (Almorsy, Grundy & Müller, 2016). This
particular architecture model is responsible for providing a basic platform and thus helping
the clients or customers in proper development, running as well as management of each
and every application without much complexities for building or maintaining the significant
infrastructure that is completely linked with the proper development or launching of their
applications. The platform as a service can be subsequently delivered to their clients in three
distinct methods. The first method of this delivery is as the public cloud provider by the
cloud provider. Here the client comprises of the ability to control the deployment of the
software with very less options of configuration and hence providing several networks,
storage, servers and operating systems. The next method of this delivery is as the specific
software, which is deployed on the public infrastructure as a service or IaaS. The most
Document Page
6
CLOUD COMPUTING
significant reason to propose this platform as a service or PaaS for the organization of
Regional Gardens Ltd is that this can be simply incorporated within their hybrid cloud
approach (Hashem et al., 2015). The most popular and significant example of this platform
as a service or PaaS for the organization of Regional Gardens Ltd is the Amazon Web
Services or AWS. Thus, Regional Gardens Ltd should implement the cloud architecture of
PaaS.
1.2. Benefits and Issues for the Deployment of the Selected Cloud Architectures
Platform as a service or PaaS comprises of various significant benefits and issues if it
is deployed in the company of Regional Gardens Ltd. The most vital and important
advantages for the selection of the cloud architecture of PaaS are given below:
i) High Speed: The first and the foremost benefit of the deployment of the PaaS or
platform as a service is that the speed of this architecture model is much higher than the
rest of the architecture models (Hashizume et al., 2013). Each and every application of this
architecture model will function perfectly like offerings of their services. The entire hybrid
platform as a service eventually makes the process of deployment of various applications
much simpler. Moreover, the PaaS or platform as a service properly checks the management
as well as the scaling of the application deployment. The productivity of the developer solely
depends or increases by this procedure.
ii) Integration of Application Management: The next significant advantage of the
hybrid platform as a service is that it helps in the perfect integration of the application
management (Gupta, Seetharaman & Raj, 2013). The application management should be
streamlined or integrated properly for any specific hybrid cloud and this is only possible if

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
CLOUD COMPUTING
the platform as a service is present within them. The company of the Regional Gardens Ltd
should select the hybrid platform as a service for their business to obtain various
competitive benefits.
iii) Reducing Complexities: The third significant advantage of the hybrid platform as a
service is that this platform helps in reducing or minimizing the complexities eventually and
hence the agility is incremented. The inheritable cloud architecture is checked in this
phenomenon and thus should be checked properly.
iv) Extremely Cost Effective: Another significant advantage of the hybrid platform as
a service cloud architecture for this particular company of Regional Gardens Ltd is that it
helps in reducing the excess cost and thus making the systems extremely cost effective for
the business (Garg, Versteeg & Buyya, 2013).
Although the hybrid platform as a service cloud architecture comprises of several
benefits or advantages, few important risks are also present within it. These are extremely
dangerous for the company. The main risks or challenges are given below:
i) Lack of Disaster Recover and BCP: The first and the foremost disadvantage of the
hybrid platform as a service cloud architecture model for the organization of Regional
Gardens Ltd is this particular cloud model does not comprise of the DR or disaster recovery
planning and the BCP or business continuity planning (Alshamaila, Papagiannidis & Li, 2013).
Hence, this becomes a major and significant issue or challenge for the organization and they
face major problems.
ii) Lacking of SSDLC: The next important and vital risk in the cloud architecture
model of hybrid platform as a service is that this particular cloud model does not consist of
Document Page
8
CLOUD COMPUTING
SSDLC or secure software development process life cycle. For this absence of the SSDLC, the
insecure code can occur in the model of architecture.
iii) Lacking of Sufficient Provisions within SLA: The third significant disadvantage of
the hybrid platform as a service is that it lacks the sufficient provision within the service
level agreement or SLA (Herbst, Kounev & Reussner, 2013). Thus, security is challenged in
the phenomenon.
