CLOUD COMPUTING2 Introduction Cloud computing continues to be practice wherein network to the remote servers tend to be hosted. This had been performed over the internet (Aazam, Khan, Alsaffar & Huh, 2014). It facilitates storing, managing and processing data (Aazam, Khan, Alsaffar & Huh, 2014). This is accomplished as opposed to precisely what is taken on the personal computers or maybe the servers .Regional Garden organization which runs different variety of affiliated gardening enterprises. It has large show for the garden which it opens for the public assessment several times over time (Aazam, Khan, Alsaffar & Huh, 2014). The company continues to be contemplating numerous plans of the strategy which are needed to be analyzed . The following is report which is prepared for the Regional Garden organization in which discusses numerous aspects for the cloud computing. 1.Describe which cloud architectures you would employ to assist Regional Gardens to meet the Board’s strategy? a)Describe each of architecture you would use, along with your reasons for deploying it. The cloud computing architecture is the structure of the system, which comprises on premise and cloud services, services, middleware as well as the software component along with the geo-location(Ali, Khan & Vasilakos, 2015). Cloud ArchitectureDescriptionReason to deploy on it Workload Distribution Architecture On this architecture has been decreasing over usage to the information technology Cloud utilization monitors have been included in this case. This is carried out
CLOUD COMPUTING3 resources. The under usage has been also considered. The organization has been relying on the ability of runtime logics as well as load balancing on the algorithms to some degree (Ali, Khan & Vasilakos, 2015). through runtime workload tracking(Ali, Khan & Vasilakos, 2015).. Moreover, it is also useful when it comes to processing of data. Dynamic scalability Architecture The model lies on the logics when it comes to the predefined systems of the scaling. These triggers on the allocation of the information technology resources dynamically(Zhan, Liu, Gong, Zhang, Chung & Li, 2015). This could be carried out from the resources pool. The monitors to the cloud usage have capability to track the usage of the runtime. This has been in relation to the dynamic fluctuation due to the nature of the architecture. Resource pooling architecturelies on the ground to use resource pools. There is grouping of the resources in information technology(Zhan, Liu, Gong, Zhang, Chung & Many cloud usage monitors they are usually incorporated during the tracking as well as synchronization of the aspects which are needed by the
CLOUD COMPUTING4 Li, 2015). Moreover, it ensures there is synchronization in an automatic manner. information technology resources which are pooled (Almorsy, Grundy & Müller, 2016). There is also consideration to other management systems. Elastic Resource Capability Architecture This has been related to the provisioning to the virtual servers especially in the dynamics aspects(Almorsy, Grundy & Müller, 2016). It has been using allocating as well as reclaiming of RAM along with CPUs. Cloud usage monitors have been gathering data which are utilized in the resources in relation to IT previously and lastly after carrying out scaling. Hybrid cloud architecture The hybrid cloud is the cloud computing setting wherein utilizes a mix on premises, private cloud and third party, public cloud services with an orchestration that is between the a few platforms (Armbrust, Fox, Griffith, Joseph, Katz, Konwinski & Zaharia, 2010). By way of enabling the workloads to move between the private and public clouds as the computing necessitates and costs modify, the hybrid provides the business a larger flexibility and more data when it comes to the deployment options(Zhan, Liu, Gong, Zhang, Chung & Li, 2015).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING5 When developing a hybrid cloud it involves the accessibility to public infrastructure as a service (IaaS) system for example Amazon Web Services, Google Cloud platform as well as Microsoft Azure (Armbrust, Fox, Griffith, Joseph, Katz, Konwinski & Zaharia, 2010). The construction of the private cloud is though private cloud, likely on the premises or even through hosted private provider. There should be sufficient Wide area Network connectivity that is between these environments. Figure 1:The diagrams show different cloud architectures It is also important to note that an enterprise has no direct control when it comes to the architecture of the public cloud, therefore, when it comes to the hybrid loud deployment, it should architect the private cloud in order to achieve the facet of compatibility with the preferred public cloud (Boru, Kliazovich, Granelli, Bouvry & Zomaya, 2015). This could involve the implementation of a hardware that is suitable within the data center, which include servers, storage, local area network and load balancers. The organization need to then
