Cloud Computing : Assignment PDF
VerifiedAdded on 2021/06/14
|33
|9354
|47
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD COMPUTING 1
Cloud Computing
Name:
institution Affiliation:
Cloud Computing
Name:
institution Affiliation:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING 2
Introduction
Cloud computing continues to be practice wherein network to the remote servers tend to be
hosted. This had been performed over the internet (Aazam, Khan, Alsaffar & Huh, 2014). It
facilitates storing, managing and processing data (Aazam, Khan, Alsaffar & Huh, 2014). This is
accomplished as opposed to precisely what is taken on the personal computers or maybe the
servers .Regional Garden organization which runs different variety of affiliated gardening
enterprises. It has large show for the garden which it opens for the public assessment several
times over time (Aazam, Khan, Alsaffar & Huh, 2014). The company continues to be
contemplating numerous plans of the strategy which are needed to be analyzed . The following is
report which is prepared for the Regional Garden organization in which discusses numerous
aspects for the cloud computing.
1. Describe which cloud architectures you would employ to assist Regional Gardens to
meet the Board’s strategy?
a) Describe each of architecture you would use, along with your reasons for deploying
it.
The cloud computing architecture is the structure of the system, which comprises on premise
and cloud services, services, middleware as well as the software component along with the
geo-location (Ali, Khan & Vasilakos, 2015).
Cloud Architecture Description Reason to deploy on it
Workload Distribution
Architecture
On this architecture has been
decreasing over usage to the
information technology
Cloud utilization monitors
have been included in this
case. This is carried out
Introduction
Cloud computing continues to be practice wherein network to the remote servers tend to be
hosted. This had been performed over the internet (Aazam, Khan, Alsaffar & Huh, 2014). It
facilitates storing, managing and processing data (Aazam, Khan, Alsaffar & Huh, 2014). This is
accomplished as opposed to precisely what is taken on the personal computers or maybe the
servers .Regional Garden organization which runs different variety of affiliated gardening
enterprises. It has large show for the garden which it opens for the public assessment several
times over time (Aazam, Khan, Alsaffar & Huh, 2014). The company continues to be
contemplating numerous plans of the strategy which are needed to be analyzed . The following is
report which is prepared for the Regional Garden organization in which discusses numerous
aspects for the cloud computing.
1. Describe which cloud architectures you would employ to assist Regional Gardens to
meet the Board’s strategy?
a) Describe each of architecture you would use, along with your reasons for deploying
it.
The cloud computing architecture is the structure of the system, which comprises on premise
and cloud services, services, middleware as well as the software component along with the
geo-location (Ali, Khan & Vasilakos, 2015).
Cloud Architecture Description Reason to deploy on it
Workload Distribution
Architecture
On this architecture has been
decreasing over usage to the
information technology
Cloud utilization monitors
have been included in this
case. This is carried out
CLOUD COMPUTING 3
resources. The under usage
has been also considered. The
organization has been relying
on the ability of runtime logics
as well as load balancing on
the algorithms to some degree
(Ali, Khan & Vasilakos,
2015).
through runtime workload
tracking (Ali, Khan &
Vasilakos, 2015).. Moreover,
it is also useful when it comes
to processing of data.
Dynamic scalability
Architecture
The model lies on the logics
when it comes to the
predefined systems of the
scaling. These triggers on the
allocation of the information
technology resources
dynamically (Zhan, Liu,
Gong, Zhang, Chung & Li,
2015). This could be carried
out from the resources pool.
The monitors to the cloud
usage have capability to track
the usage of the runtime. This
has been in relation to the
dynamic fluctuation due to the
nature of the architecture.
Resource pooling architecture lies on the ground to use
resource pools. There is
grouping of the resources in
information technology (Zhan,
Liu, Gong, Zhang, Chung &
Many cloud usage monitors
they are usually incorporated
during the tracking as well as
synchronization of the aspects
which are needed by the
resources. The under usage
has been also considered. The
organization has been relying
on the ability of runtime logics
as well as load balancing on
the algorithms to some degree
(Ali, Khan & Vasilakos,
2015).
through runtime workload
tracking (Ali, Khan &
Vasilakos, 2015).. Moreover,
it is also useful when it comes
to processing of data.
Dynamic scalability
Architecture
The model lies on the logics
when it comes to the
predefined systems of the
scaling. These triggers on the
allocation of the information
technology resources
dynamically (Zhan, Liu,
Gong, Zhang, Chung & Li,
2015). This could be carried
out from the resources pool.
The monitors to the cloud
usage have capability to track
the usage of the runtime. This
has been in relation to the
dynamic fluctuation due to the
nature of the architecture.
Resource pooling architecture lies on the ground to use
resource pools. There is
grouping of the resources in
information technology (Zhan,
Liu, Gong, Zhang, Chung &
Many cloud usage monitors
they are usually incorporated
during the tracking as well as
synchronization of the aspects
which are needed by the
CLOUD COMPUTING 4
Li, 2015). Moreover, it
ensures there is
synchronization in an
automatic manner.
information technology
resources which are pooled
(Almorsy, Grundy & Müller,
2016). There is also
consideration to other
management systems.
Elastic Resource Capability
Architecture
This has been related to the
provisioning to the virtual
servers especially in the
dynamics aspects (Almorsy,
Grundy & Müller, 2016). It
has been using allocating as
well as reclaiming of RAM
along with CPUs.
Cloud usage monitors have
been gathering data which are
utilized in the resources in
relation to IT previously and
lastly after carrying out
scaling.
Hybrid cloud architecture
The hybrid cloud is the cloud computing setting wherein utilizes a mix on premises, private
cloud and third party, public cloud services with an orchestration that is between the a few
platforms (Armbrust, Fox, Griffith, Joseph, Katz, Konwinski & Zaharia, 2010). By way of
enabling the workloads to move between the private and public clouds as the computing
necessitates and costs modify, the hybrid provides the business a larger flexibility and more
data when it comes to the deployment options (Zhan, Liu, Gong, Zhang, Chung & Li, 2015).
Li, 2015). Moreover, it
ensures there is
synchronization in an
automatic manner.
information technology
resources which are pooled
(Almorsy, Grundy & Müller,
2016). There is also
consideration to other
management systems.
Elastic Resource Capability
Architecture
This has been related to the
provisioning to the virtual
servers especially in the
dynamics aspects (Almorsy,
Grundy & Müller, 2016). It
has been using allocating as
well as reclaiming of RAM
along with CPUs.
Cloud usage monitors have
been gathering data which are
utilized in the resources in
relation to IT previously and
lastly after carrying out
scaling.
Hybrid cloud architecture
The hybrid cloud is the cloud computing setting wherein utilizes a mix on premises, private
cloud and third party, public cloud services with an orchestration that is between the a few
platforms (Armbrust, Fox, Griffith, Joseph, Katz, Konwinski & Zaharia, 2010). By way of
enabling the workloads to move between the private and public clouds as the computing
necessitates and costs modify, the hybrid provides the business a larger flexibility and more
data when it comes to the deployment options (Zhan, Liu, Gong, Zhang, Chung & Li, 2015).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING 5
When developing a hybrid cloud it involves the accessibility to public infrastructure as a
service (IaaS) system for example Amazon Web Services, Google Cloud platform as well as
Microsoft Azure (Armbrust, Fox, Griffith, Joseph, Katz, Konwinski & Zaharia, 2010). The
construction of the private cloud is though private cloud, likely on the premises or even
through hosted private provider. There should be sufficient Wide area Network connectivity
that is between these environments.
Figure 1: The diagrams show different cloud architectures
It is also important to note that an enterprise has no direct control when it comes to the
architecture of the public cloud, therefore, when it comes to the hybrid loud deployment, it
should architect the private cloud in order to achieve the facet of compatibility with the
preferred public cloud (Boru, Kliazovich, Granelli, Bouvry & Zomaya, 2015). This could
involve the implementation of a hardware that is suitable within the data center, which
include servers, storage, local area network and load balancers. The organization need to then
When developing a hybrid cloud it involves the accessibility to public infrastructure as a
service (IaaS) system for example Amazon Web Services, Google Cloud platform as well as
Microsoft Azure (Armbrust, Fox, Griffith, Joseph, Katz, Konwinski & Zaharia, 2010). The
construction of the private cloud is though private cloud, likely on the premises or even
through hosted private provider. There should be sufficient Wide area Network connectivity
that is between these environments.
Figure 1: The diagrams show different cloud architectures
It is also important to note that an enterprise has no direct control when it comes to the
architecture of the public cloud, therefore, when it comes to the hybrid loud deployment, it
should architect the private cloud in order to achieve the facet of compatibility with the
preferred public cloud (Boru, Kliazovich, Granelli, Bouvry & Zomaya, 2015). This could
involve the implementation of a hardware that is suitable within the data center, which
include servers, storage, local area network and load balancers. The organization need to then
CLOUD COMPUTING 6
deploy the virtualization layer, or perhaps a hypervisor, to manage to generate and support on
the virtual machines (Boru, Kliazovich, Granelli, Bouvry & Zomaya, 2015). The IT team
must then deploy the private cloud software layer for instance, OpenStack, on top of the
hypervisor to manage to deliver the capabilities of the cloud for instance, self service,
automation and orchestration , billing and chargeback and reliability along resilience (Boru,
Kliazovich, Granelli, Bouvry & Zomaya, 2015). With regards to the private cloud architect it
could generate a menu of the majority of the local services for example, compute instances or
even the database situations, from which the users could choose.