2. Risks Associated with Hybrid Cloud and Micro Services Strategy and their Controls
There are several risks that are associated with the hybrid cloud and the micro
services strategy within the organization of Regional Gardens Ltd. All these risks or threats
are extremely dangerous for the organizational security (Fernando, Loke & Rahayu, 2013).
These risks could be mitigated with proper security controls. The various risks or threats that
are vulnerable for the hybrid cloud and the micro services strategy with the mitigation as
well as security controls are as follows:
Security Risks
or Threats
Description of the Security Risks Mitigation or Control of the
Security Risks
1. Lack of
Encryption
This is considered as the most significant
security threat for the hybrid cloud as well
as the strategy of micro services. The
transmission of network, which is
dangerous for attacks of man in the middle
or eavesdropping by simple means of
impersonation of the endpoint (Arora,
Parashar & Transforming, 2013). There
The simple way for controlling or
fixing this particular attack type is
with the shield transmission from
every random attack by the
cryptographic protocol that
involves endpoint authentications.
The involvement of the reliable
virtual private network is the
Document Page
9
CLOUD COMPUTING
could be two kinds of algorithms within
encryption. These are the symmetric key
algorithm and the asymmetric key
algorithm.
second method in mitigating this
problem.
2. Insufficient
Security Risk
Assessment
The next significant security threat or risk is
the insufficient assessment of the security
risk. All the network administrators cannot
easily determine the procedure and
location of the intrusion. Furthermore, the
future breaches cannot be detected easily.
This specific kind of security threat
or risk can be simply removed by
the perfect risk prevention as well
as assessment (Jain & Paul, 2013).
The systems of IPS or IDS should
scan for every malicious activity or
traffic.
3. Lacking of
Compliance
The hybrid cloud subsequently requires
more of the diligence, particularly when it
comes to compliance. This maintenance
and the demonstration of the compliance
are extremely difficult for this hybrid cloud
since the data shifts back and forth.
The main method for mitigating
this problem is to coordinate the
two distinct clouds perfectly and
hence the clouds can be kept
within compliance (Khan et al.,
2013).
4. Weaker
Security
Management
The lacking of authentication can be the
next significant challenge for hybrid cloud
or micro services strategy. The problem is
majorly for the several protocols of cloud
security and these are not at all integrated
within the cloud.
The most simple way in mitigating
this issue of authentication is by
replicating the several controls for
both of the clouds. Furthermore, a
perfect synchronization for the
security of their data must be done
for helping to mitigate all the risks
properly.
5. Poor Data Another significant and important security The redundancy should be

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
CLOUD COMPUTING
Redundancy threat or risk for this organization of
Regional Gardens Ltd is the lack of data
redundancy (Dinh et al., 2013). This lacking
of redundancy eventually puts this hybrid
cloud at significant risk and thus the data
distribution must be done perfectly.
incorporated and hence this can be
done either by the utilization of
several data centres from a single
provider of cloud. Moreover, this
can also be incorporated from the
several providers of the public
cloud.
6. Failure in
Authentication
and
Identification
The sixth significant security threat or risk
within the micro services strategy and
hybrid cloud is a failure in perfect
identification and proper authentication.
This particular issue can be easily
mitigated by the proper verification
and monitoring of the access
permission as well as by the simple
data security synchronization.
7. Unprotected
Application
Programming
Interfaces
The next most important and significant
security risk for hybrid cloud of the Regional
Gardens Ltd. is the APIS end points (Krishna,
2013). APIS or simply application
programming interfaces subsequently helps
in exposing the entire confidential data in
front of the malicious attack and hence
exploitation of the authentication and
authorization token to manipulate the
personal data or information.
The simplest method in mitigating
the security risk type is by simply
handling the keys of API that are
same as the code signing key and
encryption. The developers of third
party must be ensured for handling
each and every key properly
(Avram, 2014).
8. Denial of
Service Attacks
In this type of attack, the specific
perpetrator or the attacker seeks into the
machine with the purpose of making it
entirely unavailable for each and every
The DoS attack or denial of service
attack can be easily removed by
flow analytics. It will subsequently
react to incursion and thus
Document Page
11
CLOUD COMPUTING
authorized user and hence they could have
the ability in accessing all the shared
resources such as CPU or RAM perfectly.