CLOUD COMPUTING6 deploy the virtualization layer, or perhaps a hypervisor, to manage to generate and support on the virtual machines (Boru, Kliazovich, Granelli, Bouvry & Zomaya, 2015). The IT team must then deploy the private cloud software layer for instance, OpenStack, on top of the hypervisor to manage to deliver the capabilities of the cloud for instance, self service, automation and orchestration , billing and chargeback and reliability along resilience (Boru, Kliazovich, Granelli, Bouvry & Zomaya, 2015). With regards to the private cloud architect it could generate a menu of the majority of the local services for example, compute instances or even the database situations, from which the users could choose. The fundamental key to creating a successful hybrid cloud is deciding on a hypervisor and cloud software layers which are more compatible to the desired public cloud, which assures there surely is a suitable interoperability with the public cloud application programming interfaces as well as services (Ren, Zhang, Tao, Zhao, Chai & Zhao, 2015). When it comes to the implementation of the compatible software as well as services they enable instances of migrating between the private and the public clouds(Zhan, Liu, Gong, Zhang, Chung & Li, 2015). Moreover, a developer could create advanced applications through use of the mix of services as well as resources between both the public and the private platforms (Buyya, Vecchiola & Selvi, 2013). When it comes to the hybrid cloud approach it should also have a management tools such as Egenera PAN Cloud Director, Cisco Cloud Center which would assist the business when it comes to handling the workflow that is created (Buyya, Vecchiola & Selvi, 2013). There are other tasks such as service catalogs, billings along with the other tasks which are related to the hybrid cloud (Buyya, Vecchiola & Selvi, 2013). It is important to note that given the sheer volume of the potential tools which are readily available, it is
CLOUD COMPUTING7 crucial to the potential adapters to test as well as evaluate the candidates well in their own hybrid cloud environment before they could make commitment to any given tool. b)Benefits and issues that would result from deployment of these architecture Benefits Scale One of the benefits is that of flexibility (Buyya, Vecchiola & Selvi, 2013). Most of the organization might choose to adopt the cloud architecture since they can increase the flexibility of the business (Buyya, Vecchiola & Selvi, 2013). It could allow the workers to be more flexible in or out of their workplace. The workers could gain access to the data so long as they might have internet connection through any kind of the devices. Speed The virtual resources they might use on the requirements of the business objectives with ease. There have been fast expansions with regards to the speeds of bandwidth based on the needs (Buyya, Vecchiola & Selvi, 2013). Integration It assists with regards to delivering of easy accessibility to the traditional SQL databases. Moreover, it might provide further analytical opportunities regarding the limitless needs of the business (Buyya, Vecchiola & Selvi, 2013). Cost reduction The main reason as to why the organization could adopt on the cloud architecture n their enterprise is the fact that it assists in the cost reduction (Buyya, Vecchiola & Selvi , 2013). The
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING8 organization is enamored by the chance for the cost reduction as the cloud providers (Buyya, Vecchiola & Selvi, 2013). This implies the organization could merely pay for the services which they will use after they get access to the cloud services. Automatic software/ Hardware Upgrades When information technology solution continues to be implemented in the organization, this creates an issue which is unable to have an appropriate financing because of the high cost which is associated to the purchasing and maintaining the hardware as well as software (Buyya, Vecchiola & Selvi, 2013). This could offer a negative effect (Buyya, Vecchiola & Selvi, 2013). These issues could be addressed when adopting the cloud computing architecture approach. The business could shift on their capital expenses to the operating expenses(Avram, 2014). This might not reduce on the cost, but it would assist to develop a better relationship , stay in the technological improvements and improve on the profit and standardized and low cost services (Buyya, Vecchiola & Selvi, 2013). Agility Currently, in such a highly competitive business such as that of the Regional Gardens, it is important to stay competitive(Avram, 2014). This is one way in which makes the business to be different from the others and the time which is used to respond on the customers changing needs (Avram, 2014). The use of this architecture could attain this in a more effective manner. Issues of deployment of these architectures Regional Gardens adopting these architectures could have issues when it comes to deployment. These issues are as follows;
CLOUD COMPUTING9 Stealing of data The number of the users and organization would be linked to the internet is increasing. This might also enhance on the probability of probing and attacking utilizing the viruses, worms as well as cyber terrorists (Avram, 2014). There have been incidents which previously occurred to service providers for example Google Inc .where there server got hacked. Malware injection attack A hacker might try to damage on the application on the cloud. In most of the cases the hacker might find vulnerabilities on the web application making changes to it hence change on the normal execution ( Avram, 2014). The hacker might program a risky application and use the virtual machine to be able to inject the malware into the cloud services. The hackers might do what they want for instance the data theft or even eavesdropping. The aspects of the SQL injection could change on the query structure of the system. The hacker could use improper validation of the data in order to take advantage (Botta, De Donato, Persico & Pescapé, 2016). The main target is usually SQL servers or the databases. Moreover, the hackers could inject the malicious code particularly the web server when it comes to bypassing the login stage and the gain access to the databases (Buyya, Vecchiola & Selvi, 2013). They would then try to modify on the databases, retrieve business data and even take control to the entire web server. DoS (Denial of Service) The Denial of Service attack has become one of the most concern issues when it comes to the cloud architecture and a trouble when it comes to the services availability (Buyya, Vecchiola & Selvi, 2013). This attack has grown and has more effect recently than in the past. There are various type of this attack such as SYN flood attack, PING of death attack and Smurf attack