The fundamental key to creating a successful hybrid cloud is deciding on a hypervisor and
cloud software layers which are more compatible to the desired public cloud, which assures
there surely is a suitable interoperability with the public cloud application programming
interfaces as well as services (Ren, Zhang, Tao, Zhao, Chai & Zhao, 2015). When it comes to
the implementation of the compatible software as well as services they enable instances of
migrating between the private and the public clouds (Zhan, Liu, Gong, Zhang, Chung & Li,
2015). Moreover, a developer could create advanced applications through use of the mix of
services as well as resources between both the public and the private platforms (Buyya,
Vecchiola & Selvi, 2013). When it comes to the hybrid cloud approach it should also have a
management tools such as Egenera PAN Cloud Director, Cisco Cloud Center which would
assist the business when it comes to handling the workflow that is created (Buyya, Vecchiola
& Selvi, 2013). There are other tasks such as service catalogs, billings along with the other
tasks which are related to the hybrid cloud (Buyya, Vecchiola & Selvi, 2013). It is important
to note that given the sheer volume of the potential tools which are readily available, it is
deploy the virtualization layer, or perhaps a hypervisor, to manage to generate and support on
the virtual machines (Boru, Kliazovich, Granelli, Bouvry & Zomaya, 2015). The IT team
must then deploy the private cloud software layer for instance, OpenStack, on top of the
hypervisor to manage to deliver the capabilities of the cloud for instance, self service,
automation and orchestration , billing and chargeback and reliability along resilience (Boru,
Kliazovich, Granelli, Bouvry & Zomaya, 2015). With regards to the private cloud architect it
could generate a menu of the majority of the local services for example, compute instances or
even the database situations, from which the users could choose.
The fundamental key to creating a successful hybrid cloud is deciding on a hypervisor and
cloud software layers which are more compatible to the desired public cloud, which assures
there surely is a suitable interoperability with the public cloud application programming
interfaces as well as services (Ren, Zhang, Tao, Zhao, Chai & Zhao, 2015). When it comes to
the implementation of the compatible software as well as services they enable instances of
migrating between the private and the public clouds (Zhan, Liu, Gong, Zhang, Chung & Li,
2015). Moreover, a developer could create advanced applications through use of the mix of
services as well as resources between both the public and the private platforms (Buyya,
Vecchiola & Selvi, 2013). When it comes to the hybrid cloud approach it should also have a
management tools such as Egenera PAN Cloud Director, Cisco Cloud Center which would
assist the business when it comes to handling the workflow that is created (Buyya, Vecchiola
& Selvi, 2013). There are other tasks such as service catalogs, billings along with the other
tasks which are related to the hybrid cloud (Buyya, Vecchiola & Selvi, 2013). It is important
to note that given the sheer volume of the potential tools which are readily available, it is
CLOUD COMPUTING 7
crucial to the potential adapters to test as well as evaluate the candidates well in their own
hybrid cloud environment before they could make commitment to any given tool.
b) Benefits and issues that would result from deployment of these architecture
Benefits
Scale
One of the benefits is that of flexibility (Buyya, Vecchiola & Selvi, 2013). Most of the
organization might choose to adopt the cloud architecture since they can increase the flexibility
of the business (Buyya, Vecchiola & Selvi, 2013). It could allow the workers to be more flexible
in or out of their workplace. The workers could gain access to the data so long as they might
have internet connection through any kind of the devices.
Speed
The virtual resources they might use on the requirements of the business objectives with ease.
There have been fast expansions with regards to the speeds of bandwidth based on the needs
(Buyya, Vecchiola & Selvi, 2013).
Integration
It assists with regards to delivering of easy accessibility to the traditional SQL databases.
Moreover, it might provide further analytical opportunities regarding the limitless needs of the
business (Buyya, Vecchiola & Selvi, 2013).
Cost reduction
The main reason as to why the organization could adopt on the cloud architecture n their
enterprise is the fact that it assists in the cost reduction (Buyya, Vecchiola & Selvi , 2013). The
crucial to the potential adapters to test as well as evaluate the candidates well in their own
hybrid cloud environment before they could make commitment to any given tool.
b) Benefits and issues that would result from deployment of these architecture
Benefits
Scale
One of the benefits is that of flexibility (Buyya, Vecchiola & Selvi, 2013). Most of the
organization might choose to adopt the cloud architecture since they can increase the flexibility
of the business (Buyya, Vecchiola & Selvi, 2013). It could allow the workers to be more flexible
in or out of their workplace. The workers could gain access to the data so long as they might
have internet connection through any kind of the devices.
Speed
The virtual resources they might use on the requirements of the business objectives with ease.
There have been fast expansions with regards to the speeds of bandwidth based on the needs
(Buyya, Vecchiola & Selvi, 2013).
Integration
It assists with regards to delivering of easy accessibility to the traditional SQL databases.
Moreover, it might provide further analytical opportunities regarding the limitless needs of the
business (Buyya, Vecchiola & Selvi, 2013).
Cost reduction
The main reason as to why the organization could adopt on the cloud architecture n their
enterprise is the fact that it assists in the cost reduction (Buyya, Vecchiola & Selvi , 2013). The
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING 8
organization is enamored by the chance for the cost reduction as the cloud providers (Buyya,
Vecchiola & Selvi, 2013). This implies the organization could merely pay for the services which
they will use after they get access to the cloud services.
Automatic software/ Hardware Upgrades
When information technology solution continues to be implemented in the organization, this
creates an issue which is unable to have an appropriate financing because of the high cost which
is associated to the purchasing and maintaining the hardware as well as software (Buyya,
Vecchiola & Selvi, 2013). This could offer a negative effect (Buyya, Vecchiola & Selvi, 2013).
These issues could be addressed when adopting the cloud computing architecture approach. The
business could shift on their capital expenses to the operating expenses (Avram, 2014). This
might not reduce on the cost, but it would assist to develop a better relationship , stay in the
technological improvements and improve on the profit and standardized and low cost services
(Buyya, Vecchiola & Selvi, 2013).
Agility
Currently, in such a highly competitive business such as that of the Regional Gardens, it is
important to stay competitive (Avram, 2014). This is one way in which makes the business to be
different from the others and the time which is used to respond on the customers changing needs
(Avram, 2014). The use of this architecture could attain this in a more effective manner.
Issues of deployment of these architectures
Regional Gardens adopting these architectures could have issues when it comes to deployment.
These issues are as follows;
organization is enamored by the chance for the cost reduction as the cloud providers (Buyya,
Vecchiola & Selvi, 2013). This implies the organization could merely pay for the services which
they will use after they get access to the cloud services.
Automatic software/ Hardware Upgrades
When information technology solution continues to be implemented in the organization, this
creates an issue which is unable to have an appropriate financing because of the high cost which
is associated to the purchasing and maintaining the hardware as well as software (Buyya,
Vecchiola & Selvi, 2013). This could offer a negative effect (Buyya, Vecchiola & Selvi, 2013).
These issues could be addressed when adopting the cloud computing architecture approach. The
business could shift on their capital expenses to the operating expenses (Avram, 2014). This
might not reduce on the cost, but it would assist to develop a better relationship , stay in the
technological improvements and improve on the profit and standardized and low cost services
(Buyya, Vecchiola & Selvi, 2013).
Agility
Currently, in such a highly competitive business such as that of the Regional Gardens, it is
important to stay competitive (Avram, 2014). This is one way in which makes the business to be
different from the others and the time which is used to respond on the customers changing needs
(Avram, 2014). The use of this architecture could attain this in a more effective manner.
Issues of deployment of these architectures
Regional Gardens adopting these architectures could have issues when it comes to deployment.
These issues are as follows;
CLOUD COMPUTING 9
Stealing of data
The number of the users and organization would be linked to the internet is increasing. This
might also enhance on the probability of probing and attacking utilizing the viruses, worms as
well as cyber terrorists (Avram, 2014). There have been incidents which previously occurred to
service providers for example Google Inc .where there server got hacked.
Malware injection attack
A hacker might try to damage on the application on the cloud. In most of the cases the hacker
might find vulnerabilities on the web application making changes to it hence change on the
normal execution ( Avram, 2014). The hacker might program a risky application and use the
virtual machine to be able to inject the malware into the cloud services. The hackers might do
what they want for instance the data theft or even eavesdropping. The aspects of the SQL
injection could change on the query structure of the system. The hacker could use improper
validation of the data in order to take advantage (Botta, De Donato, Persico & Pescapé, 2016).
The main target is usually SQL servers or the databases. Moreover, the hackers could inject the
malicious code particularly the web server when it comes to bypassing the login stage and the
gain access to the databases (Buyya, Vecchiola & Selvi, 2013). They would then try to modify
on the databases, retrieve business data and even take control to the entire web server.
DoS (Denial of Service)
The Denial of Service attack has become one of the most concern issues when it comes to the
cloud architecture and a trouble when it comes to the services availability (Buyya, Vecchiola &
Selvi, 2013). This attack has grown and has more effect recently than in the past. There are
various type of this attack such as SYN flood attack, PING of death attack and Smurf attack
Stealing of data
The number of the users and organization would be linked to the internet is increasing. This
might also enhance on the probability of probing and attacking utilizing the viruses, worms as
well as cyber terrorists (Avram, 2014). There have been incidents which previously occurred to
service providers for example Google Inc .where there server got hacked.
