Cloud Computing model Implementation in Video Dev Assignment 2022
VerifiedAdded on 2022/10/11
|35
|2314
|20
Presentation
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Cloud Computing model
Implementation in VideoDev
Implementation in VideoDev
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction
An Australian video making and production development firm
known as VideoDev is currently thinking of shifting their
current physical datacentre into cloud based server as
because they are facing problems within their existing
system due to heavy workload.
An Australian video making and production development firm
known as VideoDev is currently thinking of shifting their
current physical datacentre into cloud based server as
because they are facing problems within their existing
system due to heavy workload.
What is a cloud
A cloud can be referred to as a online service to store
files and other valuable applications which is stored in a
remote location. It provides service through either private
or public network that is through LAN, WAN OR VPN.
A cloud can be referred to as a online service to store
files and other valuable applications which is stored in a
remote location. It provides service through either private
or public network that is through LAN, WAN OR VPN.
What is Cloud Computing
Cloud computing describes to the act of storing and sharing of
huge amount of data which was physically stored physically into
cloud based system for the ease of their clients. With the help of
cloud computing (Esposito et al., 2016), the clients can access the
database from any where in the world and for as long as they want
without any materials or maintenance.
Cloud computing describes to the act of storing and sharing of
huge amount of data which was physically stored physically into
cloud based system for the ease of their clients. With the help of
cloud computing (Esposito et al., 2016), the clients can access the
database from any where in the world and for as long as they want
without any materials or maintenance.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Types of Cloud Computing
Based on the use of the cloud servers, cloud computing can be
generally divided into 4 different parts –
Based on the use of the cloud servers, cloud computing can be
generally divided into 4 different parts –
Types of Cloud Computing Contd.
On the basis of cloud location the types of clouds are –
Public Cloud
Private Cloud
Hybrid Cloud
Community Cloud
On the basis of cloud location the types of clouds are –
Public Cloud
Private Cloud
Hybrid Cloud
Community Cloud
Types of Cloud Computing Contd.
The Hybrid cloud model: Combination of both public and private
clouds.
The Hybrid cloud model: Combination of both public and private
clouds.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Several aspects of Cloud
ComputingVideoDev needs to understand the aspects and services
provided by cloud based platform in order to choose the
most appropriate one for them (Rittinghouse & Ransome,
2017). The services are –
IaaS
PaaS
SaaS
DaaS
ComputingVideoDev needs to understand the aspects and services
provided by cloud based platform in order to choose the
most appropriate one for them (Rittinghouse & Ransome,
2017). The services are –
IaaS
PaaS
SaaS
DaaS
Several aspects of Cloud
Computing Contd.
Computing Contd.
Several aspects of Cloud Computing Contd.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Pros and cons of Cloud Computing
Why VideoDev needs to upgrade to
cloud based systems
Efficiency in video production and processing will increase up
to great extent.
Data can be accessed from anywhere without significant
software and hardware installation.
cloud based systems
Efficiency in video production and processing will increase up
to great extent.
Data can be accessed from anywhere without significant
software and hardware installation.
Advantages of cloud computing
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Difference between IaaS and PaaS
IaaS – Infrastructure as a Service provides data storage, operations,
networking and hardware to the users with the help of internet. Thus
the users are not depended on a particular location or source. It is
generally related with the hardware of the systems and maintenance
and control also.
Example – Microsoft Azure
PaaS – Platform as a Service provides complete support for the
designing, testing, maintenance and deployment of the clients
applications. The most significant advantage is that PaaS provide
both software support and hardware infrastructure to its clients.
Example – Amazon Workspace
IaaS – Infrastructure as a Service provides data storage, operations,
networking and hardware to the users with the help of internet. Thus
the users are not depended on a particular location or source. It is
generally related with the hardware of the systems and maintenance
and control also.
Example – Microsoft Azure
PaaS – Platform as a Service provides complete support for the
designing, testing, maintenance and deployment of the clients
applications. The most significant advantage is that PaaS provide
both software support and hardware infrastructure to its clients.
Example – Amazon Workspace
Difference between IaaS and PaaS
Contd.
Contd.
Service Model for VideoDev
VideoDev makes videos which needs both the uses of software and
hardware and almost 100 odd employees are currently working in
the firm and in order to resolve their issue the company needs to
upgrade to PaaS model.
VideoDev makes videos which needs both the uses of software and
hardware and almost 100 odd employees are currently working in
the firm and in order to resolve their issue the company needs to
upgrade to PaaS model.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Platform as a Service (PaaS)
Both software and hardware support is provided by the PaaS to any
client with the help of a third party organization (Ghazizadeh et al.,
2014).
