Cloud Computing: History, Problem, Solution, and Deployment Models
VerifiedAdded on 2023/01/12
|24
|5323
|93
AI Summary
This report provides an in-depth analysis of cloud computing, including its history, problem, solution, and deployment models. It explores the benefits and appropriateness of cloud computing for organizations like Fastfix. The report also discusses the different service and deployment models, such as private, public, community, and hybrid clouds.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Cloud Computing
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Introduction.................................................................................................................................................3
Background of cloud and its evolution....................................................................................................3
Problem and solution...............................................................................................................................4
Appropriateness of solution.....................................................................................................................5
Architectural design.................................................................................................................................5
Deployment Model..................................................................................................................................7
Service Model..........................................................................................................................................8
Data Migration........................................................................................................................................9
Configuration of cloud with CSP framework........................................................................................10
Implementation of cloud platform using open source tool.....................................................................12
Probable solution to problems...............................................................................................................14
Security issues.......................................................................................................................................15
Ways to overcome issues.......................................................................................................................15
Conclusion.................................................................................................................................................16
References.................................................................................................................................................17
Introduction.................................................................................................................................................3
Background of cloud and its evolution....................................................................................................3
Problem and solution...............................................................................................................................4
Appropriateness of solution.....................................................................................................................5
Architectural design.................................................................................................................................5
Deployment Model..................................................................................................................................7
Service Model..........................................................................................................................................8
Data Migration........................................................................................................................................9
Configuration of cloud with CSP framework........................................................................................10
Implementation of cloud platform using open source tool.....................................................................12
Probable solution to problems...............................................................................................................14
Security issues.......................................................................................................................................15
Ways to overcome issues.......................................................................................................................15
Conclusion.................................................................................................................................................16
References.................................................................................................................................................17
Introduction
According to Microsoft, Cloud computing implies delivery of computing services which
includes database, networking, servers, intelligence, analytics and software over internet for
offering flexible resources, economies of scale and faster innovation (What is cloud computing?,
2020). Basically, it implies furnishing of on-demand computing services which varies from app
to storage along with processing power via internet as well as pay as you go basis. To understand
the concept of cloud computing Fastfix is taken into consideration which provides Matika tools
at minimum prices. They are from Bristol who are official distributors from 1990 and renders
online tools. This report comprises of history of cloud, description of problem, solution and its
relevance. Furthermore, it also includes service and deployment models along with data
migration. Along with this, some cloud computing solutions are also implemented that are
provided by cloud service providers and as open source tool. Certain issues along with their
solutions will also be discussed.
Background of cloud and its evolution
The type of computing which is dependent on shared computing resources instead of
personal devices or local servers for handling applications is referred to as cloud computing. The
rationale behind cloud computing is that in 1950s mainframe computing was utilized; they were
huge as well as expensive. For this reason, time sharing schedule were implemented that enabled
users to have access central mainframe systems via connected stations. It provided a shared
computational power and from here cloud computing started (Kumar and Kumar, 2013). In
1960’s, enhancement came in this when American computer scientist conceptualized the concept
of interconnected system of computers. In 1969, ARPANET (Advanced Research Projects
Agency Network) which permitted sharing of digital sources that are not present at physical
location. Virtual machine operating system was released by IBM in s1972 and in this way the
process of sharing data via online medium evolved by making use of internet.
According to Microsoft, Cloud computing implies delivery of computing services which
includes database, networking, servers, intelligence, analytics and software over internet for
offering flexible resources, economies of scale and faster innovation (What is cloud computing?,
2020). Basically, it implies furnishing of on-demand computing services which varies from app
to storage along with processing power via internet as well as pay as you go basis. To understand
the concept of cloud computing Fastfix is taken into consideration which provides Matika tools
at minimum prices. They are from Bristol who are official distributors from 1990 and renders
online tools. This report comprises of history of cloud, description of problem, solution and its
relevance. Furthermore, it also includes service and deployment models along with data
migration. Along with this, some cloud computing solutions are also implemented that are
provided by cloud service providers and as open source tool. Certain issues along with their
solutions will also be discussed.