Malware injection attack
A hacker might try to damage on the application on the cloud. In most of the cases the hacker
might find vulnerabilities on the web application making changes to it hence change on the
normal execution ( Avram, 2014). The hacker might program a risky application and use the
virtual machine to be able to inject the malware into the cloud services. The hackers might do
what they want for instance the data theft or even eavesdropping. The aspects of the SQL
injection could change on the query structure of the system. The hacker could use improper
validation of the data in order to take advantage (Botta, De Donato, Persico & Pescapé, 2016).
The main target is usually SQL servers or the databases. Moreover, the hackers could inject the
malicious code particularly the web server when it comes to bypassing the login stage and the
gain access to the databases (Buyya, Vecchiola & Selvi, 2013). They would then try to modify
on the databases, retrieve business data and even take control to the entire web server.
DoS (Denial of Service)
The Denial of Service attack has become one of the most concern issues when it comes to the
cloud architecture and a trouble when it comes to the services availability (Buyya, Vecchiola &
Selvi, 2013). This attack has grown and has more effect recently than in the past. There are
various type of this attack such as SYN flood attack, PING of death attack and Smurf attack
CLOUD COMPUTING 10
(Zhan, Liu, Gong, Zhang, Chung & Li, 2015). This attack makes the services on the cloud
inaccessible, at the same time intolerable and this could degrade on the quality of the services
and the connectivity (Buyya, Vecchiola & Selvi, 2013).
Licensing issues
If the license offered supplied to the organization is violated, it could lead to the disruption of the
services or the financial penalties (Zhan, Liu, Gong, Zhang, Chung & Li, 2015). In case there is
an attack to the cloud architecture penalties are going to be high as the software licensing
agreements are not conscious of ‘cloud aware’.
2. Describe the risks that you see associated with this new Hybrid Cloud and Miscro-
services strategy.
Risk Details Possible Control
IT architecture design A hybrid cloud can be highly
complex information technology
architecture which could involve
varying combinations of the
public clouds, private clouds as
well as on-premises of IT. It
takes sosphicated information
technology employees to
architect as well as run an end to
end infrastructure which needs to
support the continuation data
It is important for the
managers to determine on
whether they are going to
hire it, contract for such as
well as offer internal
information technology
with the training.
(Zhan, Liu, Gong, Zhang, Chung & Li, 2015). This attack makes the services on the cloud
inaccessible, at the same time intolerable and this could degrade on the quality of the services
and the connectivity (Buyya, Vecchiola & Selvi, 2013).
Licensing issues
If the license offered supplied to the organization is violated, it could lead to the disruption of the
services or the financial penalties (Zhan, Liu, Gong, Zhang, Chung & Li, 2015). In case there is
an attack to the cloud architecture penalties are going to be high as the software licensing
agreements are not conscious of ‘cloud aware’.
2. Describe the risks that you see associated with this new Hybrid Cloud and Miscro-
services strategy.
Risk Details Possible Control
IT architecture design A hybrid cloud can be highly
complex information technology
architecture which could involve
varying combinations of the
public clouds, private clouds as
well as on-premises of IT. It
takes sosphicated information
technology employees to
architect as well as run an end to
end infrastructure which needs to
support the continuation data
It is important for the
managers to determine on
whether they are going to
hire it, contract for such as
well as offer internal
information technology
with the training.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING 11
transfers which is between all
these kind of platforms and at the
same time to ensure continuous
governance no matter the flow of
the data. Many of the information
technology departments usually
do not have the requisite
expertise in their house.
Collaboration of cloud
procurement with end
business users
The worst manner in entering
into the hybrid cloud strategy is
doing it haphazardly. This kind of
situation develops when the end
users departments and the IT
independently contracts for the
cloud services. Before one could
know it they have a hodgepodge
of the public cloud, private cloud
as well as on premises
information technology and no
one is accountable to the overall
coordination and the
performances of these kind of
investments. The practice usually
There should be
accountability to the
overall coordination and
the performance of the
investment. An individual
or organization could be in
charge to oversee on this
aspect.
transfers which is between all
these kind of platforms and at the
same time to ensure continuous
governance no matter the flow of
the data. Many of the information
technology departments usually
do not have the requisite
expertise in their house.
Collaboration of cloud
procurement with end
business users
The worst manner in entering
into the hybrid cloud strategy is
doing it haphazardly. This kind of
situation develops when the end
users departments and the IT
independently contracts for the
cloud services. Before one could
know it they have a hodgepodge
of the public cloud, private cloud
as well as on premises
information technology and no
one is accountable to the overall
coordination and the
performances of these kind of
investments. The practice usually
There should be
accountability to the
overall coordination and
the performance of the
investment. An individual
or organization could be in
charge to oversee on this
aspect.
CLOUD COMPUTING 12
invites risk and the inefficiencies.
The security and privacy of
the data
Security and privacy are
nowadays improving in the
cloud, but this does not change
on the facts the corporate
information technology has direct
governance, security as well as
privacy control over the data
which the organization would
keep on their own data center and
they do not have this direct
control to the cloud. Organization
has the responsibilities to their
clients to ensure that they keep
the data safe and secure (Hwang,
Dongarra & Fox, 2013). They
need to weigh on the
responsibilities against the
advantages to store data in the
cloud where security of the data
and safeguarding control are
much reduced.
To address on this risk it is
important that the vendors
could understand the
organization data privacy
as well as security needs.
Moreover, they also need
to make sure that the cloud
provider are aware of the
particular data security as
well as privacy rules and
the regulations which could
apply to the entity such as
HIPAA, payment Card
Industry Data Security
Standards or the privacy
consideration.
Disaster recovery and When organization are moving Organization to identify
invites risk and the inefficiencies.
The security and privacy of
the data
Security and privacy are
nowadays improving in the
cloud, but this does not change
on the facts the corporate
information technology has direct
governance, security as well as
privacy control over the data
which the organization would
keep on their own data center and
they do not have this direct
control to the cloud. Organization
has the responsibilities to their
clients to ensure that they keep
the data safe and secure (Hwang,
Dongarra & Fox, 2013). They
need to weigh on the
responsibilities against the
advantages to store data in the
cloud where security of the data
and safeguarding control are
much reduced.
To address on this risk it is
important that the vendors
could understand the
organization data privacy
as well as security needs.
Moreover, they also need
to make sure that the cloud
provider are aware of the
particular data security as
well as privacy rules and
the regulations which could
apply to the entity such as
HIPAA, payment Card
Industry Data Security
Standards or the privacy
consideration.
Disaster recovery and When organization are moving Organization to identify
CLOUD COMPUTING 13
failover data and application to the cloud
they need to ask to see as to
whether the disaster recovery
plans and failover commitments
of cloud providers. They need to
find how many data centers a
cloud provider utilizes whether
there is a complete failover which
is between the data centers secure
(Hwang, Dongarra & Fox, 2013).
To the equal significance is
whether the cloud providers
could own data centers or its
leasing data centers capability
from the other third parties which
the organization do not have to
contract with secure (Hwang,
Dongarra & Fox, 2013).
Therefore, the risk assessment in
this area could become business,
continuation and legal liability
issue.
how many data centers
cloud providers could use
and if there is a failover.
On-premise licenses and the If an organization is shifting from Staying with one vendor to
failover data and application to the cloud
they need to ask to see as to
whether the disaster recovery
plans and failover commitments
of cloud providers. They need to
find how many data centers a
cloud provider utilizes whether
there is a complete failover which
is between the data centers secure
(Hwang, Dongarra & Fox, 2013).
To the equal significance is
whether the cloud providers
could own data centers or its
leasing data centers capability
from the other third parties which
the organization do not have to
contract with secure (Hwang,
Dongarra & Fox, 2013).
Therefore, the risk assessment in
this area could become business,
continuation and legal liability
issue.
how many data centers
cloud providers could use
and if there is a failover.
On-premise licenses and the If an organization is shifting from Staying with one vendor to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING 14
contract management on-premises to the cloud, optimal
coordination usually take place if
they could make the transition
when their on-premises software
licenses expires (Pluzhnik,
Nikulchev & Payain, 2014).
Migration to the cloud is not an
issue if they stay with the same
vendor, but becomes are issue if
they are shifting to another
vendor. It is important to review
thoroughly contracts for the
pricing and other conditions as
well as stipulations secure
(Hwang, Dongarra & Fox, 2013).
Many of the organization could
end up disappointed when they
begin to receive extra charges to
the bills to numerous services
they thought they could be
included in their flat monthly fees
subscriptions to the cloud (Wei,
Zhu, Cao, Dong, Jia, Chen &
prevent issues related to
migration.
contract management on-premises to the cloud, optimal
coordination usually take place if
they could make the transition
when their on-premises software
licenses expires (Pluzhnik,
Nikulchev & Payain, 2014).
Migration to the cloud is not an
issue if they stay with the same
vendor, but becomes are issue if
they are shifting to another
vendor. It is important to review
thoroughly contracts for the
pricing and other conditions as
well as stipulations secure
(Hwang, Dongarra & Fox, 2013).
Many of the organization could
end up disappointed when they
begin to receive extra charges to
the bills to numerous services
they thought they could be
included in their flat monthly fees
subscriptions to the cloud (Wei,
Zhu, Cao, Dong, Jia, Chen &
prevent issues related to
migration.
CLOUD COMPUTING 15
Vasilakos, 2014).