CLOUD COMPUTING10 (Zhan, Liu, Gong, Zhang, Chung & Li, 2015). This attack makes the services on the cloud inaccessible, at the same time intolerable and this could degrade on the quality of the services and the connectivity (Buyya, Vecchiola & Selvi, 2013). Licensing issues If the license offered supplied to the organization is violated, it could lead to the disruption of the services or the financial penalties(Zhan, Liu, Gong, Zhang, Chung & Li, 2015). In case there is an attack to the cloud architecture penalties are going to be high as the software licensing agreements are not conscious of ‘cloud aware’. 2.Describe the risks that you see associated with this new Hybrid Cloud and Miscro- services strategy. RiskDetailsPossible Control IT architecture designA hybrid cloud can be highly complex information technology architecture which could involve varying combinations of the public clouds, private clouds as well as on-premises of IT. It takes sosphicated information technology employees to architect as well as run an end to end infrastructure which needs to support the continuation data It is important for the managers to determine on whether they are going to hire it, contract for such as well as offer internal information technology with the training.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING11 transfers which is between all these kind of platforms and at the same time to ensure continuous governance no matter the flow of the data. Many of the information technology departments usually do not have the requisite expertise in their house. Collaboration of cloud procurement with end business users The worst manner in entering into the hybrid cloud strategy is doing it haphazardly. This kind of situation develops when the end users departments and the IT independently contracts for the cloud services. Before one could know it they have a hodgepodge of the public cloud, private cloud as well as on premises information technology and no one is accountable to the overall coordination and the performances of these kind of investments. The practice usually There should be accountability to the overall coordination and the performance of the investment. An individual or organization could be in charge to oversee on this aspect.
CLOUD COMPUTING12 invites risk and the inefficiencies. The security and privacy of the data Security and privacy are nowadays improving in the cloud, but this does not change on the facts the corporate information technology has direct governance, security as well as privacy control over the data which the organization would keep on their own data center and they do not have this direct control to the cloud. Organization has the responsibilities to their clients to ensure that they keep the data safe and secure (Hwang, Dongarra & Fox, 2013). They need to weigh on the responsibilities against the advantages to store data in the cloud where security of the data and safeguarding control are much reduced. To address on this risk it is important that the vendors could understand the organization data privacy as well as security needs. Moreover, they also need to make sure that the cloud provider are aware of the particular data security as well as privacy rules and the regulations which could apply to the entity such as HIPAA, payment Card Industry Data Security Standards or the privacy consideration. Disaster recovery andWhen organization are movingOrganization to identify
CLOUD COMPUTING13 failoverdata and application to the cloud they need to ask to see as to whether the disaster recovery plans and failover commitments of cloud providers. They need to find how many data centers a cloud provider utilizes whether there is a complete failover which is between the data centers secure (Hwang, Dongarra & Fox, 2013). To the equal significance is whether the cloud providers could own data centers or its leasing data centers capability from the other third parties which the organization do not have to contract with secure (Hwang, Dongarra & Fox, 2013). Therefore, the risk assessment in this area could become business, continuation and legal liability issue. how many data centers cloud providers could use and if there is a failover. On-premise licenses and theIf an organization is shifting fromStaying with one vendor to
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING14 contract managementon-premises to the cloud, optimal coordination usually take place if they could make the transition when their on-premises software licenses expires(Pluzhnik, Nikulchev & Payain, 2014). Migration to the cloud is not an issue if they stay with the same vendor, but becomes are issue if they are shifting to another vendor. It is important to review thoroughly contracts for the pricing and other conditions as well as stipulations secure (Hwang, Dongarra & Fox, 2013). Many of the organization could end up disappointed when they begin to receive extra charges to the bills to numerous services they thought they could be included in their flat monthly fees subscriptions to the cloud (Wei, Zhu, Cao, Dong, Jia, Chen & prevent issues related to migration.