The employees working in the organization can access the data from
anywhere in the world and do not require to install any hardware or
software while accessing it which reduces the maintenance cost of
the cloud servers.
Both software and hardware support is provided by the PaaS to any
client with the help of a third party organization (Ghazizadeh et al.,
2014).
The employees working in the organization can access the data from
anywhere in the world and do not require to install any hardware or
software while accessing it which reduces the maintenance cost of
the cloud servers.
Pros and Cons of PaaS
The employees of VideoDev can access their data from anywhere in
the world by using PaaS and hence the cost factor will also be
reduced by a huge margin and due to this the organization can
invest in other aspects.
However when applying PaaS into an organization, the issue of data
security may arise.
The employees of VideoDev can access their data from anywhere in
the world by using PaaS and hence the cost factor will also be
reduced by a huge margin and due to this the organization can
invest in other aspects.
However when applying PaaS into an organization, the issue of data
security may arise.
Architectural pattern
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Backlog removal in VideoDev
Removal of backlog is possible by the application of
online cloud based system.
Data processing speed will increase resulting in less
backlog.
Thus the backlog problem will be removed if the
organization upgrades to a cloud based platform.
Removal of backlog is possible by the application of
online cloud based system.
Data processing speed will increase resulting in less
backlog.
Thus the backlog problem will be removed if the
organization upgrades to a cloud based platform.
What is Standard Desktop
Operating Environment (SDOE)
A standard desktop operating environment (SDOE) is a
standard operating system of a computer used by
organizations to reduce cost and increase efficiency.
Operating Environment (SDOE)
A standard desktop operating environment (SDOE) is a
standard operating system of a computer used by
organizations to reduce cost and increase efficiency.
Advantage of SDOE
The development and up gradation of software and
hardware in the system are easy.
Costs are significantly low.
Installation and maintenance time is minimal.
The development and up gradation of software and
hardware in the system are easy.
Costs are significantly low.
Installation and maintenance time is minimal.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Disadvantages of SDOE
Network administrator must be hired.
The users manually adjust it without the knowledge of
right or wrong credentials.
The employees should need to upgrade to a new system
which they are not accustomed with.
Network administrator must be hired.
The users manually adjust it without the knowledge of
right or wrong credentials.
The employees should need to upgrade to a new system
which they are not accustomed with.
Amazon Workspace for VideoDev
Amazon workspace is one of the most popular cloud based
platforms which cab ne used by VideoDev. Amazon AWS and
Gateways can be accessed by server less cloud functions
which will provide great speed for data processing. The
database provided by Amazon is completely configurable and
provided and maintained by them.
Amazon workspace is one of the most popular cloud based
platforms which cab ne used by VideoDev. Amazon AWS and
Gateways can be accessed by server less cloud functions
which will provide great speed for data processing. The
database provided by Amazon is completely configurable and
provided and maintained by them.
Amazon Workspace for VideoDev
Contd.The Amazon Workspace can be implemented in the company VideoDev
and the advantages and disadvantages of the adaptation process can
be stated as below –
Contd.The Amazon Workspace can be implemented in the company VideoDev
and the advantages and disadvantages of the adaptation process can
be stated as below –
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Windows Virtual Desktop for VideoDev
Windows virtual desktop is basically a desktop and app
virtualization service based on the cloud based servers. Any
personalized database or server can be upgraded into the
Microsoft azure system which will help in virtualization of both
the desktop and applications.
Windows virtual desktop is basically a desktop and app
virtualization service based on the cloud based servers. Any
personalized database or server can be upgraded into the
Microsoft azure system which will help in virtualization of both
the desktop and applications.
Windows Virtual Desktop for VideoDev
Contd.
The Windows Virtual Desktop will have some significant amount of
advantages and disadvantages for VideoDev which are stated below –
Contd.
The Windows Virtual Desktop will have some significant amount of
advantages and disadvantages for VideoDev which are stated below –
SDOE delivered to employee laptops
The SDOE should be delivered into the laptops or systems of
the employees one by one and the employees should be
advised about the working environment and features of the
SDOE that will be adopted by the company whether it be
Windows Virtual desktop or Amazon Workspace (Ali, Khan &
Vasilakos, 2015).
A Standard Operating Environment (SOE) refers to given laptop
systems and its associated software applications and hardware
applications, used by an organization to efficiently and cost-
effectively which is customized configurations as required.
The SDOE should be delivered into the laptops or systems of
the employees one by one and the employees should be
advised about the working environment and features of the
SDOE that will be adopted by the company whether it be
Windows Virtual desktop or Amazon Workspace (Ali, Khan &
Vasilakos, 2015).