Environmental security Concentration to the computing
resources as well as users in the
cloud computing environment
does represents concentration to
the security threats. Due to size
and significance, cloud
environment are more targeted by
the virtual machines and the bot
malware, and brute force attacks.
To address on this risk it is
important to ask the cloud
provider in relation to the
access control,
vulnerability assessment
practices and the patch and
configuration management
controls to ensure there is
adequate protecting of the
data (Sultan, 2014).
Vendor liability and risk
management
Some time a vendor might not
have control over circumstances
which leads to the problem
associated to vendor liability for
disaster and downtime secure
(Hwang, Dongarra & Fox, 2013).
This could happen if the cloud
vendor does not have their own
data centers and they contract for
it with the third parties. This
issue generally originates in one
To address on this risk, it is
important to review the
cloud vendor before they
could sign on any
agreement secure (Hwang,
Dongarra & Fox, 2013). It
is also important to contact
the legal counsel if there is
any issue which is related
to the legal liability.
Vasilakos, 2014).
Environmental security Concentration to the computing
resources as well as users in the
cloud computing environment
does represents concentration to
the security threats. Due to size
and significance, cloud
environment are more targeted by
the virtual machines and the bot
malware, and brute force attacks.
To address on this risk it is
important to ask the cloud
provider in relation to the
access control,
vulnerability assessment
practices and the patch and
configuration management
controls to ensure there is
adequate protecting of the
data (Sultan, 2014).
Vendor liability and risk
management
Some time a vendor might not
have control over circumstances
which leads to the problem
associated to vendor liability for
disaster and downtime secure
(Hwang, Dongarra & Fox, 2013).
This could happen if the cloud
vendor does not have their own
data centers and they contract for
it with the third parties. This
issue generally originates in one
To address on this risk, it is
important to review the
cloud vendor before they
could sign on any
agreement secure (Hwang,
Dongarra & Fox, 2013). It
is also important to contact
the legal counsel if there is
any issue which is related
to the legal liability.
CLOUD COMPUTING 16
of data centers. Additionally, the
situation could worsen if there
was security breach into the
cloud vendor which could happen
in the cloud
Risk in relation to cloud
security
Great deal has been recent when
it comes to cloud and it has clear
intrinsic dangers. The cloud
market security usually measures
have been taking place each day.
This has been the reason as to
why the security of the
organization has been a major
concern (Chen, Zhang, Hu, Taleb
& Sheng, (2015). There has been
some principle security
challenges in regards to the
associations which could convey
on the hybrid cloud approach.
The organization need to
incorporate security
administration, risk
management as well as
inadequate developed
administration level of
some agreement. This issue
usually accompany on the
security challenge (Chen,
Zhang, Hu, Taleb & Sheng,
(2015). Regional Gardens
should guarantee every
section of the strategy in
relation to the cloud has
been consistent to
regulations to any
industries (Wang, Zheng,
Lou & Hou, 2015). It is
of data centers. Additionally, the
situation could worsen if there
was security breach into the
cloud vendor which could happen
in the cloud
Risk in relation to cloud
security
Great deal has been recent when
it comes to cloud and it has clear
intrinsic dangers. The cloud
market security usually measures
have been taking place each day.
This has been the reason as to
why the security of the
organization has been a major
concern (Chen, Zhang, Hu, Taleb
& Sheng, (2015). There has been
some principle security
challenges in regards to the
associations which could convey
on the hybrid cloud approach.
The organization need to
incorporate security
administration, risk
management as well as
inadequate developed
administration level of
some agreement. This issue
usually accompany on the
security challenge (Chen,
Zhang, Hu, Taleb & Sheng,
(2015). Regional Gardens
should guarantee every
section of the strategy in
relation to the cloud has
been consistent to
regulations to any
industries (Wang, Zheng,
Lou & Hou, 2015). It is
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING 17
crucial to guarantee on the
data which is going among
the private and the open
cloud situation.
3. Describe general information security steps and control to be recommended to Board to
secure Hybrid cloud.
Determine on the model for the cloud deployment for data
This step is usually critical since it helps to define data at first (Chen, Zhang, Hu, Taleb & Sheng,
(2015). The deployment alternatives are on premises, public, hosted private cloud or even the
composition to all.
Integrating to the current enterprises systems
In this step managed interfaces are implemented. Through guide to this the cloud services
components have the ability to intrude to the on premise programs (Chang, Kuo &
Ramachandran, 2016). This could be carried out by technologies such as API management.
There is requirement for the business and management elements in integration which need to be
considered. Moreover, it also comprises of the functional integrating programs (Chen, Zhang,
Hu, Taleb & Sheng, (2015). The demand to the cloud services usually deliver back up on the
interfaces for the cloud services.
Address on the requirement for connectivity
crucial to guarantee on the
data which is going among
the private and the open
cloud situation.
3. Describe general information security steps and control to be recommended to Board to
secure Hybrid cloud.
Determine on the model for the cloud deployment for data
This step is usually critical since it helps to define data at first (Chen, Zhang, Hu, Taleb & Sheng,
(2015). The deployment alternatives are on premises, public, hosted private cloud or even the
composition to all.
Integrating to the current enterprises systems
In this step managed interfaces are implemented. Through guide to this the cloud services
components have the ability to intrude to the on premise programs (Chang, Kuo &
Ramachandran, 2016). This could be carried out by technologies such as API management.
There is requirement for the business and management elements in integration which need to be
considered. Moreover, it also comprises of the functional integrating programs (Chen, Zhang,
Hu, Taleb & Sheng, (2015). The demand to the cloud services usually deliver back up on the
interfaces for the cloud services.
Address on the requirement for connectivity
CLOUD COMPUTING 18
There are needs to each link to the component to the considered. This aspect has been the
spanning to numerous cloud services secure (Hwang, Dongarra & Fox, 2013). The organization
assures connectivity for the requirement. The network for the virtualization utilizing is
considered in case if it is available (Sridhar, 2016). The capability of the connectivity usually
support on the resilience as well as requirement to the disaster recovery which is ensured (Chen,
Zhang, Hu, Taleb & Sheng, (2015).
Identify and prioritize confidential data.
The majority of the organization would not realize how to begin to start safeguarding private
data. By categorizing on the type of data by value and confidentiality, they will be able to
prioritize the kind of data to secure first (Chen, Zhang, Hu, Taleb & Sheng, 2015). The
significant to choose this step is that the client data systems or the workers record system is the
simplest place to begin because few specific systems might own the capability to update this type
of data (Gai, Qiu , Zhao , Tao & Zong , 2016) . Securing of the structured data are finite areas
which have to be protected. Securing on the unstructured data for example contracts, financial
releases as well as the customer correspondence is an important step which could roll out based
on departmental basis.
Perform a cloud vendor audit
It is important for the organization to do their home well to ensure they can comprehend various
options which are much available for the cloud deployment as well as determine on the best fit to
the needs of the organization (Gai, Qiu, Zhao, Tao & Zong, 2016). One can understand on this task
with knowledgeable internal team or work with industry consultant for guidance. It is important
to remember that the cloud vendors market their ease of the onboarding over their security aspect
There are needs to each link to the component to the considered. This aspect has been the
spanning to numerous cloud services secure (Hwang, Dongarra & Fox, 2013). The organization
assures connectivity for the requirement. The network for the virtualization utilizing is
considered in case if it is available (Sridhar, 2016). The capability of the connectivity usually
support on the resilience as well as requirement to the disaster recovery which is ensured (Chen,
Zhang, Hu, Taleb & Sheng, (2015).
Identify and prioritize confidential data.
The majority of the organization would not realize how to begin to start safeguarding private
data. By categorizing on the type of data by value and confidentiality, they will be able to
prioritize the kind of data to secure first (Chen, Zhang, Hu, Taleb & Sheng, 2015). The
significant to choose this step is that the client data systems or the workers record system is the
simplest place to begin because few specific systems might own the capability to update this type
of data (Gai, Qiu , Zhao , Tao & Zong , 2016) . Securing of the structured data are finite areas
which have to be protected. Securing on the unstructured data for example contracts, financial
releases as well as the customer correspondence is an important step which could roll out based
on departmental basis.
Perform a cloud vendor audit
It is important for the organization to do their home well to ensure they can comprehend various
options which are much available for the cloud deployment as well as determine on the best fit to
the needs of the organization (Gai, Qiu, Zhao, Tao & Zong, 2016). One can understand on this task
with knowledgeable internal team or work with industry consultant for guidance. It is important
to remember that the cloud vendors market their ease of the onboarding over their security aspect
CLOUD COMPUTING 19
secure (Hwang, Dongarra & Fox, 2013). It is important to make organization identity more than
one suitable vendor as a means of contingency when it comes to preferred vendor which has not
been approved to the organization.
Understand the procurement policies
The organization needs to talk to the procurement departments in order to get handle on whether
they could rely to the single vendor or needs to follow the dual deployment policy (Grewal &
Pateriya, 2013). Many businesses require more than one vendor for the redundancy as well as
failover capabilities. The reason to take such step is to ensure when the organization obtain more
than one vendor they could reduced the aspect of failover.
Complete internal security audit
The organization need to undertake an internal audit to unearth the security policies they have
established for both the on-premise as well as the cloud servers (Grewal & Pateriya, 2013). It is
important to note on all the discrepancies and at the same time asses technological obstacles. The
reason to undertake this step is to ensure that the organization is not doing any overlapping
namespaces which includes the ID ranges for the user accounts (Grewal & Pateriya, 2013).