Furthermore, the code signing keys could
also affect the bandwidth of network.
redirection of the network traffic to
the device of mitigation occurs.
9. Poor IP
Protection
The ninth important security threat or risk
for this organization of Regional Gardens
Ltd is the poor IP protection. This never
consists of the higher encryption and the
security protocol in place. The perfect
classification and identification cannot be
completed for this particular security risk.
This typical security threat or risk
can be reduced by the insufficient
automated system to quantify all
the risks. Moreover, the source of
these threats must be known by
their information technology teams
for this organization. The
infrastructure of network must also
be made absolutely secured and
safe.
10. Failure in
Communicating
with the Cloud
Provider
The final important security risk for the
hybrid cloud or micro services strategy is
the failure in communicating with the cloud
provider (Oliveira, Thomas & Espadanal,
2014). All the cloud vendors must be vetted
for these security controls when they are
handling the confidential data.
This specific kind of security threat
or risk can be reduced with the
proper verification of the data
ownership and security. All the
vendors of hybrid cloud do not
comprise of the capability to
provide reasonable expectations of
ownership.
3. Information Security Steps and Controls for Securing Hybrid Cloud
Document Page
12
CLOUD COMPUTING
Information security can be defined as the perfect practice of a cloud provider in
preventing all the unauthorized or unauthenticated accessing, disclosure, using, inspection,
recording, modification or destruction of the data or information. All the steps and controls
of this information security for securing the hybrid cloud are as follows:
i) Securing from the Advanced Threats: The first and the foremost step for
information security step or control for properly securing the hybrid cloud within the
company of Regional Gardens Ltd is the perfect security from every advanced threat or risk.
The computing environments, network or storage could be easily protected and secured
from these advanced threats and risks (Li et al., 2013). All of these advanced threats
subsequently are those several risks or attacks that disturb the authenticity of the network
security. These attacks are extremely common for the cyber world, since they become a
major issue for the organization. All the information systems as well as the hybrid cloud are
dealt within the organization perfectly. Hence this type of security is mandatory for the
company of Regional Gardens Ltd and this is the very first step in security of the hybrid
cloud.
ii) Security Scaling: The second important and significant information security step
and control for perfectly securing the hybrid cloud of the organization of Regional Gardens
Ltd is the perfect scaling of the security to either change or add to the brand new provider
of cloud (O’Driscoll, Daugelaite & Sleator, 2013). The security scaling is vital for the
organizational hybrid cloud since, it would be increasing the perfect security. The security
scaling must be completed perfectly by the company.
iii) Keeping the Costs of Operation Lower: The next vital step for this organization of
Regional Gardens Ltd for mitigating or controlling their security risks and controlling the

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
CLOUD COMPUTING
hybrid cloud is by keeping the proper operational costs and expenses much low than the
normal (Pearson, 2013). All of these operational expenses must be checked and kept much
lower for the organizational betterment and hence the competitive advantages could be
obtained easily and perfectly. All of these operational expenses must be made lower by
simple means of reduction of the complexities subsequently.
iv) Obtaining Security with Optimization: The fourth vital step for this organization
of Regional Gardens Ltd for mitigating or controlling their security risks and controlling the
hybrid cloud is by obtaining proper security with the optimization. Hence, the organization
will also be getting cost effectiveness to a greater level. The reduction of complexities is yet
another important step in this information security control.
v) Getting Proper Visibility: The final vital step for this organization of Regional
Gardens Ltd for mitigating or controlling their security risks and controlling the hybrid cloud
is by getting the proper visibility. This is obtained within the hybrid cloud they are shifting.
The information is hence secured by this manner and the data storage never makes any
difference for the phenomenon. For this visibility, the entire team of information security
has the ability in noticing the various vulnerabilities as well as risks in the company and
hence removing all the risks or threats for their business. This visibility is thus extremely
important for them.