Background of cloud and its evolution
The type of computing which is dependent on shared computing resources instead of
personal devices or local servers for handling applications is referred to as cloud computing. The
rationale behind cloud computing is that in 1950s mainframe computing was utilized; they were
huge as well as expensive. For this reason, time sharing schedule were implemented that enabled
users to have access central mainframe systems via connected stations. It provided a shared
computational power and from here cloud computing started (Kumar and Kumar, 2013). In
1960’s, enhancement came in this when American computer scientist conceptualized the concept
of interconnected system of computers. In 1969, ARPANET (Advanced Research Projects
Agency Network) which permitted sharing of digital sources that are not present at physical
location. Virtual machine operating system was released by IBM in s1972 and in this way the
process of sharing data via online medium evolved by making use of internet.
Illustration 1: The History of the Cloud
AWS (Amazon Web Services) was brought within market in early 2000’s then in 2006
Amazon released EC2 (Elastic Compute Cloud) which allowed individuals as well as firms to
rent virtual systems by which firm like Fastfix can make use of their applications as well as
programs. From then there has been a explosive growth within cloud computing and it is being
widely used. Large firms like Adobe, Oracle, Microsoft, etc. are providing different options to
other organizations. There has to be a service level agreement (SLA) which takes place among
vendor and user. Along with this, service provider will be answerable to users if as per the
agreement services are not delivered to them.
Problem and solution
Fastfix provides their customers Matika tools which are supplied with UK Makita warranty
and they will also give UK VAT invoice when products are bought by them. This clearly
illustrates that firm provides authorized services but their customers and even employees goes
through certain problems. There is no instant response, lack of quick access and ineffectiveness
in business processes (Lee, 2012). These problems can be handled by cloud computing. The
reason behind this can be understood by taking some examples in this context, Google Assistant,
Alexa and Siri are cloud dependent bots which leverage computing capabilities to furnish
personalized customer experiences. Time which is needed for accessing services was more as
there was no centralized database that will enable to have delays within their project. This leads
AWS (Amazon Web Services) was brought within market in early 2000’s then in 2006
Amazon released EC2 (Elastic Compute Cloud) which allowed individuals as well as firms to
rent virtual systems by which firm like Fastfix can make use of their applications as well as
programs. From then there has been a explosive growth within cloud computing and it is being
widely used. Large firms like Adobe, Oracle, Microsoft, etc. are providing different options to
other organizations. There has to be a service level agreement (SLA) which takes place among
vendor and user. Along with this, service provider will be answerable to users if as per the
agreement services are not delivered to them.
Problem and solution
Fastfix provides their customers Matika tools which are supplied with UK Makita warranty
and they will also give UK VAT invoice when products are bought by them. This clearly
illustrates that firm provides authorized services but their customers and even employees goes
through certain problems. There is no instant response, lack of quick access and ineffectiveness
in business processes (Lee, 2012). These problems can be handled by cloud computing. The
reason behind this can be understood by taking some examples in this context, Google Assistant,
Alexa and Siri are cloud dependent bots which leverage computing capabilities to furnish
personalized customer experiences. Time which is needed for accessing services was more as
there was no centralized database that will enable to have delays within their project. This leads
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
to create a negative impact on organization as well as their productivity. This implies that instant
response and quick access to data will be attained by individuals depending upon whether they
are clients or employees. Chatbots have expanded computing power as well as capacity of cloud
as through this preferences about users are stored. That aids within furnishing quick response as
well as access.
There is ineffectiveness in the way services are being carried out by Fastfix as adequate
response is not provided to their customers (Modi and et. al, 2013). This denotes that there is a
need for relevant business processes that involves ERP (Enterprise Resource Planning) and CRM
(Customer Relationship Management). Marketo, Hubspot, Salesforce are instances of cloud
service providers. This method is efficient as well as cost effective for Fastfix as it will enable
them to manage their operations without any kind of hassle and security of critical business
resources. Along with this, it will enable firm within formulation of plans accordingly, monitor
overall activities carried out. This implies that cloud computing is an appropriate solution for an
organization.
Appropriateness of solution
As per the above discussion, it has been identified that cloud computing is an adequate
solution as it will allow firm to have amplified functionalities. It is a model that enables
ubiquitous, on-demand and convenient network access for computing resources, The
appropriateness of cloud computing can be understood by taking into account certain fact that it
will enable Fastfix to have resource pooling as this furnish services to various customers (Nabi,
Jamwal and Padmanbh, 2020). This will allow all stakeholders to have access to virtual
resources. Furthermore, the downtime will be low and updates are also compatible as well as
bugs can be fixed faster.