Access to the type of data that is stored
It is important for the organization to meet those who are in charge to each of the vital line to the
business in order to pin point on the kind of the data which has been saved to the cloud and how
it could be moved to the on-premises environment (Gangwar, Date & Ramaswamy, 2015). The
significance of this step is to ensure that the security aspects are evaluated especially to the areas
secure (Hwang, Dongarra & Fox, 2013). It is important to make organization identity more than
one suitable vendor as a means of contingency when it comes to preferred vendor which has not
been approved to the organization.
Understand the procurement policies
The organization needs to talk to the procurement departments in order to get handle on whether
they could rely to the single vendor or needs to follow the dual deployment policy (Grewal &
Pateriya, 2013). Many businesses require more than one vendor for the redundancy as well as
failover capabilities. The reason to take such step is to ensure when the organization obtain more
than one vendor they could reduced the aspect of failover.
Complete internal security audit
The organization need to undertake an internal audit to unearth the security policies they have
established for both the on-premise as well as the cloud servers (Grewal & Pateriya, 2013). It is
important to note on all the discrepancies and at the same time asses technological obstacles. The
reason to undertake this step is to ensure that the organization is not doing any overlapping
namespaces which includes the ID ranges for the user accounts (Grewal & Pateriya, 2013).
Access to the type of data that is stored
It is important for the organization to meet those who are in charge to each of the vital line to the
business in order to pin point on the kind of the data which has been saved to the cloud and how
it could be moved to the on-premises environment (Gangwar, Date & Ramaswamy, 2015). The
significance of this step is to ensure that the security aspects are evaluated especially to the areas
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING 20
the organization deems they have sensitive data for instance credit card data, personal workers
details, health records and the business plans (Grewal & Pateriya, 2013).
Preparation for the regulatory audits
It is important to think via the audit process as they apply to the business. it is important to talk
to the administrative workers in order to find out how much effort it is to them in order to
support on these disruptive activities which may arise (Gangwar, Date & Ramaswamy, 2015).
This step is crucial since it will help determine on the tools which are currently are used, and
where there are gaps which might reside (Gangwar, Date & Ramaswamy, 2015). The steps
enable one to understand on each of the regulations to the business needs and demonstrate the
aspects of compliance with GDPR, DSS as well as SOX.
Standardize security policies which include user access
Whether they will have hybrid on-premise environment, it is crucial they ensure they make sure
they have solution which could work seamlessly across both technology stacks (Hu, Hao & Bao,
2014). When relying on the cloud vendor default security setting it can be biggest mistake, since
they might be strong enough to meet on the needs or they might not be compatible with the on-
premise equipment (Marinescu, 2017). This step is crucial since it identifies which technology
solutions the organization would implement as well as identity and access management; they
would put in place to address requirements of the security.
Mapping out timeline of project and potential for the disruption
Once the organization develops on the game plane and the associated dates, they determine on
the likelihood of each day processes which could be disrupted particularly during the update
the organization deems they have sensitive data for instance credit card data, personal workers
details, health records and the business plans (Grewal & Pateriya, 2013).
Preparation for the regulatory audits
It is important to think via the audit process as they apply to the business. it is important to talk
to the administrative workers in order to find out how much effort it is to them in order to
support on these disruptive activities which may arise (Gangwar, Date & Ramaswamy, 2015).
This step is crucial since it will help determine on the tools which are currently are used, and
where there are gaps which might reside (Gangwar, Date & Ramaswamy, 2015). The steps
enable one to understand on each of the regulations to the business needs and demonstrate the
aspects of compliance with GDPR, DSS as well as SOX.
Standardize security policies which include user access
Whether they will have hybrid on-premise environment, it is crucial they ensure they make sure
they have solution which could work seamlessly across both technology stacks (Hu, Hao & Bao,
2014). When relying on the cloud vendor default security setting it can be biggest mistake, since
they might be strong enough to meet on the needs or they might not be compatible with the on-
premise equipment (Marinescu, 2017). This step is crucial since it identifies which technology
solutions the organization would implement as well as identity and access management; they
would put in place to address requirements of the security.
Mapping out timeline of project and potential for the disruption
Once the organization develops on the game plane and the associated dates, they determine on
the likelihood of each day processes which could be disrupted particularly during the update
CLOUD COMPUTING 21
period (Gangwar, Date & Ramaswamy, 2015). Some areas in the business might not be able to
tolerate on the downtime. The significance of this step would be to establish on the contingency
plans which could lay out the actions for the team which they would undertake in case of an
event issues if it was to arise.
4. Discuss briefly what you would recommend should be included in Regional Gardens
BCP as result to their adoption of Hybrid Cloud and Microservices approach.
Issue of application resilience
One of the biggest barriers as to prevent Regional Green enterprise from embracing on the cloud
for resilience would be lack of the knowledge or the experience with various technologies in
order to attain cloud resilience across the dispersed environments (Mell & Grance, 2011). The
organization might not know which application as well as data which could have great affinity to
the cloud resilience as well as reluctant in implementing on the new processes which could
require additional information technology, business as well as recovery education. Moreover,
they might have undertaken on the in depth evaluation to their existing disaster recovery
strategy, architecture as well as procedures (Mell & Grance, 2011). With such limited ideas to
the impact of the cloud based recovery they could have on their business, this organization could
be wary when it comes to the approach which they are unfamiliar to them (Zhang, Jiang,
Yoshihira & Chen, 2014). Additionally, they might not pose the capability to automate dissimilar
hardware restorations. In case the brand and the types of the servers the organization have is
totally different in terms of physical or the virtual, definitely there would be disparities when it
comes to recovery the efficiency (Chen, Zhang, Hu, Taleb & Sheng, 2015). Such kind of issues
could entail a specialized handling when they are adopting the cloud based resilience.
period (Gangwar, Date & Ramaswamy, 2015). Some areas in the business might not be able to
tolerate on the downtime. The significance of this step would be to establish on the contingency
plans which could lay out the actions for the team which they would undertake in case of an
event issues if it was to arise.
4. Discuss briefly what you would recommend should be included in Regional Gardens
BCP as result to their adoption of Hybrid Cloud and Microservices approach.
Issue of application resilience
One of the biggest barriers as to prevent Regional Green enterprise from embracing on the cloud
for resilience would be lack of the knowledge or the experience with various technologies in
order to attain cloud resilience across the dispersed environments (Mell & Grance, 2011). The
organization might not know which application as well as data which could have great affinity to
the cloud resilience as well as reluctant in implementing on the new processes which could
require additional information technology, business as well as recovery education. Moreover,
they might have undertaken on the in depth evaluation to their existing disaster recovery
strategy, architecture as well as procedures (Mell & Grance, 2011). With such limited ideas to
the impact of the cloud based recovery they could have on their business, this organization could
be wary when it comes to the approach which they are unfamiliar to them (Zhang, Jiang,
Yoshihira & Chen, 2014). Additionally, they might not pose the capability to automate dissimilar
hardware restorations. In case the brand and the types of the servers the organization have is
totally different in terms of physical or the virtual, definitely there would be disparities when it
comes to recovery the efficiency (Chen, Zhang, Hu, Taleb & Sheng, 2015). Such kind of issues
could entail a specialized handling when they are adopting the cloud based resilience.
CLOUD COMPUTING 22
On this issue of resilience the organization might have various applications which might not bear
functioning in the cloud or virtualized environment as a result of the legacy hardware or the
vendor they might not help them (Chen, Zhang, Hu, Taleb & Sheng, 2015). Organization with
this challenge they have traditionally taken on the monolithic approach when it comes to the data
recovery, protecting to all the system with the same approach (Choi, Choi & Kim, 2014). As
more models emerge, more and more organization they are beginning to segment on their
recovery techniques either through platform or the system critically.
They need to implement a blend of both private and public cloud services to help meet on the
business demands to agility and risk tolerance to the sensitive applications as well as data
(Leymann, Retter, Schupeck & Arbitter, 2014). Whether the organization chooses to focus on to
the internal pain points such as; technology constraints, preferences in business, cost or the
internal pressure such as the regulatory demands, they need to select type of the cloud resilience
solution or the combination to the types (Choi, Choi & Kim, 2014). Charting on the path to
successful transform to cloud based business resilience and continuity they would require
planned approach which is more cohesive and it could encompass on everything from the planed
as well as design in order to implement and evaluate.
Backup and disaster recovery in Hybrid cloud environment
Complete disaster recovery solution has traditionally been complex as well as expensive when it
comes to deployment (Choi, Choi & Kim, 2014). The organization has two locations, the
primary data centers and separate location which could support on the operation should the main
site fail (Toosi, Calheiros & Buyya, 2014). Maintaining on this kind of environment is cost
prohibitive, hence that whey the secondary site are deployed by the large organization that has
On this issue of resilience the organization might have various applications which might not bear
functioning in the cloud or virtualized environment as a result of the legacy hardware or the
vendor they might not help them (Chen, Zhang, Hu, Taleb & Sheng, 2015). Organization with
this challenge they have traditionally taken on the monolithic approach when it comes to the data
recovery, protecting to all the system with the same approach (Choi, Choi & Kim, 2014). As
more models emerge, more and more organization they are beginning to segment on their
recovery techniques either through platform or the system critically.