CLOUD COMPUTING15 Vasilakos, 2014). Environmental securityConcentration to the computing resources as well as users in the cloud computing environment does represents concentration to the security threats. Due to size and significance, cloud environment are more targeted by the virtual machines and the bot malware, and brute force attacks. To address on this risk it is important to ask the cloud provider in relation to the access control, vulnerability assessment practices and the patch and configuration management controls to ensure there is adequate protecting of the data(Sultan, 2014). Vendor liability and risk management Some time a vendor might not have control over circumstances which leads to the problem associated to vendor liability for disaster and downtime secure (Hwang, Dongarra & Fox, 2013). This could happen if the cloud vendor does not have their own data centers and they contract for it with the third parties. This issue generally originates in one To address on this risk, it is important to review the cloud vendor before they could sign on any agreement secure (Hwang, Dongarra & Fox, 2013). It is also important to contact the legal counsel if there is any issue which is related to the legal liability.
CLOUD COMPUTING16 of data centers. Additionally, the situation could worsen if there was security breach into the cloud vendor which could happen in the cloud Risk in relation to cloud security Great deal has been recent when it comes to cloud and it has clear intrinsic dangers. The cloud market security usually measures have been taking place each day. This has been the reason as to why the security of the organization has been a major concern (Chen, Zhang, Hu, Taleb & Sheng, (2015). There has been some principle security challenges in regards to the associations which could convey on the hybrid cloud approach. The organization need to incorporate security administration, risk management as well as inadequate developed administration level of some agreement. This issue usually accompany on the security challenge (Chen, Zhang, Hu, Taleb & Sheng, (2015). Regional Gardens should guarantee every section of the strategy in relation to the cloud has been consistent to regulations to any industries(Wang, Zheng, Lou & Hou, 2015). It is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING17 crucial to guarantee on the data which is going among the private and the open cloud situation. 3. Describe general information security steps and control to be recommended to Board to secure Hybrid cloud. Determine on the model for the cloud deployment for data This step is usually critical since it helps to define data at first (Chen, Zhang, Hu, Taleb & Sheng, (2015). The deployment alternatives are on premises, public, hosted private cloud or even the composition to all. Integrating to the current enterprises systems In this step managed interfaces are implemented. Through guide to this the cloud services components have the ability to intrude to the on premise programs(Chang, Kuo & Ramachandran, 2016). This could be carried out by technologies such as API management. There is requirement for the business and management elements in integration which need to be considered. Moreover, it also comprises of the functional integrating programs (Chen, Zhang, Hu, Taleb & Sheng, (2015). The demand to the cloud services usually deliver back up on the interfaces for the cloud services. Address on the requirement for connectivity
CLOUD COMPUTING18 There are needs to each link to the component to the considered. This aspect has been the spanning to numerous cloud services secure (Hwang, Dongarra & Fox, 2013). The organization assures connectivity for the requirement. The network for the virtualization utilizing is considered in case if it is available(Sridhar, 2016). The capability of the connectivity usually support on the resilience as well as requirement to the disaster recovery which is ensured (Chen, Zhang, Hu, Taleb & Sheng, (2015). Identify and prioritize confidential data. The majority of the organization would not realize how to begin to start safeguarding private data. By categorizing on the type of data by value and confidentiality, they will be able to prioritize the kind of data to secure first (Chen, Zhang, Hu, Taleb & Sheng, 2015). The significant to choose this step is that the client data systems or the workers record system is the simplest place to begin because few specific systems might own the capability to update this type of data (Gai, Qiu , Zhao , Tao & Zong , 2016) . Securing of the structured data are finite areas which have to be protected. Securing on the unstructured data for example contracts, financial releases as well as the customer correspondence is an important step which could roll out based on departmental basis. Perform a cloud vendor audit It is important for the organization to do their home well to ensure they can comprehend various options which are much available for the cloud deployment as well as determine on the best fit to the needs of the organization(Gai, Qiu, Zhao, Tao & Zong, 2016). One can understand on this task with knowledgeable internal team or work with industry consultant for guidance. It is important to remember that the cloud vendors market their ease of the onboarding over their security aspect