Architectural design
The technological model comprises of architecture on the basis of which entire model
carries their functions that will illustrate hierarchical view for describing technology. This will
illustrate the dependencies on which firm will work on (Neware and et. al, 2020). With respect to
Fastfix, the architectural design is illustrated below:
response and quick access to data will be attained by individuals depending upon whether they
are clients or employees. Chatbots have expanded computing power as well as capacity of cloud
as through this preferences about users are stored. That aids within furnishing quick response as
well as access.
There is ineffectiveness in the way services are being carried out by Fastfix as adequate
response is not provided to their customers (Modi and et. al, 2013). This denotes that there is a
need for relevant business processes that involves ERP (Enterprise Resource Planning) and CRM
(Customer Relationship Management). Marketo, Hubspot, Salesforce are instances of cloud
service providers. This method is efficient as well as cost effective for Fastfix as it will enable
them to manage their operations without any kind of hassle and security of critical business
resources. Along with this, it will enable firm within formulation of plans accordingly, monitor
overall activities carried out. This implies that cloud computing is an appropriate solution for an
organization.
Appropriateness of solution
As per the above discussion, it has been identified that cloud computing is an adequate
solution as it will allow firm to have amplified functionalities. It is a model that enables
ubiquitous, on-demand and convenient network access for computing resources, The
appropriateness of cloud computing can be understood by taking into account certain fact that it
will enable Fastfix to have resource pooling as this furnish services to various customers (Nabi,
Jamwal and Padmanbh, 2020). This will allow all stakeholders to have access to virtual
resources. Furthermore, the downtime will be low and updates are also compatible as well as
bugs can be fixed faster.
Architectural design
The technological model comprises of architecture on the basis of which entire model
carries their functions that will illustrate hierarchical view for describing technology. This will
illustrate the dependencies on which firm will work on (Neware and et. al, 2020). With respect to
Fastfix, the architectural design is illustrated below:
Illustration 2: Cloud Architecture for Fastfix
The requirements of the employees will be present with Administrative management of
Fastfix and then it will be given to employees for examining them (Parekh and Sridaran, 2013).
After this is being done, their requirements are being furnished after they clear payment
gateways.
Illustration 3: Front and Back-End Framework
The requirements of the employees will be present with Administrative management of
Fastfix and then it will be given to employees for examining them (Parekh and Sridaran, 2013).
After this is being done, their requirements are being furnished after they clear payment
gateways.
Illustration 3: Front and Back-End Framework
The front-end and back-end framework is illustrated above. It shows that the services
provided by Fastfix can be accessed by their customers by making use of any device either it is
iOS based or Android.
Deployment Model
In cloud computing, deployment models are classified on the basis of their location. They
are illustrated below:
Illustration 4: Cloud Deployment Model
Private Cloud: It implies infrastructure which is being utilized by stand-alone organization
that furnishes enhanced control in context of security. This provides features like high storage,
customizable network components, privacy and reliability (Rabai and et. al, 2013). But this is
not an apt option for Fastfix as it will be expensive.
Usability: Big firms like Apple, Microsoft, Amazon and many others opt for this ind of
cloud as it furnishes high security and can be accessed easily.
Characteristics: Private Cloud furnishes high scalability, accessibility, elasticity, sharing
(capacity can be pooled and workloads within organization can be multiplexed) and
metered consumption of resources.
provided by Fastfix can be accessed by their customers by making use of any device either it is
iOS based or Android.
Deployment Model
In cloud computing, deployment models are classified on the basis of their location. They
are illustrated below:
Illustration 4: Cloud Deployment Model
Private Cloud: It implies infrastructure which is being utilized by stand-alone organization
that furnishes enhanced control in context of security. This provides features like high storage,
customizable network components, privacy and reliability (Rabai and et. al, 2013). But this is
not an apt option for Fastfix as it will be expensive.
Usability: Big firms like Apple, Microsoft, Amazon and many others opt for this ind of
cloud as it furnishes high security and can be accessed easily.
Characteristics: Private Cloud furnishes high scalability, accessibility, elasticity, sharing
(capacity can be pooled and workloads within organization can be multiplexed) and
metered consumption of resources.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Illustration 5 Private Cloud
Advantages: It provides more possibilities for customizing cloud environment along with
high security as well as privacy of resources (as they are not shared with others).