4. Business Continuity Planning for Hybrid Cloud and Micro services Approach
BCP or business continuity planning can be defined as the perfect creativity of the
specific strategy with proper identification of the various risks of security that are being
faced by this company with the proper assurance that these assets are absolutely safe and
Document Page
14
CLOUD COMPUTING
secured (Rittinghouse & Ransome, 2016). They even have the ability of functioning in
various disasters. The business continuity planning includes the various vital and significant
threats that will be determining the complete process of these risks and thus affecting the
operations of their business. Several safe guards are implemented for this procedure and
the risks could be easily mitigated. Testing is also required for ensuring that processes are
properly updated.
The organization of Regional Gardens Ltd. should develop a particular business
continuity planning within their organization to reduce the amount of disasters occurring
within their systems. All of these issues could be present in the hybrid cloud for the purpose
of disaster recovery, application resilience as well as back up (Yang & Jia, 2013). The several
steps of this business continuity planning for this company are as follows:
i) The first step of this BCP is the conduction of the business impact analysis to
perfectly recognizing the time sensitiveness as well as various important business processes
or resources, which would be supporting each and every business process.
ii) The second step of this business continuity planning in Regional Gardens Ltd is the
perfect recognition, documentation and finally proper implementation of the various
measures of security to get recovered from their security threats.
iii) The third step of this business continuity planning in Regional Gardens Ltd is the
proper organization of their team of business continuity and also for the compilation of the
business continuity planning to properly manage their business disruption (Rong, Nguyen &
Jaatun, 2013).
Document Page
15
CLOUD COMPUTING
iv) The last step of this business continuity planning or BCP within the organization of
Regional Gardens Ltd is the conduction of training for their team of business continuity and
hence testing the strategies and planning.
There are several issues, which are related to the backup, disaster recovery or DR
and application resilience within the environment of hybrid cloud. The various issues are as
follows:
i) Slower Adoption of the Cloud: The first significant issue, which is solely related to
the application resilience, back up and finally disaster recovery or DR in the environment of
hybrid cloud is the slower adoption of the cloud. The data protection or security is being
challenged within this phenomenon (Sanaei et al., 2014). For the slower adoption of the
cloud, their traditional data storage is being targeted and thus it could be resolved. This
business continuity planning could be solving this issue without many complexities.
ii) Slower Recoveries: The second important issue, which is solely related to the
application resilience, back up and finally disaster recovery or DR in the environment of
hybrid cloud is the slower recoveries of the data. The business continuity planning hence
can be much helpful for them since it comprises of every control of security.
iii) Lacking of Scalability and Reliability: The third important issue, which is solely
related to the application resilience, back up and finally disaster recovery or DR in the
environment of hybrid cloud is the lacking of scalability and reliability (Tao et al., 2014). This
issue is major for application resilience. Furthermore, cloud reliability is much high in this
case.
5. Remote Server Administration, Resource Management and SLA Management

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
CLOUD COMPUTING
Resource management is extremely easier with the technology of cloud
computing technology. The entire technology of cloud computing completely depends on
the resource sharing for the purpose of achievement of economies of scale and coherence
(Wei et al., 2014). All the third party clouds can easily enable the companies in focusing over
their major businesses and not on the excess money spending over the computer
maintenance as well as infrastructure. This cloud computing is even responsible for even
avoiding or minimizing the up front information technology infrastructure expenses.
Furthermore, the applications or services could be running faster than usual with the help of
cloud computing technology. The manageability is much improvised with lesser
maintenance. The teams of information technology can easily or rapidly adjust every
resource for the purpose of meeting the unpredictable as well as fluctuating demand (Xiao,
Song & Chen, 2013). The speed of the applications is subsequently increased with the help
of this particular technology.
The organization of Regional Gardens Ltd has taken the decision of shifting their
services as well as applications to the strategy of Micro services or hybrid cloud (Xiao & Xiao,
2013). This company does the remote server administration, resource management as well
as the management of SLA or service level agreement. The proposed instances of platform
as a service and infrastructure as a service are for this conduction. There are several
techniques for the resource management for taking into consideration. They must focus
over the efficient resource sharing amongst the various users. The only important
requirement in resource management is the shared resources. These shared resources are
extremely important as well as significant for the infrastructure as a service and platform as
a service instances. For the purpose of remote administration, the major requirements are
Document Page
17
CLOUD COMPUTING
connection with the host computer and the connectivity of Internet. Proper monitoring and
control of the servers are done with this remote administration. The major requirements for
SLA or service level agreement management are cloud resources as well as cloud services.