CLOUD COMPUTING19 secure (Hwang, Dongarra & Fox, 2013). It is important to make organization identity more than one suitable vendor as a means of contingency when it comes to preferred vendor which has not been approved to the organization. Understand the procurement policies The organization needs to talk to the procurement departments in order to get handle on whether they could rely to the single vendor or needs to follow the dual deployment policy(Grewal & Pateriya, 2013). Many businesses require more than one vendor for the redundancy as well as failover capabilities. The reason to take such step is to ensure when the organization obtain more than one vendor they could reduced the aspect of failover. Complete internal security audit The organization need to undertake an internal audit to unearth the security policies they have established for both the on-premise as well as the cloud servers(Grewal & Pateriya, 2013). It is important to note on all the discrepancies and at the same time asses technological obstacles. The reason to undertake this step is to ensure that the organization is not doing any overlapping namespaces which includes the ID ranges for the user accounts(Grewal & Pateriya, 2013). Access to the type of data that is stored It is important for the organization to meet those who are in charge to each of the vital line to the business in order to pin point on the kind of the data which has been saved to the cloud and how it could be moved to the on-premises environment(Gangwar, Date & Ramaswamy, 2015). The significance of this step is to ensure that the security aspects are evaluated especially to the areas
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING20 the organization deems they have sensitive data for instance credit card data, personal workers details, health records and the business plans(Grewal & Pateriya, 2013). Preparation for the regulatory audits It is important to think via the audit process as they apply to the business. it is important to talk to the administrative workers in order to find out how much effort it is to them in order to support on these disruptive activities which may arise(Gangwar, Date & Ramaswamy, 2015). This step is crucial since it will help determine on the tools which are currently are used, and where there are gaps which might reside(Gangwar, Date & Ramaswamy, 2015). The steps enable one to understand on each of the regulations to the business needs and demonstrate the aspects of compliance with GDPR, DSS as well as SOX. Standardize security policies which include user access Whether they will have hybrid on-premise environment, it is crucial they ensure they make sure they have solution which could work seamlessly across both technology stacks (Hu, Hao & Bao, 2014). When relying on the cloud vendor default security setting it can be biggest mistake, since they might be strong enough to meet on the needs or they might not be compatible with the on- premise equipment(Marinescu, 2017).This step is crucial since it identifies which technology solutions the organization would implement as well as identity and access management; they would put in place to address requirements of the security. Mapping out timeline of project and potential for the disruption Once the organization develops on the game plane and the associated dates, they determine on the likelihood of each day processes which could be disrupted particularly during the update
CLOUD COMPUTING21 period(Gangwar, Date & Ramaswamy, 2015). Some areas in the business might not be able to tolerate on the downtime. The significance of this step would be to establish on the contingency plans which could lay out the actions for the team which they would undertake in case of an event issues if it was to arise. 4. Discuss briefly what you would recommend should be included in Regional Gardens BCP as result to their adoption of Hybrid Cloud and Microservices approach. Issue of application resilience One of the biggest barriers as to prevent Regional Green enterprise from embracing on the cloud for resilience would be lack of the knowledge or the experience with various technologies in order to attain cloud resilience across the dispersed environments(Mell & Grance, 2011). The organization might not know which application as well as data which could have great affinity to the cloud resilience as well as reluctant in implementing on the new processes which could require additional information technology, business as well as recovery education. Moreover, they might have undertaken on the in depth evaluation to their existing disaster recovery strategy, architecture as well as procedures(Mell & Grance, 2011). With such limited ideas to the impact of the cloud based recovery they could have on their business, this organization could be wary when it comes to the approach which they are unfamiliar to them(Zhang, Jiang, Yoshihira & Chen, 2014). Additionally, they might not pose the capability to automate dissimilar hardware restorations. In case the brand and the types of the servers the organization have is totally different in terms of physical or the virtual, definitely there would be disparities when it comes to recovery the efficiency (Chen, Zhang, Hu, Taleb & Sheng, 2015). Such kind of issues could entail a specialized handling when they are adopting the cloud based resilience.