Furthermore, greater control and enhanced reliability will be provided over servers.
Disadvantages: By usage of private cloud it will be more difficult to access data from
remote locations along with this it requires high investments within the infrastructure.
There will be operating expenses as firm will be liable for maintenance cost.
Public Cloud: This is offered for open public use on a network in which customers do not
possess control over physical location of infrastructure where users will pay per use. This will be
an apt option for Fastfix as firm need to pay on the basis of its usage and it provides features like
easy access for data, flexibility, scalability, 24/7 runtime, cost effectiveness and many others.
Usability: This is being used by individuals who need to have access to information or software
for having some results but security is not the major concern.
Advantages: It provides more possibilities for customizing cloud environment along with
high security as well as privacy of resources (as they are not shared with others).
Furthermore, greater control and enhanced reliability will be provided over servers.
Disadvantages: By usage of private cloud it will be more difficult to access data from
remote locations along with this it requires high investments within the infrastructure.
There will be operating expenses as firm will be liable for maintenance cost.
Public Cloud: This is offered for open public use on a network in which customers do not
possess control over physical location of infrastructure where users will pay per use. This will be
an apt option for Fastfix as firm need to pay on the basis of its usage and it provides features like
easy access for data, flexibility, scalability, 24/7 runtime, cost effectiveness and many others.
Usability: This is being used by individuals who need to have access to information or software
for having some results but security is not the major concern.
Characteristics: Public cloud provides users with metered pricing which impies that they
have to pay for services on the basis of how much they have used along with this it also
furnishes self-service management.
Illustration 6 Public Cloud
Advantages: Public cloud minimizes time involved within development, testing as well as
launching of new products. Furthermore, it provides cost effectiveness as there is no need
to make investments within infrastructure and payments have to be made with respect to
what is being used.
Disadvantages: Through the usage of public cloud there is high security risks as there are
vulnerabilities due to shared resources, network performance issues and lack of
customization.
Community Cloud: This is a shared firms that belongs to peculiar community like banks,
government organizations or commercial businesses (Rachana and Guruprasad, 2014). The
benefits provided by this are that it is cheap, easy to collaborate and share data. It won’t be an
have to pay for services on the basis of how much they have used along with this it also
furnishes self-service management.
Illustration 6 Public Cloud
Advantages: Public cloud minimizes time involved within development, testing as well as
launching of new products. Furthermore, it provides cost effectiveness as there is no need
to make investments within infrastructure and payments have to be made with respect to
what is being used.
Disadvantages: Through the usage of public cloud there is high security risks as there are
vulnerabilities due to shared resources, network performance issues and lack of
customization.
Community Cloud: This is a shared firms that belongs to peculiar community like banks,
government organizations or commercial businesses (Rachana and Guruprasad, 2014). The
benefits provided by this are that it is cheap, easy to collaborate and share data. It won’t be an
appropriate option for Fastfix due to some problems related with security, privacy and
performance.
Usability: It can be used by any organsiation but mostly small firms opt for this due to
minimized expenses as compared to other clouds. Furthermore, the resources can be
easily shared.
Characteristics: It furnishes firm with flexibility and scalability, availability of services
& reliability along with security and compliance. Community cloud furnishes improvised
services as per requirements of users.
Illustration 7: Community Cloud
Advantages: It provides cost effectiveness as cost is shared among community members
along with this it is easy to share as well as collaborate with others.
Disadvantages: There can be security issues as data is stored at one location which means
that it may be accessed by others who have opted for community cloud. Along with this,
there will be a restricted remote access.
Hybrid Cloud: It incorporates public and private cloud but each entity remains individual. It
provides scalability, improvised security, flexibility, privacy, etc (Sharma and Trivedi, 2014).
performance.
Usability: It can be used by any organsiation but mostly small firms opt for this due to
minimized expenses as compared to other clouds. Furthermore, the resources can be
easily shared.
Characteristics: It furnishes firm with flexibility and scalability, availability of services
& reliability along with security and compliance. Community cloud furnishes improvised
services as per requirements of users.
Illustration 7: Community Cloud
Advantages: It provides cost effectiveness as cost is shared among community members
along with this it is easy to share as well as collaborate with others.