Proper negotiation of SLA is done within this network.
6. Migration of email instances to the Amazon Web Services Cloud
There are various important and significant characteristics of the technology of cloud
computing attract the organizations in taking up this technology eventually (Carlin & Curran,
2013). Some of the most important benefits of this cloud computing technology mainly
include self service provisioning, which refer to the fact that the end users could easily spin
up the various computing resources for all types of workload on demand. This subsequently
helps in eliminating the traditional requirement of the administrators of information
technology for proper management and provisioning of the computing resources. The next
benefit of the cloud computing technology is that it is elastic in nature (Whaiduzzaman et
al., 2014). Moreover, it provides the flexibility of migration and hence the companies can
easily shift various workloads from the cloud or to the different platforms of cloud as
required.
6.1. Various Steps for Migrating the Organizational Services
The various steps for the migration of the organizational services are given below:
i) Preparation in Migration: The first step is the migration preparation.
ii) Discovery and Planning of the Portfolio: The second important step is the
planning as well as discovery of the portfolio (Xia et al., 2016).
Document Page
18
CLOUD COMPUTING
iii) Perfect Designing of Application: The third important step to migrate to the
Amazon Web Services or AWS is the perfect designing of their applications.
iv) Migration as well as Validation of Applications: The fourth vital step to migrate
to the Amazon Web Services or AWS from their traditional existing web services is to
migrate as well as validate all the applications.
v) Operation of Migration: The final step in the entire process of migration from
their traditional existing web services to AWS is the operation of migration.
6.2. Critical Point as well as Issues for the Steps with Proper Explanation
The several critical points or issues for the above mentioned steps are given below:
i) Prepare to Migrate: The first and the foremost issue or critical point in this
particular migration is wrong or erroneous planning. When this type of planning is done
properly, the migration is sure to become a major failure for the organization.
ii) Planning and Discovery of Portfolio: There are some of the major critical issues or
points within the migration and thus this should be reduced on time (Botta et al., 2016).
iii) Proper Application Designing: The wrong or incorrect design of this particular
application could subsequently lead to the failure of destruction of this system.
iv) Migration as well as Validation of Applications: The improper validation could
create major problem in this scenario and thus this should be mitigated properly.
v) Operation of Migration: The most significant critical issue or point in this step is
the improper operation of various services for the organization of Regional Gardens Ltd.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
CLOUD COMPUTING
Conclusion
Therefore, from the above report, conclusion can be drawn that cloud computing is
the best technology for the successful delivery of various hosted services on the Internet
connection. This particular technology of cloud computing helps to enable the organizations
in consuming a specific computing resource like the VM or virtual machine, an application or
a storage as the utility. Companies can scale up as computing needs increase and scale
down again as demands decrease. This eliminates the need for massive investments in local
infrastructure, which may or may not remain active. Various organizations also take up this
technology, since it is extremely cost effective and hence could be easily afforded by all. The
cloud service providers can easily implement the redundant resources for the purpose of
ensuring the fact that resilient storage is perfect and also to keep the various workloads
running for the users. The various cloud service or deployment models are the private cloud,
public cloud, hybrid cloud and community cloud. The private cloud services could be
delivered from the data centre of a business to the internal users. This particular model
eventually offers the convenience as well as versatility of the cloud, when the management
is being preserved. Moreover, the data centre can easily control as well as secure the local
data centres. The public cloud is much different from the private cloud. Here, the third party
cloud service provider eventually delivers the cloud service on the Internet. All the services
of public cloud are sold on demand, typically by the minute or hour, though long-term
commitments are available for many services. Customers only pay for
the CPU cycles, storage or bandwidth they consume. The hybrid cloud is the perfect
combination of the private cloud and the public cloud. Here, the services of public cloud and
the on premises private cloud provides perfect automation between the two. The main goal
Document Page
20
CLOUD COMPUTING
of the hybrid cloud is that it helps in creating an automated, unified and scalable
environment, which eventually takes up the advantage of the public cloud infrastructure.