They need to implement a blend of both private and public cloud services to help meet on the
business demands to agility and risk tolerance to the sensitive applications as well as data
(Leymann, Retter, Schupeck & Arbitter, 2014). Whether the organization chooses to focus on to
the internal pain points such as; technology constraints, preferences in business, cost or the
internal pressure such as the regulatory demands, they need to select type of the cloud resilience
solution or the combination to the types (Choi, Choi & Kim, 2014). Charting on the path to
successful transform to cloud based business resilience and continuity they would require
planned approach which is more cohesive and it could encompass on everything from the planed
as well as design in order to implement and evaluate.
Backup and disaster recovery in Hybrid cloud environment
Complete disaster recovery solution has traditionally been complex as well as expensive when it
comes to deployment (Choi, Choi & Kim, 2014). The organization has two locations, the
primary data centers and separate location which could support on the operation should the main
site fail (Toosi, Calheiros & Buyya, 2014). Maintaining on this kind of environment is cost
prohibitive, hence that whey the secondary site are deployed by the large organization that has
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING 23
funding and they are well staffed in the IT department (Choi, Choi & Kim, 2014). The
organization requires resources which are in form of the server hardware, storage devices as well
as manpower to run in these two locations (Chen, Zhang, Hu, Taleb & Sheng, 2015). If the
organization has big workload they would demand more. Hybrid cloud would allow various
options especially to leverage the public cloud as more of the destination for the backup (Yan,
Yu, Gong & Li, 2016). It is possible to start on the use of the cloud for more targets where data is
dumped in case it is needed.
Recommendation
Hybrid cloud condition was cloud run for the organization because of several causes. The least
with that are the business resilience, disaster recuperation and reinforcement (Hashem, Yaqoob,
Anuar, Mokhtar, Gani & Khan, 2015). Essential reason is the fact it offers adaptability to be able
to span on the local and remote storage. The cloud assists to have different alternatives (Chen,
Zhang, Hu, Taleb & Sheng, 2015). This usually occurs on the off chance in which there is
leveraging more and more of the backing up. Using the cloud begun with something which is
beyond objective to where the data is dumped in the required events. This could set for the
phases to utilize on the cloud to restart or reestablish, continue or reconstitute and make on the
premises to recover the disasters (Manvi & Shyam, 2014). Hybrid cloud environment is home
run due to the adjustment to the present resources. The present infrastructure work might be
secured (Yan & Yu, 2015). In most perfect scenario it could occur especially in creation of the
dynamic, where a flexible condition has been intended.
5. Management of the hybrid cloud
Analysis for the requirements
funding and they are well staffed in the IT department (Choi, Choi & Kim, 2014). The
organization requires resources which are in form of the server hardware, storage devices as well
as manpower to run in these two locations (Chen, Zhang, Hu, Taleb & Sheng, 2015). If the
organization has big workload they would demand more. Hybrid cloud would allow various
options especially to leverage the public cloud as more of the destination for the backup (Yan,
Yu, Gong & Li, 2016). It is possible to start on the use of the cloud for more targets where data is
dumped in case it is needed.
Recommendation
Hybrid cloud condition was cloud run for the organization because of several causes. The least
with that are the business resilience, disaster recuperation and reinforcement (Hashem, Yaqoob,
Anuar, Mokhtar, Gani & Khan, 2015). Essential reason is the fact it offers adaptability to be able
to span on the local and remote storage. The cloud assists to have different alternatives (Chen,
Zhang, Hu, Taleb & Sheng, 2015). This usually occurs on the off chance in which there is
leveraging more and more of the backing up. Using the cloud begun with something which is
beyond objective to where the data is dumped in the required events. This could set for the
phases to utilize on the cloud to restart or reestablish, continue or reconstitute and make on the
premises to recover the disasters (Manvi & Shyam, 2014). Hybrid cloud environment is home
run due to the adjustment to the present resources. The present infrastructure work might be
secured (Yan & Yu, 2015). In most perfect scenario it could occur especially in creation of the
dynamic, where a flexible condition has been intended.
5. Management of the hybrid cloud
Analysis for the requirements
CLOUD COMPUTING 24
Remote server Administration tools
This provides required as the Window 8 employs the server manager, and the Microsoft
Management Console which is Snap-ins. Others are Windows Powershell cmdlets and suppliers
(Chen, Zhang, Hu, Taleb & Sheng, 2015). It also consists of the command line tools which are
used to control on the characteristics as well as the responsibilities for running on the Windows
server for the version of 2012 (Chen, Zhang, Hu, Taleb & Sheng, 2015). When it comes to the
cases which are restricted, such instruments might be used to oversee on the parts and the
components which run on the Windows server version for 2008 R2 or even the Windows server
2008 (Chen, Zhang, Hu, Taleb & Sheng, 2015). Some of the requirements are performed in
order to control on the same when using Windows Server 2003.
Requirements for the server management
When it comes to the On Command for the cloud manager it could be used when it comes to the
delivering of the core point for the point management to each end point for the fabric data. This
is performed at the cloud (Pulier, Martinez & Hill, 2015). Moreover, it assists replication of the
data especially around the multi-cloud as well as the hybrid storages. Additionally, it could
manage expenses for the cloud storages.
SLA management
The movement to the cloud based approach might have various ramifications. Some could have
imperative changes especially to the standards of SLA (Puthal, Sahoo, Mishra & Swain, 2015).
In the past, when undertaking information technology groups they have controls which are
finished over the assets and they could feature their SLA based on the capabilities of domains
which are closed and on-premises (Taleb, Corici, Parada, Jamakovic, Ruffino, Karagiannis &
Remote server Administration tools
This provides required as the Window 8 employs the server manager, and the Microsoft
Management Console which is Snap-ins. Others are Windows Powershell cmdlets and suppliers
(Chen, Zhang, Hu, Taleb & Sheng, 2015). It also consists of the command line tools which are
used to control on the characteristics as well as the responsibilities for running on the Windows
server for the version of 2012 (Chen, Zhang, Hu, Taleb & Sheng, 2015). When it comes to the
cases which are restricted, such instruments might be used to oversee on the parts and the
components which run on the Windows server version for 2008 R2 or even the Windows server
2008 (Chen, Zhang, Hu, Taleb & Sheng, 2015). Some of the requirements are performed in
order to control on the same when using Windows Server 2003.
Requirements for the server management
When it comes to the On Command for the cloud manager it could be used when it comes to the
delivering of the core point for the point management to each end point for the fabric data. This
is performed at the cloud (Pulier, Martinez & Hill, 2015). Moreover, it assists replication of the
data especially around the multi-cloud as well as the hybrid storages. Additionally, it could
manage expenses for the cloud storages.
SLA management
The movement to the cloud based approach might have various ramifications. Some could have
imperative changes especially to the standards of SLA (Puthal, Sahoo, Mishra & Swain, 2015).
In the past, when undertaking information technology groups they have controls which are
finished over the assets and they could feature their SLA based on the capabilities of domains
which are closed and on-premises (Taleb, Corici, Parada, Jamakovic, Ruffino, Karagiannis &
CLOUD COMPUTING 25
Magedanz, 2015). The presentation to the open cloud could separate on the conventional
boundaries to the data center. Moreover, when it comes to the hybrid cloud, to maintain on-
premises and various off-premises assets, stages, SLAs should cover all the ability to numerous
information technology atmospheres.
6a. Migration plan
Describe steps that would be included to migrate eMail to AWS cloud
With AWS, there is provision in regards to computing of power, storage as well as other
resources which enable the business to gain entry to the suite of elastic information technology
infrastructure services as business could demand it (Chen, Zhang, Hu, Taleb & Sheng, 2015).
With minimal cost and effort, it is possible to move services such as eMail to the AWS cloud and
reduce on the capital expenses, reduce the support as well as administrative costs and retain on
the performance, security along with the reliability requirement to the business needs (Chen,
Zhang, Hu, Taleb & Sheng, 2015). RegionalGardens organization taking this incremental
approach to cloud migration would help them on the issue of scalability, data integrity as well as
pricing in order to run the current SharePoint workloads they are encountering. The following is
the step by stead guide to migrate to AWS (Mastelic, Oleksiak, Claussen, Brandic, Pierson &
Vasilakos, 2015).
Magedanz, 2015). The presentation to the open cloud could separate on the conventional
boundaries to the data center. Moreover, when it comes to the hybrid cloud, to maintain on-
premises and various off-premises assets, stages, SLAs should cover all the ability to numerous
information technology atmospheres.
6a. Migration plan
Describe steps that would be included to migrate eMail to AWS cloud
With AWS, there is provision in regards to computing of power, storage as well as other
resources which enable the business to gain entry to the suite of elastic information technology
infrastructure services as business could demand it (Chen, Zhang, Hu, Taleb & Sheng, 2015).
With minimal cost and effort, it is possible to move services such as eMail to the AWS cloud and
reduce on the capital expenses, reduce the support as well as administrative costs and retain on
the performance, security along with the reliability requirement to the business needs (Chen,
Zhang, Hu, Taleb & Sheng, 2015). RegionalGardens organization taking this incremental
approach to cloud migration would help them on the issue of scalability, data integrity as well as
pricing in order to run the current SharePoint workloads they are encountering. The following is
the step by stead guide to migrate to AWS (Mastelic, Oleksiak, Claussen, Brandic, Pierson &
Vasilakos, 2015).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING 26
Figure 2: To show step by step guide to AWS migration.