Disadvantages: There can be security issues as data is stored at one location which means
that it may be accessed by others who have opted for community cloud. Along with this,
there will be a restricted remote access.
Hybrid Cloud: It incorporates public and private cloud but each entity remains individual. It
provides scalability, improvised security, flexibility, privacy, etc (Sharma and Trivedi, 2014).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
With reference to Fastfix, it will not be appropriate as it is SME and they do not need to split
their information into mission-critical and non-sensitive context.
Usability: The firms who have high operations and needs to have enhanced processing
power, they opt for hybrid cloud. This furnishes high scalability and agility which makes
it apt for these firms.
Characteristics: High agility is furnished as it comprises of integration of different clouds
and will furnish organizations with competitive edge. Along with this, it renders
unlimited scalability.
Illustration 8: Hybrid Cloud
Advantages: Hybrid cloud furnishes high flexibility as well as control as resources will
be allocated with respect to peculiar area, provides cost effectiveness and amplified
organizational agility.
Disadvantages: They need more maintenance which means that it can be costly for firm
along with this initial cost is also high and data as well as application integration is
challenging while implementing it.
their information into mission-critical and non-sensitive context.
Usability: The firms who have high operations and needs to have enhanced processing
power, they opt for hybrid cloud. This furnishes high scalability and agility which makes
it apt for these firms.
Characteristics: High agility is furnished as it comprises of integration of different clouds
and will furnish organizations with competitive edge. Along with this, it renders
unlimited scalability.
Illustration 8: Hybrid Cloud
Advantages: Hybrid cloud furnishes high flexibility as well as control as resources will
be allocated with respect to peculiar area, provides cost effectiveness and amplified
organizational agility.
Disadvantages: They need more maintenance which means that it can be costly for firm
along with this initial cost is also high and data as well as application integration is
challenging while implementing it.
Service Model
Cloud computing provides various services which can be explicated with respect to roles
played by them. They are as:
Infrastructure as a service: It implies outsourcing of physical infrastructure from third party
providers. In this, IT resources are with external servers which can be accessed by users through
usage of internet connection. IaaS enables firms like Fastfix to buy resources as per their
requirement instead of buying their own infrastructure. The benefits that are being provided by
this are improved flexibility, remote access, scalable, flexibility and many others (Singh, Jeong
and Park, 2016).
Usability: It is a advantageous to small or startup firms who have no budget for creation
of their own infrastructure, there is rapid growth of firm but demands are changeable and
unstable.
Characteristics: It furnishes organizations with automated administrative tasks, dynamic
scaling, platform virtualization technology along with graphical user interface and AAPI-
based access.
Illustration 9: Infrastructure as a Service
Cloud computing provides various services which can be explicated with respect to roles
played by them. They are as:
Infrastructure as a service: It implies outsourcing of physical infrastructure from third party
providers. In this, IT resources are with external servers which can be accessed by users through
usage of internet connection. IaaS enables firms like Fastfix to buy resources as per their
requirement instead of buying their own infrastructure. The benefits that are being provided by
this are improved flexibility, remote access, scalable, flexibility and many others (Singh, Jeong
and Park, 2016).
Usability: It is a advantageous to small or startup firms who have no budget for creation
of their own infrastructure, there is rapid growth of firm but demands are changeable and
unstable.
Characteristics: It furnishes organizations with automated administrative tasks, dynamic
scaling, platform virtualization technology along with graphical user interface and AAPI-
based access.
Illustration 9: Infrastructure as a Service
Advantages: IaaS provides organization with flexibility and a dynamic model which is
cost effective as user pay on the basis of pay-as-you-go. It can be easily utilized due to
automated deployment of hardware along with this management tasks are being
virtualized which will save time of employees.
Disadvantages: There can be security issues as there is a multitenant architecture, vendor
outages unable users to have access to data for certain time. Along with this adequate
training is required for managing new infrastructure.
Platform as a Service: This assists within outsourcing of hardware infrastructure along with
software environment that comprises of integration layers, database and many other aspects. It
will allow firms to have customized applications. The benefits which can be utilized by Fastfix
through PaaS usage are installation as well as development of applications, time saving,
flexibility, etc. This is not appropriate as Fastfix is not looking forward to develop their own
applications.