A Standard Operating Environment (SOE) refers to given laptop
systems and its associated software applications and hardware
applications, used by an organization to efficiently and cost-
effectively which is customized configurations as required.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Conclusion
The company VideoDev wants to up grade its current
system into a cloud based system and this includes
providing a standard desktop operating environment for the
employees and along with it automation in office systems
like email, word processing, spreadsheet capabilities, as
well as storage of online data. The Board of VideoDev wants
the SDOE to be accessible to its employees from office,
home or anywhere. The board of VideoDev must choose
wisely the cloud based system for their company in order to
enhance their video production.
The company VideoDev wants to up grade its current
system into a cloud based system and this includes
providing a standard desktop operating environment for the
employees and along with it automation in office systems
like email, word processing, spreadsheet capabilities, as
well as storage of online data. The Board of VideoDev wants
the SDOE to be accessible to its employees from office,
home or anywhere. The board of VideoDev must choose
wisely the cloud based system for their company in order to
enhance their video production.
Recommendation
The main objective of the Board of the company is to
choose a cloud based system for their company which will
help in enhancing the structure and performance of their
company. The main problem with their existing system is
that the datacenters are overloaded with heavy tasks and
this results in the deadline miss. The company thus should
adopt to Microsoft azure cloud based system to enhance
their performance as because it provides both software and
hardware support to the clients.
The main objective of the Board of the company is to
choose a cloud based system for their company which will
help in enhancing the structure and performance of their
company. The main problem with their existing system is
that the datacenters are overloaded with heavy tasks and
this results in the deadline miss. The company thus should
adopt to Microsoft azure cloud based system to enhance
their performance as because it provides both software and
hardware support to the clients.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing:
Opportunities and challenges. Information sciences, 305, 357-383.
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early
stages of SDLC. Future Generation Computer Systems, 74, 385-392.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Bacon, J., Eyers, D., Pasquier, T. F. M., Singh, J., Papagiannis, I., & Pietzuch, P. (2014).
Information flow control for secure cloud computing. IEEE Transactions on Network and
Service Management, 11(1), 76-89.
Baron, H., Heide, S., Mahmud, S., & Yeoh, J. (2019). Cloud Security Complexity:
Challenges in Managing Security in Hybrid and Multi-Cloud Environments.
Berger, S., Goldman, K., Pendarakis, D., Safford, D., Valdez, E., & Zohar, M. (2015,
March). Scalable attestation: A step toward secure and trusted clouds. In 2015 IEEE
International Conference on Cloud Engineering (pp. 185-194). IEEE.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing:
Opportunities and challenges. Information sciences, 305, 357-383.
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early
stages of SDLC. Future Generation Computer Systems, 74, 385-392.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Bacon, J., Eyers, D., Pasquier, T. F. M., Singh, J., Papagiannis, I., & Pietzuch, P. (2014).
Information flow control for secure cloud computing. IEEE Transactions on Network and
Service Management, 11(1), 76-89.
Baron, H., Heide, S., Mahmud, S., & Yeoh, J. (2019). Cloud Security Complexity:
Challenges in Managing Security in Hybrid and Multi-Cloud Environments.
Berger, S., Goldman, K., Pendarakis, D., Safford, D., Valdez, E., & Zohar, M. (2015,
March). Scalable attestation: A step toward secure and trusted clouds. In 2015 IEEE
International Conference on Cloud Engineering (pp. 185-194). IEEE.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Choi, C., Choi, J., & Kim, P. (2014). Ontology-based access control model for security
policy reasoning in cloud computing. The Journal of Supercomputing, 67(3), 711-722.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud
computing: architecture, applications, and approaches. Wireless communications and
mobile computing, 13(18), 1587-1611.
Esposito, C., Castiglione, A., Martini, B., & Choo, K. K. R. (2016). Cloud manufacturing:
security, privacy, and legal concerns. IEEE Cloud Computing, 3(4), 16-22.
Fehling, C., Leymann, F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud
computing patterns: fundamentals to design, build, and manage cloud applications.
Springer Science & Business Media.
Fuzi, M. F. M., Hamid, R. S., & Ahmad, M. A. (2014, August). Virtual desktop
environment on Cloud computing platform. In 2014 IEEE 5th Control and System
Graduate Research Colloquium (pp. 80-84). IEEE.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud
computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Ghazizadeh, E., Zamani, M., Ab Manan, J. L., & Alizadeh, M. (2014). Trusted computing
strengthens cloud authentication. The Scientific World Journal, 2014.
Hendre, A., & Joshi, K. P. (2015, June). A semantic approach to cloud security and
compliance. In 2015 IEEE 8th International Conference on Cloud Computing (pp.
1081-1084). IEEE.
policy reasoning in cloud computing. The Journal of Supercomputing, 67(3), 711-722.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud
computing: architecture, applications, and approaches. Wireless communications and
mobile computing, 13(18), 1587-1611.