CLOUD COMPUTING22 On this issue of resilience the organization might have various applications which might not bear functioning in the cloud or virtualized environment as a result of the legacy hardware or the vendor they might not help them (Chen, Zhang, Hu, Taleb & Sheng, 2015). Organization with this challenge they have traditionally taken on the monolithic approach when it comes to the data recovery, protecting to all the system with the same approach (Choi, Choi & Kim, 2014). As more models emerge, more and more organization they are beginning to segment on their recovery techniques either through platform or the system critically. They need to implement a blend of both private and public cloud services to help meet on the business demands to agility and risk tolerance to the sensitive applications as well as data (Leymann,Retter, Schupeck & Arbitter, 2014). Whether the organization chooses to focus on to the internal pain points such as; technology constraints, preferences in business, cost or the internal pressure such as the regulatory demands, they need to select type of the cloud resilience solution or the combination to the types (Choi, Choi & Kim, 2014). Charting on the path to successful transform to cloud based business resilience and continuity they would require planned approach which is more cohesive and it could encompass on everything from the planed as well as design in order to implement and evaluate. Backup and disaster recovery in Hybrid cloud environment Complete disaster recovery solution has traditionally been complex as well as expensive when it comes to deployment(Choi, Choi & Kim, 2014). The organization has two locations, the primary data centers and separate location which could support on the operation should the main site fail(Toosi, Calheiros & Buyya, 2014). Maintaining on this kind of environment is cost prohibitive, hence that whey the secondary site are deployed by the large organization that has
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING23 funding and they are well staffed in the IT department (Choi, Choi & Kim, 2014). The organization requires resources which are in form of the server hardware, storage devices as well as manpower to run in these two locations (Chen, Zhang, Hu, Taleb & Sheng, 2015). If the organization has big workload they would demand more. Hybrid cloud would allow various options especially to leverage the public cloud as more of the destination for the backup(Yan, Yu, Gong & Li, 2016). It is possible to start on the use of the cloud for more targets where data is dumped in case it is needed. Recommendation Hybrid cloud condition was cloud run for the organization because of several causes. The least with that are the business resilience, disaster recuperation and reinforcement (Hashem, Yaqoob, Anuar, Mokhtar, Gani & Khan, 2015). Essential reason is the fact it offers adaptability to be able to span on the local and remote storage. The cloud assists to have different alternatives (Chen, Zhang, Hu, Taleb & Sheng, 2015). This usually occurs on the off chance in which there is leveraging more and more of the backing up. Using the cloud begun with something which is beyond objective to where the data is dumped in the required events. This could set for the phases to utilize on the cloud to restart or reestablish, continue or reconstitute and make on the premises to recover the disasters(Manvi & Shyam, 2014).Hybrid cloud environment is home run due to the adjustment to the present resources. The present infrastructure work might be secured(Yan & Yu, 2015).In most perfect scenario it could occur especially in creation of the dynamic, where a flexible condition has been intended. 5. Management of the hybrid cloud Analysis for the requirements
CLOUD COMPUTING24 Remote server Administration tools This provides required as the Window 8 employs the server manager, and the Microsoft Management Console which is Snap-ins. Others are Windows Powershell cmdlets and suppliers (Chen, Zhang, Hu, Taleb & Sheng, 2015). It also consists of the command line tools which are used to control on the characteristics as well as the responsibilities for running on the Windows server for the version of 2012 (Chen, Zhang, Hu, Taleb & Sheng, 2015). When it comes to the cases which are restricted, such instruments might be used to oversee on the parts and the components which run on the Windows server version for 2008 R2 or even the Windows server 2008 (Chen, Zhang, Hu, Taleb & Sheng, 2015). Some of the requirements are performed in order to control on the same when using Windows Server 2003. Requirements for the server management When it comes to the On Command for the cloud manager it could be used when it comes to the delivering of the core point for the point management to each end point for the fabric data. This is performed at the cloud(Pulier, Martinez & Hill, 2015). Moreover, it assists replication of the data especially around the multi-cloud as well as the hybrid storages. Additionally, it could manage expenses for the cloud storages. SLA management The movement to the cloud based approach might have various ramifications. Some could have imperative changes especially to the standards of SLA(Puthal, Sahoo, Mishra & Swain, 2015). In the past, when undertaking information technology groups they have controls which are finished over the assets and they could feature their SLA based on the capabilities of domains which are closed and on-premises(Taleb, Corici, Parada, Jamakovic, Ruffino, Karagiannis &