Usability: PaaS is profitable to developers, who have to give time for coding, testing
along with deployment of applications. It is used by multiple developers when they are
working on same project through which customized apps can be created.
Characteristics: It assists within development, testing as well as hosting of apps within
identical environment. Furthermore, resources can also be scaled down and up on the
basis of business requirements.
Illustration 10: Platform as a Service
cost effective as user pay on the basis of pay-as-you-go. It can be easily utilized due to
automated deployment of hardware along with this management tasks are being
virtualized which will save time of employees.
Disadvantages: There can be security issues as there is a multitenant architecture, vendor
outages unable users to have access to data for certain time. Along with this adequate
training is required for managing new infrastructure.
Platform as a Service: This assists within outsourcing of hardware infrastructure along with
software environment that comprises of integration layers, database and many other aspects. It
will allow firms to have customized applications. The benefits which can be utilized by Fastfix
through PaaS usage are installation as well as development of applications, time saving,
flexibility, etc. This is not appropriate as Fastfix is not looking forward to develop their own
applications.
Usability: PaaS is profitable to developers, who have to give time for coding, testing
along with deployment of applications. It is used by multiple developers when they are
working on same project through which customized apps can be created.
Characteristics: It assists within development, testing as well as hosting of apps within
identical environment. Furthermore, resources can also be scaled down and up on the
basis of business requirements.
Illustration 10: Platform as a Service
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Advantages: PaaS renders highly scalable, multi-tenant and availability as this is cloud
based. Furthermore, development process is simplified; quickened and minimized coding
needs which assists within easy migration.
Disadvantages: There are various security issues associated with data along with
compatibility of existent infrastructure. Along with this, there is high dependency on
vendor’s reliability, support and speed.
Software as a Service: It signifies usage of internet to render applications which are being
monitored by third party vendor. The applications of SaaS can be executed directly by web
browser of firm which denotes that Fastfix do not have to make any kind of installations. The
benefits that are provided by this is that automatic updates, easy as well as quick to test,
completely free from managing infrastructure (Kalaiprasath, Elankavi and Udayakumar, 2017).
This is apt for Fastfix as it will enable easy collaboration, accessibility, administration and
automatic update patch management.
Usability: SaaS can be utilized by firms they are looking forward for launching ready-
made software quickly and if they need to make use of applications for temporary basis
as well as when they are required for both mobile & web access.
Characteristics: It is a subscription that is being utilized without it is downloaded,
installed or upgrade this. Furthermore, it furnishes users with resources that can be scaled
as per requirements and they can be accessed from any of the devices which are
connected.
Illustration 11: Software as a Service
based. Furthermore, development process is simplified; quickened and minimized coding
needs which assists within easy migration.
Disadvantages: There are various security issues associated with data along with
compatibility of existent infrastructure. Along with this, there is high dependency on
vendor’s reliability, support and speed.
Software as a Service: It signifies usage of internet to render applications which are being
monitored by third party vendor. The applications of SaaS can be executed directly by web
browser of firm which denotes that Fastfix do not have to make any kind of installations. The
benefits that are provided by this is that automatic updates, easy as well as quick to test,
completely free from managing infrastructure (Kalaiprasath, Elankavi and Udayakumar, 2017).
This is apt for Fastfix as it will enable easy collaboration, accessibility, administration and
automatic update patch management.
Usability: SaaS can be utilized by firms they are looking forward for launching ready-
made software quickly and if they need to make use of applications for temporary basis
as well as when they are required for both mobile & web access.
Characteristics: It is a subscription that is being utilized without it is downloaded,
installed or upgrade this. Furthermore, it furnishes users with resources that can be scaled
as per requirements and they can be accessed from any of the devices which are
connected.
Illustration 11: Software as a Service
Advantages: There is no hardware and initialization cost along with this it provides
automated upgrades, cross device compatibility and are being accessed from anywhere.
Disadvantages: In SaaS, there is a loss of control and restricted range of solutions that are
being utilized by firm. Apart from this, it is necessary that there is connectivity.