Esposito, C., Castiglione, A., Martini, B., & Choo, K. K. R. (2016). Cloud manufacturing:
security, privacy, and legal concerns. IEEE Cloud Computing, 3(4), 16-22.
Fehling, C., Leymann, F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud
computing patterns: fundamentals to design, build, and manage cloud applications.
Springer Science & Business Media.
Fuzi, M. F. M., Hamid, R. S., & Ahmad, M. A. (2014, August). Virtual desktop
environment on Cloud computing platform. In 2014 IEEE 5th Control and System
Graduate Research Colloquium (pp. 80-84). IEEE.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud
computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Ghazizadeh, E., Zamani, M., Ab Manan, J. L., & Alizadeh, M. (2014). Trusted computing
strengthens cloud authentication. The Scientific World Journal, 2014.
Hendre, A., & Joshi, K. P. (2015, June). A semantic approach to cloud security and
compliance. In 2015 IEEE 8th International Conference on Cloud Computing (pp.
1081-1084). IEEE.
Islam, T., Manivannan, D., & Zeadally, S. (2016). Classification and
characterization of security threats in cloud computing. Int. J. Next-
Gener. Comput, 7(1).
Kavis, M. J. (2014). Architecting the Cloud: design decisions for cloud
computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons.
Khalil, I., Khreishah, A., & Azeem, M. (2014). Cloud computing security:
A survey. Computers, 3(1), 1-35.
Krishna, B. H., Kiran, S., Murali, G., & Reddy, R. P. K. (2016). Security
issues in the service model
Rasheed, H. (2014). Data and infrastructure security auditing in cloud
computing environments. International Journal of Information
Management, 34(3), 364-368.
Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing:
implementation, management, and security. CRC press.
Rubóczki, E. S., & Rajnai, Z. (2015). Moving towards cloud security.
Interdisciplinary Description of Complex Systems: INDECS, 13(1), 9-14.
characterization of security threats in cloud computing. Int. J. Next-
Gener. Comput, 7(1).
Kavis, M. J. (2014). Architecting the Cloud: design decisions for cloud
computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons.
Khalil, I., Khreishah, A., & Azeem, M. (2014). Cloud computing security:
A survey. Computers, 3(1), 1-35.
Krishna, B. H., Kiran, S., Murali, G., & Reddy, R. P. K. (2016). Security
issues in the service model
Rasheed, H. (2014). Data and infrastructure security auditing in cloud
computing environments. International Journal of Information
Management, 34(3), 364-368.
Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing:
implementation, management, and security. CRC press.
Rubóczki, E. S., & Rajnai, Z. (2015). Moving towards cloud security.
Interdisciplinary Description of Complex Systems: INDECS, 13(1), 9-14.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing:
opportunities and challenges. IEEE potentials, 33(1), 34-36.
Sari, A. (2015). A review of anomaly detection systems in cloud
networks and survey of cloud security measures in cloud storage
applications. Journal of Information Security, 6(02), 142.
Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud
computing security: Issues, threats, and solutions. Journal of Network
and Computer Applications, 75, 200-222.
Soofi, A. A., Khan, M. I., Talib, R., & Sarwar, U. (2014). Security issues
in the SaaS delivery model of cloud computing. International journal
of computer science and mobile computing, 3(3), 15-21.
Tari, Z. (2014). Security and Privacy in Cloud Computing. IEEE Cloud
Computing, 1(1), 54-57.
Toosi, A. N., Calheiros, R. N., & Buyya, R. (2014). Interconnected cloud
computing environments: Challenges, taxonomy, and survey. ACM
Computing Surveys (CSUR), 47(1), 7.
opportunities and challenges. IEEE potentials, 33(1), 34-36.
Sari, A. (2015). A review of anomaly detection systems in cloud
networks and survey of cloud security measures in cloud storage
applications. Journal of Information Security, 6(02), 142.
Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud
computing security: Issues, threats, and solutions. Journal of Network
and Computer Applications, 75, 200-222.
Soofi, A. A., Khan, M. I., Talib, R., & Sarwar, U. (2014). Security issues
in the SaaS delivery model of cloud computing. International journal
of computer science and mobile computing, 3(3), 15-21.
Tari, Z. (2014). Security and Privacy in Cloud Computing. IEEE Cloud
Computing, 1(1), 54-57.
Toosi, A. N., Calheiros, R. N., & Buyya, R. (2014). Interconnected cloud
computing environments: Challenges, taxonomy, and survey. ACM
Computing Surveys (CSUR), 47(1), 7.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Thank You
1 out of 35
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.