CLOUD COMPUTING25 Magedanz, 2015). The presentation to the open cloud could separate on the conventional boundaries to the data center. Moreover, when it comes to the hybrid cloud, to maintain on- premises and various off-premises assets, stages, SLAs should cover all the ability to numerous information technology atmospheres. 6a. Migration plan Describe steps that would be included to migrate eMail to AWS cloud With AWS, there is provision in regards to computing of power, storage as well as other resources which enable the business to gain entry to the suite of elastic information technology infrastructure services as business could demand it (Chen, Zhang, Hu, Taleb & Sheng, 2015). With minimal cost and effort, it is possible to move services such as eMail to the AWS cloud and reduce on the capital expenses, reduce the support as well as administrative costs and retain on the performance, security along with the reliability requirement to the business needs (Chen, Zhang, Hu, Taleb & Sheng, 2015). RegionalGardens organization taking this incremental approach to cloud migration would help them on the issue of scalability, data integrity as well as pricing in order to run the current SharePoint workloads they are encountering. The following is the step by stead guide to migrate to AWS(Mastelic, Oleksiak, Claussen, Brandic, Pierson & Vasilakos, 2015).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING26 Figure 2: To show step by step guide to AWS migration. Step 1 cloud assessment In this step it entails the financial assessment(Oliveira, Thomas & Espadanal, 2014).. It entails the organization to weigh on the financial considerations to own and operate the data center or even co-locates on the facilities vs. employing on the cloud based infrastructure which requires a much detailed and a careful analysis(Li, Wang, Li, Wang & Du, 2013). Sometimes it might not be easy to measure on the potential hardware expenses along with the utility pricing to compute and store on the resources. This organization need to take multitude of the options in order to consider the impact of a valid comparison between the two alternatives. Amazon published on their whitepaper to assist gather on the crucial data for the appropriate comparison (Jula,Sundararajan & Othman, 2014). Other assessment which needs to be carried out are on security and compliance assessment, technical assessment, determining on the tools that can be reused as well as the tools that may be built, migrate the licensed products and create a plan so as to assess on the success (Rittinghouse & Ransome, 2016). Step 2 proof of the concept One the organization has been able to identify on the right candidate to the cloud and anticipated on the effort that are necessary to migrate, it is now time to test on the waters with little evidence of the concept (Lu, Sun, Wu & Zhu, 2015). The purpose of this step would be learning AWS and at the same time ensure that any assumptions in regards to the suitability to migrate to cloud are much accurate(Tao, Cheng, Da Xu, Zhang & Li, 2014). In this field one could small Greenfield application and in this process you could get started with the AWS cloud. Step 3: Data migration phase
CLOUD COMPUTING27 When the organizations are choosing on the right storage option, one size might not fit to all (Zhan, Liu, Gong, Zhang, Chung & Li, 2015).. There might be numerous dimensions which could be considered to ensure that the application could scale the needs of the organization more appropriately with minimal effort(Zhan, Liu, Gong, Zhang, Chung & Li, 2015). The organization needs to make the right tradeoff when it comes to the numerous dimensions such as cost, durability, latency and the performance. Step 4: Application to Migration The organization can learn two primary application migration techniques they are Forklift Migration and Hybrid Migration techniques(Zhan, Liu, Gong, Zhang, Chung & Li, 2015).. On the first method it involves getting all the pieces of the system at once and moving it to the cloud (Kalloniatis, Mouratidis, Vassilis, Islam, Gritzalis &Kavakli, 2014). On the latter strategy which is hybrid it entails getting some of parts of application and then moving them to the cloud while at the same time leaving some other part of the application intact. Step 5: Leverage on the cloud When the organization migrate their eMail application to the cloud, it is important to run all the necessary tests, and at the same time they need to confirm that everything is working well. Moreover, they are also required to take some time and resources to be able to figure out regarding how they might leverage any additional benefits to the cloud. Step 6: Optimization Regional Gardens need to focus on how they could optimize on their cloud based application so that they could increase on the cost savings(Li,Chen, Lee & Lou, 2015). Since they would be
CLOUD COMPUTING28 paying for the resources they are consuming, they need to strive and optimize the system as much as possible. In most of the time they would be able to see values in relation to optimizations. Small optimization could result to a lot of saving for the business. 6b. critical issues checked at each of the steps There should be security grouping regulations to the AWS which should be in comparison to the restrictions of the Windows. There needs to be checking of the model of the PV driver There is need to check whether the registry key for the Real Times Universal key that has been recently set has been done. There is implementation of the default setting to the gateway thinking of the use of various NICSs. Within the mini dump file there needs to be bug checking of the codes which is carried out. Conclusion The cloud computing has been the major objective to the decision makers of Regional Garden’s. Yet security awareness has been reluctant when it comes to the transferring their data as well as other workloads to cloud. Currently, basic innovation which is behind the cloud administration, there is another model to which the cloud computing has been picking up solid footing when it comes to the business. This is thought to be the hybrid cloud. In relation to the hybrid cloud strategy assortment has been has successful venture with regards to Regional Gardens that has far more concentration over the aspect of privacy and certain demands currently. Irrespective of extraordinary limited hazard to the hybrid cloud frame-work, to acquire accessibility from the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING29 open cloud has the functionality to turn into uncertain. Furthermore, this has been the course to which the formation might be collected. Hence, this really is valid to any specific open program communication. The hybrid cloud thus allows connection to be able to use the abilities of the open cloud stage suppliers without offloading the whole of their data to any specific provided outsider server. References Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. InApplied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on (pp. 414-419). IEEE. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges.Information sciences,305, 357-383. Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107.