Step 1 cloud assessment
In this step it entails the financial assessment (Oliveira, Thomas & Espadanal, 2014).. It entails
the organization to weigh on the financial considerations to own and operate the data center or
even co-locates on the facilities vs. employing on the cloud based infrastructure which requires a
much detailed and a careful analysis (Li, Wang, Li, Wang & Du, 2013). Sometimes it might not
be easy to measure on the potential hardware expenses along with the utility pricing to compute
and store on the resources. This organization need to take multitude of the options in order to
consider the impact of a valid comparison between the two alternatives. Amazon published on
their whitepaper to assist gather on the crucial data for the appropriate comparison
(Jula,Sundararajan & Othman, 2014). Other assessment which needs to be carried out are on
security and compliance assessment, technical assessment, determining on the tools that can be
reused as well as the tools that may be built, migrate the licensed products and create a plan so as
to assess on the success (Rittinghouse & Ransome, 2016).
Step 2 proof of the concept
One the organization has been able to identify on the right candidate to the cloud and anticipated
on the effort that are necessary to migrate, it is now time to test on the waters with little evidence
of the concept (Lu, Sun, Wu & Zhu, 2015). The purpose of this step would be learning AWS and
at the same time ensure that any assumptions in regards to the suitability to migrate to cloud are
much accurate (Tao, Cheng, Da Xu, Zhang & Li, 2014). In this field one could small Greenfield
application and in this process you could get started with the AWS cloud.
Step 3: Data migration phase
Figure 2: To show step by step guide to AWS migration.
Step 1 cloud assessment
In this step it entails the financial assessment (Oliveira, Thomas & Espadanal, 2014).. It entails
the organization to weigh on the financial considerations to own and operate the data center or
even co-locates on the facilities vs. employing on the cloud based infrastructure which requires a
much detailed and a careful analysis (Li, Wang, Li, Wang & Du, 2013). Sometimes it might not
be easy to measure on the potential hardware expenses along with the utility pricing to compute
and store on the resources. This organization need to take multitude of the options in order to
consider the impact of a valid comparison between the two alternatives. Amazon published on
their whitepaper to assist gather on the crucial data for the appropriate comparison
(Jula,Sundararajan & Othman, 2014). Other assessment which needs to be carried out are on
security and compliance assessment, technical assessment, determining on the tools that can be
reused as well as the tools that may be built, migrate the licensed products and create a plan so as
to assess on the success (Rittinghouse & Ransome, 2016).
Step 2 proof of the concept
One the organization has been able to identify on the right candidate to the cloud and anticipated
on the effort that are necessary to migrate, it is now time to test on the waters with little evidence
of the concept (Lu, Sun, Wu & Zhu, 2015). The purpose of this step would be learning AWS and
at the same time ensure that any assumptions in regards to the suitability to migrate to cloud are
much accurate (Tao, Cheng, Da Xu, Zhang & Li, 2014). In this field one could small Greenfield
application and in this process you could get started with the AWS cloud.
Step 3: Data migration phase
CLOUD COMPUTING 27
When the organizations are choosing on the right storage option, one size might not fit to all
(Zhan, Liu, Gong, Zhang, Chung & Li, 2015).. There might be numerous dimensions which
could be considered to ensure that the application could scale the needs of the organization more
appropriately with minimal effort (Zhan, Liu, Gong, Zhang, Chung & Li, 2015). The
organization needs to make the right tradeoff when it comes to the numerous dimensions such as
cost, durability, latency and the performance.
Step 4: Application to Migration
The organization can learn two primary application migration techniques they are Forklift
Migration and Hybrid Migration techniques (Zhan, Liu, Gong, Zhang, Chung & Li, 2015).. On
the first method it involves getting all the pieces of the system at once and moving it to the cloud
(Kalloniatis, Mouratidis, Vassilis, Islam, Gritzalis & Kavakli, 2014). On the latter strategy which is
hybrid it entails getting some of parts of application and then moving them to the cloud while at
the same time leaving some other part of the application intact.
Step 5: Leverage on the cloud
When the organization migrate their eMail application to the cloud, it is important to run all the
necessary tests, and at the same time they need to confirm that everything is working well.
Moreover, they are also required to take some time and resources to be able to figure out
regarding how they might leverage any additional benefits to the cloud.
Step 6: Optimization
Regional Gardens need to focus on how they could optimize on their cloud based application so
that they could increase on the cost savings (Li, Chen, Lee & Lou, 2015). Since they would be
When the organizations are choosing on the right storage option, one size might not fit to all
(Zhan, Liu, Gong, Zhang, Chung & Li, 2015).. There might be numerous dimensions which
could be considered to ensure that the application could scale the needs of the organization more
appropriately with minimal effort (Zhan, Liu, Gong, Zhang, Chung & Li, 2015). The
organization needs to make the right tradeoff when it comes to the numerous dimensions such as
cost, durability, latency and the performance.
Step 4: Application to Migration
The organization can learn two primary application migration techniques they are Forklift
Migration and Hybrid Migration techniques (Zhan, Liu, Gong, Zhang, Chung & Li, 2015).. On
the first method it involves getting all the pieces of the system at once and moving it to the cloud
(Kalloniatis, Mouratidis, Vassilis, Islam, Gritzalis & Kavakli, 2014). On the latter strategy which is
hybrid it entails getting some of parts of application and then moving them to the cloud while at
the same time leaving some other part of the application intact.
Step 5: Leverage on the cloud
When the organization migrate their eMail application to the cloud, it is important to run all the
necessary tests, and at the same time they need to confirm that everything is working well.
Moreover, they are also required to take some time and resources to be able to figure out
regarding how they might leverage any additional benefits to the cloud.
Step 6: Optimization
Regional Gardens need to focus on how they could optimize on their cloud based application so
that they could increase on the cost savings (Li, Chen, Lee & Lou, 2015). Since they would be
CLOUD COMPUTING 28
paying for the resources they are consuming, they need to strive and optimize the system as
much as possible. In most of the time they would be able to see values in relation to
optimizations. Small optimization could result to a lot of saving for the business.
6b. critical issues checked at each of the steps
There should be security grouping regulations to the AWS which should be in
comparison to the restrictions of the Windows.
There needs to be checking of the model of the PV driver
There is need to check whether the registry key for the Real Times Universal key that has
been recently set has been done.
There is implementation of the default setting to the gateway thinking of the use of
various NICSs.
Within the mini dump file there needs to be bug checking of the codes which is carried
out.
Conclusion
The cloud computing has been the major objective to the decision makers of Regional Garden’s.
Yet security awareness has been reluctant when it comes to the transferring their data as well as
other workloads to cloud. Currently, basic innovation which is behind the cloud administration,
there is another model to which the cloud computing has been picking up solid footing when it
comes to the business. This is thought to be the hybrid cloud. In relation to the hybrid cloud
strategy assortment has been has successful venture with regards to Regional Gardens that has
far more concentration over the aspect of privacy and certain demands currently. Irrespective of
extraordinary limited hazard to the hybrid cloud frame-work, to acquire accessibility from the
paying for the resources they are consuming, they need to strive and optimize the system as
much as possible. In most of the time they would be able to see values in relation to
optimizations. Small optimization could result to a lot of saving for the business.
6b. critical issues checked at each of the steps
There should be security grouping regulations to the AWS which should be in
comparison to the restrictions of the Windows.
There needs to be checking of the model of the PV driver
There is need to check whether the registry key for the Real Times Universal key that has
been recently set has been done.
There is implementation of the default setting to the gateway thinking of the use of
various NICSs.
Within the mini dump file there needs to be bug checking of the codes which is carried
out.
Conclusion
The cloud computing has been the major objective to the decision makers of Regional Garden’s.
Yet security awareness has been reluctant when it comes to the transferring their data as well as
other workloads to cloud. Currently, basic innovation which is behind the cloud administration,
there is another model to which the cloud computing has been picking up solid footing when it
comes to the business. This is thought to be the hybrid cloud. In relation to the hybrid cloud
strategy assortment has been has successful venture with regards to Regional Gardens that has
far more concentration over the aspect of privacy and certain demands currently. Irrespective of
extraordinary limited hazard to the hybrid cloud frame-work, to acquire accessibility from the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING 29
open cloud has the functionality to turn into uncertain. Furthermore, this has been the course to
which the formation might be collected. Hence, this really is valid to any specific open program
communication. The hybrid cloud thus allows connection to be able to use the abilities of the
open cloud stage suppliers without offloading the whole of their data to any specific provided
outsider server.
References
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things:
Integrating Internet of Things and cloud computing and the issues involved. In Applied
Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on
(pp. 414-419). IEEE.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
open cloud has the functionality to turn into uncertain. Furthermore, this has been the course to
which the formation might be collected. Hence, this really is valid to any specific open program
communication. The hybrid cloud thus allows connection to be able to use the abilities of the
open cloud stage suppliers without offloading the whole of their data to any specific provided
outsider server.
References
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things:
Integrating Internet of Things and cloud computing and the issues involved. In Applied
Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on
(pp. 414-419). IEEE.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
CLOUD COMPUTING 30
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M.
(2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Energy-efficient
data replication in cloud computing datacenters. Cluster computing, 18(1), 385-402.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Buyya, R., Vecchiola, C., & Selvi, S. T. (2013). Mastering cloud computing: foundations and
applications programming. Newnes.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless network:
Virtualized, reconfigurable, smart wireless network to enable 5G technologies. Mobile
Networks and Applications, 20(6), 704-712.