The above report has clearly outlined the brief discussion on the case study of Regional
Gardens Ltd. This particular organization has taken the decision to shift their cloud services
to hybrid cloud and Micro services strategy. Various relevant details regarding the case
study has been provided in the report with proper justification.
Document Page
21
CLOUD COMPUTING
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Al-Roomi, M., Al-Ebrahim, S., Buqrais, S., & Ahmad, I. (2013). Cloud computing pricing
models: a survey. International Journal of Grid and Distributed Computing, 6(5), 93-
106.
Alshamaila, Y., Papagiannidis, S., & Li, F. (2013). Cloud computing adoption by SMEs in the
north east of England: A multi-perspective framework. Journal of Enterprise
Information Management, 26(3), 250-275.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Bora, U.J. & Ahmed, M., (2013). E-learning using cloud computing. International Journal of
Science and Modern Engineering, 1(2), pp.9-12.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
CLOUD COMPUTING
Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing:
Results from a case study of Swiss companies. International journal of information
management, 33(5), 726-733.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI
Global.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future
generation computer systems, 29(1), 84-106.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing
services. Future Generation Computer Systems, 29(4), 1012-1023.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing
by small and medium businesses. International Journal of Information
Management, 33(5), 861-874.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise
of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Document Page
23
CLOUD COMPUTING
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis
of security issues for cloud computing. Journal of internet services and
applications, 4(1), 5.
Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing: What
It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).
Hsu, P. F., Ray, S., & Li-Hsieh, Y. Y. (2014). Examining cloud computing adoption intention,
pricing mechanism, and deployment model. International Journal of Information
Management, 34(4), 474-488.
Hwang, K., Dongarra, J., & Fox, G. C. (2013). Distributed and cloud computing: from parallel
processing to the internet of things. Morgan Kaufmann.
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud
computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud
computing: A survey. Future Generation Computer Systems, 29(5), 1278-1299.
Krishna, P. V. (2013). Honey bee behavior inspired load balancing of tasks in cloud
computing environments. Applied Soft Computing, 13(5), 2292-2303.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal
health records in cloud computing using attribute-based encryption. IEEE
transactions on parallel and distributed systems, 24(1), 131-143.
O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud computing
in genomics. Journal of biomedical informatics, 46(5), 774-781.
Document Page
24
CLOUD COMPUTING
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services
sectors. Information & Management, 51(5), 497-510.
Pahl, C. (2015). Containerization and the paas cloud. IEEE Cloud Computing, 2(3), 24-31.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for
Cloud Computing (pp. 3-42). Springer, London.
Ramya, R., & Ramya, K. (2013). Cloud computing.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security
challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47-54.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), 369-392.
Sridhar, S. (2016). Cloud computing. computing.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and
internet of things-based cloud manufacturing service system. IEEE Transactions on
Industrial Informatics, 10(2), 1435-1442.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and
privacy for storage and computation in cloud computing. Information Sciences, 258,
371-386.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
25
CLOUD COMPUTING
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud
computing. Journal of Network and Computer Applications, 40, 325-344.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-
deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE Communications
Surveys & Tutorials, 15(2), 843-859.
Xiao, Z., Song, W., & Chen, Q. (2013). Dynamic resource allocation using virtual machines for
cloud computing environment. IEEE transactions on parallel and distributed
systems, 24(6), 1107-1117.
Yang, K., & Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage
in cloud computing. IEEE transactions on parallel and distributed systems, 24(9),
1717-1726.
Zhan, Z. H., Liu, X. F., Gong, Y. J., Zhang, J., Chung, H. S. H., & Li, Y. (2015). Cloud computing
resource scheduling and a survey of its evolutionary approaches. ACM Computing
Surveys (CSUR), 47(4), 63.
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]