CLOUD COMPUTING30 Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing.Communications of the ACM,53(4), 50-58. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Energy-efficient data replication in cloud computing datacenters.Cluster computing,18(1), 385-402. Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey.Future GenerationComputerSystems,56, 684-700. Buyya, R., Vecchiola, C., & Selvi, S. T. (2013).Mastering cloud computing: foundations and applications programming. Newnes. Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds.Future Generation Computer Systems,57, 24-41. Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies.Mobile Networks and Applications,20(6), 704-712. Choi, C., Choi, J., & Kim, P. (2014). Ontology-based access control model for security policy reasoning in cloud computing.The Journal of Supercomputing,67(3), 711-722. Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.Journal of Network and Computer Applications,59, 46-54. Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud computing adoption using an integrated TAM-TOE model.Journal of Enterprise Information Management,28(1), 107-130. Grewal, R. K., & Pateriya, P. K. (2013). A rule-based approach for effective resource provisioning in hybrid cloud environment. InNew Paradigms in Internet Computing(pp. 41-57). Springer Berlin Heidelberg. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hu, F., Hao, Q., & Bao, K. (2014). A survey on software-defined network and openflow: From concept to implementation.IEEE Communications Surveys & Tutorials,16(4), 2181- 2206.
CLOUD COMPUTING31 Hwang, K., Dongarra, J., & Fox, G. C. (2013).Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann. Jula, A., Sundararajan, E., & Othman, Z. (2014). Cloud computing service composition: A systematic literature review.Expert Systems with Applications,41(8), 3809-3824. Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.Computer Standards & Interfaces,36(4), 759-775. Leymann, C. F. F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud computing patterns.Springer, Wien. doi,10, 978-3. Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication.IEEE Transactions on Parallel and Distributed Systems,26(5), 1206-1216. Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., & Du, R. Y. (2013). Applications integration in a hybrid cloud computing environment: Modelling and platform.Enterprise Information Systems,7(3), 237-271. Lu, P., Sun, Q., Wu, K., & Zhu, Z. (2015). Distributed online hybrid cloud management for profit-driven multimedia cloud computing.IEEE Transactions on Multimedia,17(8), 1297-1308. Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J. M., & Vasilakos, A. V. (2015). Cloud computing: Survey on energy efficiency.Acm computing surveys (csur),47(2), 33. Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey.Journal of Network and Computer Applications,41, 424-440. Marinescu, D. C. (2017).Cloud computing: theory and practice. Morgan Kaufmann. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors.Information & Management,51(5), 497-510. Pluzhnik, E., Nikulchev, E., & Payain, S. (2014, June). Optimal control of applications for hybrid cloud services. InServices (SERVICES), 2014 IEEE World Congress on(pp. 458- 461). IEEE. Pulier, E., Martinez, F., & Hill, D. C. (2015).U.S. Patent No. 8,931,038. Washington, DC: U.S. Patent and Trademark Office.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING32 Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. InComputational Intelligence and Networks (CINE), 2015 International Conference on(pp. 116-123). IEEE. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications,19(2), 133-143. Ren, L., Zhang, L., Tao, F., Zhao, C., Chai, X., & Zhao, X. (2015). Cloud manufacturing: from concept to practice.Enterprise Information Systems,9(2), 186-209. Rittinghouse, J. W., & Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sridhar, S. (2016). Cloud computing.computing. Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges.International Journal of Information Management,34(2), 177-184. Taleb, T., Corici, M., Parada, C., Jamakovic, A., Ruffino, S., Karagiannis, G., & Magedanz, T. (2015). EASE: EPC as a service to ease mobile core network deployment over cloud.IEEE Network,29(2), 78-88. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Tebaa, M., & Hajji, S. E. (2014). Secure cloud computing through homomorphic encryption.arXiv preprint arXiv:1409.0829. Toosi, A. N., Calheiros, R. N., & Buyya, R. (2014). Interconnected cloud computing environments: Challenges, taxonomy, and survey.ACM Computing Surveys (CSUR),47(1), 7. Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking.Computer Networks,81, 308-319. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371- 386. Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking with cloud computing.IEEE Communications Magazine,53(4), 52-59.
CLOUD COMPUTING33 Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges.IEEE Communications Surveys & Tutorials,18(1), 602-622. Zhang, H., Jiang, G., Yoshihira, K., & Chen, H. (2014). Proactive workload management in hybrid cloud computing.IEEE Transactions on Network and Service Management,11(1),90-100. Zhan, Z. H., Liu, X. F., Gong, Y. J., Zhang, J., Chung, H. S. H., & Li, Y. (2015). Cloud computing resource scheduling and a survey of its evolutionary approaches.ACM Computing Surveys (CSUR),47(4), 63.