Choi, C., Choi, J., & Kim, P. (2014). Ontology-based access control model for security policy
reasoning in cloud computing. The Journal of Supercomputing, 67(3), 711-722.
Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-based
mobile cloud computing model for green computing. Journal of Network and Computer
Applications, 59, 46-54.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise
Information Management, 28(1), 107-130.
Grewal, R. K., & Pateriya, P. K. (2013). A rule-based approach for effective resource
provisioning in hybrid cloud environment. In New Paradigms in Internet Computing (pp.
41-57). Springer Berlin Heidelberg.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Hu, F., Hao, Q., & Bao, K. (2014). A survey on software-defined network and openflow: From
concept to implementation. IEEE Communications Surveys & Tutorials, 16(4), 2181-
2206.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M.
(2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Energy-efficient
data replication in cloud computing datacenters. Cluster computing, 18(1), 385-402.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Buyya, R., Vecchiola, C., & Selvi, S. T. (2013). Mastering cloud computing: foundations and
applications programming. Newnes.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless network:
Virtualized, reconfigurable, smart wireless network to enable 5G technologies. Mobile
Networks and Applications, 20(6), 704-712.
Choi, C., Choi, J., & Kim, P. (2014). Ontology-based access control model for security policy
reasoning in cloud computing. The Journal of Supercomputing, 67(3), 711-722.
Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-based
mobile cloud computing model for green computing. Journal of Network and Computer
Applications, 59, 46-54.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise
Information Management, 28(1), 107-130.
Grewal, R. K., & Pateriya, P. K. (2013). A rule-based approach for effective resource
provisioning in hybrid cloud environment. In New Paradigms in Internet Computing (pp.
41-57). Springer Berlin Heidelberg.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Hu, F., Hao, Q., & Bao, K. (2014). A survey on software-defined network and openflow: From
concept to implementation. IEEE Communications Surveys & Tutorials, 16(4), 2181-
2206.
CLOUD COMPUTING 31
Hwang, K., Dongarra, J., & Fox, G. C. (2013). Distributed and cloud computing: from parallel
processing to the internet of things. Morgan Kaufmann.
Jula, A., Sundararajan, E., & Othman, Z. (2014). Cloud computing service composition: A
systematic literature review. Expert Systems with Applications, 41(8), 3809-3824.
Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014).
Towards the design of secure and privacy-oriented information systems in the cloud:
Identifying the major concepts. Computer Standards & Interfaces, 36(4), 759-775.
Leymann, C. F. F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud computing
patterns. Springer, Wien. doi, 10, 978-3.
Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure
authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5),
1206-1216.
Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., & Du, R. Y. (2013). Applications integration in
a hybrid cloud computing environment: Modelling and platform. Enterprise Information
Systems, 7(3), 237-271.
Lu, P., Sun, Q., Wu, K., & Zhu, Z. (2015). Distributed online hybrid cloud management for
profit-driven multimedia cloud computing. IEEE Transactions on Multimedia, 17(8),
1297-1308.
Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J. M., & Vasilakos, A. V. (2015).
Cloud computing: Survey on energy efficiency. Acm computing surveys (csur), 47(2), 33.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41,
424-440.
Marinescu, D. C. (2017). Cloud computing: theory and practice. Morgan Kaufmann.
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), 497-510.
Pluzhnik, E., Nikulchev, E., & Payain, S. (2014, June). Optimal control of applications for
hybrid cloud services. In Services (SERVICES), 2014 IEEE World Congress on (pp. 458-
461). IEEE.
Pulier, E., Martinez, F., & Hill, D. C. (2015). U.S. Patent No. 8,931,038. Washington, DC: U.S.
Patent and Trademark Office.
Hwang, K., Dongarra, J., & Fox, G. C. (2013). Distributed and cloud computing: from parallel
processing to the internet of things. Morgan Kaufmann.
Jula, A., Sundararajan, E., & Othman, Z. (2014). Cloud computing service composition: A
systematic literature review. Expert Systems with Applications, 41(8), 3809-3824.
Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014).
Towards the design of secure and privacy-oriented information systems in the cloud:
Identifying the major concepts. Computer Standards & Interfaces, 36(4), 759-775.
Leymann, C. F. F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud computing
patterns. Springer, Wien. doi, 10, 978-3.
Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure
authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5),
1206-1216.
Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., & Du, R. Y. (2013). Applications integration in
a hybrid cloud computing environment: Modelling and platform. Enterprise Information
Systems, 7(3), 237-271.
Lu, P., Sun, Q., Wu, K., & Zhu, Z. (2015). Distributed online hybrid cloud management for
profit-driven multimedia cloud computing. IEEE Transactions on Multimedia, 17(8),
1297-1308.
Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J. M., & Vasilakos, A. V. (2015).
Cloud computing: Survey on energy efficiency. Acm computing surveys (csur), 47(2), 33.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41,
424-440.
Marinescu, D. C. (2017). Cloud computing: theory and practice. Morgan Kaufmann.
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), 497-510.
Pluzhnik, E., Nikulchev, E., & Payain, S. (2014, June). Optimal control of applications for
hybrid cloud services. In Services (SERVICES), 2014 IEEE World Congress on (pp. 458-
461). IEEE.
Pulier, E., Martinez, F., & Hill, D. C. (2015). U.S. Patent No. 8,931,038. Washington, DC: U.S.
Patent and Trademark Office.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING 32
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing features,
issues, and challenges: a big picture. In Computational Intelligence and Networks
(CINE), 2015 International Conference on (pp. 116-123). IEEE.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile
cloud computing: A survey, state of art and future directions. Mobile Networks and
Applications, 19(2), 133-143.
Ren, L., Zhang, L., Tao, F., Zhao, C., Chai, X., & Zhao, X. (2015). Cloud manufacturing: from
concept to practice. Enterprise Information Systems, 9(2), 186-209.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management,
and security. CRC press.
Sridhar, S. (2016). Cloud computing. computing.
Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), 177-184.
Taleb, T., Corici, M., Parada, C., Jamakovic, A., Ruffino, S., Karagiannis, G., & Magedanz, T.
(2015). EASE: EPC as a service to ease mobile core network deployment over
cloud. IEEE Network, 29(2), 78-88.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions on
Industrial Informatics, 10(2), 1435-1442.
Tebaa, M., & Hajji, S. E. (2014). Secure cloud computing through homomorphic
encryption. arXiv preprint arXiv:1409.0829.
Toosi, A. N., Calheiros, R. N., & Buyya, R. (2014). Interconnected cloud computing
environments: Challenges, taxonomy, and survey. ACM Computing Surveys
(CSUR), 47(1), 7.
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud
computing and software-defined networking. Computer Networks, 81, 308-319.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, 371-
386.
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined
networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing features,
issues, and challenges: a big picture. In Computational Intelligence and Networks
(CINE), 2015 International Conference on (pp. 116-123). IEEE.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile
cloud computing: A survey, state of art and future directions. Mobile Networks and
Applications, 19(2), 133-143.
Ren, L., Zhang, L., Tao, F., Zhao, C., Chai, X., & Zhao, X. (2015). Cloud manufacturing: from
concept to practice. Enterprise Information Systems, 9(2), 186-209.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management,
and security. CRC press.
Sridhar, S. (2016). Cloud computing. computing.
Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), 177-184.
Taleb, T., Corici, M., Parada, C., Jamakovic, A., Ruffino, S., Karagiannis, G., & Magedanz, T.
(2015). EASE: EPC as a service to ease mobile core network deployment over
cloud. IEEE Network, 29(2), 78-88.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions on
Industrial Informatics, 10(2), 1435-1442.
Tebaa, M., & Hajji, S. E. (2014). Secure cloud computing through homomorphic
encryption. arXiv preprint arXiv:1409.0829.
Toosi, A. N., Calheiros, R. N., & Buyya, R. (2014). Interconnected cloud computing
environments: Challenges, taxonomy, and survey. ACM Computing Surveys
(CSUR), 47(1), 7.
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud
computing and software-defined networking. Computer Networks, 81, 308-319.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, 371-
386.
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined
networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
CLOUD COMPUTING 33
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and
distributed denial of service (DDoS) attacks in cloud computing environments: A survey,
some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1),
602-622.
Zhang, H., Jiang, G., Yoshihira, K., & Chen, H. (2014). Proactive workload management in
hybrid cloud computing. IEEE Transactions on Network and Service
Management, 11(1), 90-100.
Zhan, Z. H., Liu, X. F., Gong, Y. J., Zhang, J., Chung, H. S. H., & Li, Y. (2015). Cloud
computing resource scheduling and a survey of its evolutionary approaches. ACM
Computing Surveys (CSUR), 47(4), 63.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and
distributed denial of service (DDoS) attacks in cloud computing environments: A survey,
some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1),
602-622.
Zhang, H., Jiang, G., Yoshihira, K., & Chen, H. (2014). Proactive workload management in
hybrid cloud computing. IEEE Transactions on Network and Service
Management, 11(1), 90-100.
Zhan, Z. H., Liu, X. F., Gong, Y. J., Zhang, J., Chung, H. S. H., & Li, Y. (2015). Cloud
computing resource scheduling and a survey of its evolutionary approaches. ACM
Computing Surveys (CSUR), 47(4), 63.
1 out of 33
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.