Data Migration
The process associated with selection, preparation, extraction and transformation of data so
that it can be permanently transferred from one storage system to other is referred to as data
migration. Cloud migration implies a process that involves moving applications, data along with
other business elements from on-premises to a virtual pool as per requirements of organization
(Kumar and Kumar, 2013). The major steps which must be followed by Fastfix while doing so
are illustrated beneath:
Plan as well as prepare migration: Firm need to be clear that why they are shifting to
cloud as it provides various features and what exactly is required by Fastfix. They can
have a manger that will be responsible for managing migration process and formulating
technical plans to ensure success of project. For this, shallow or deep cloud integration
can be carried out by Fastfix.
Choose Cloud environment: Before process of data migration is started it is crucial to
take decisions with respect to whether single or multi-cloud environment is required by
organization. Single cloud environment is being implemented by making use of single
provider who will serve all applications or services on which firm has agreed to opt for
cloud. On the other-hand in multi-cloud environment firm opts for services from multiple
service providers for different activities. With reference to Fastfix as they are not opting
for first time for cloud services then single cloud environment will be apt for them.
Migrate data and applications & review: If planning is done in an appropriate manner
then process of migration will go smoothly. Furthermore, on the basis of distinct
applications as well as size of database different techniques can be used for copying
information (Lee, 2012). For an instance, Fastfix can compress their data or even can ship
their physical devices to cloud service providers to minimize cost associated with
bandwidth.
automated upgrades, cross device compatibility and are being accessed from anywhere.
Disadvantages: In SaaS, there is a loss of control and restricted range of solutions that are
being utilized by firm. Apart from this, it is necessary that there is connectivity.
Data Migration
The process associated with selection, preparation, extraction and transformation of data so
that it can be permanently transferred from one storage system to other is referred to as data
migration. Cloud migration implies a process that involves moving applications, data along with
other business elements from on-premises to a virtual pool as per requirements of organization
(Kumar and Kumar, 2013). The major steps which must be followed by Fastfix while doing so
are illustrated beneath:
Plan as well as prepare migration: Firm need to be clear that why they are shifting to
cloud as it provides various features and what exactly is required by Fastfix. They can
have a manger that will be responsible for managing migration process and formulating
technical plans to ensure success of project. For this, shallow or deep cloud integration
can be carried out by Fastfix.
Choose Cloud environment: Before process of data migration is started it is crucial to
take decisions with respect to whether single or multi-cloud environment is required by
organization. Single cloud environment is being implemented by making use of single
provider who will serve all applications or services on which firm has agreed to opt for
cloud. On the other-hand in multi-cloud environment firm opts for services from multiple
service providers for different activities. With reference to Fastfix as they are not opting
for first time for cloud services then single cloud environment will be apt for them.
Migrate data and applications & review: If planning is done in an appropriate manner
then process of migration will go smoothly. Furthermore, on the basis of distinct
applications as well as size of database different techniques can be used for copying
information (Lee, 2012). For an instance, Fastfix can compress their data or even can ship
their physical devices to cloud service providers to minimize cost associated with
bandwidth.
Illustration 12: The Cloud is Having A Measurable Impact on Business
By migrating data, Fastfix can have flexibility in their operations, data can be recovered at
the time of any kind of disaster, automatic software updates, capital expenditure free, enhanced
collaboration, employees can work from anywhere and many other benefits can be attained by
them.
Configuration of cloud with CSP framework
This section illustrates configuration of EC2 (Amazon Elastic Compute Cloud) but before
this it is important to understand what it is and what benefits will it provide to Fastfix. It is a web
service that furnishes resizable and secured compute capacity which is formulated to render web-
scale computing (Modi and et. al, 2013). EC2 furnishes complete control to computing
resources with minimized downtime that enable to have enhanced access to services and quick
response.
By migrating data, Fastfix can have flexibility in their operations, data can be recovered at
the time of any kind of disaster, automatic software updates, capital expenditure free, enhanced
collaboration, employees can work from anywhere and many other benefits can be attained by
them.
Configuration of cloud with CSP framework
This section illustrates configuration of EC2 (Amazon Elastic Compute Cloud) but before
this it is important to understand what it is and what benefits will it provide to Fastfix. It is a web
service that furnishes resizable and secured compute capacity which is formulated to render web-
scale computing (Modi and et. al, 2013). EC2 furnishes complete control to computing
resources with minimized downtime that enable to have enhanced access to services and quick
response.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The initial step involved within this is to go to homepage of AWS and account must be
opened by sign in. Now go to services, click on EC2 and then dashboard will be opened.
Illustration 13: EC2 Dashboard
Step 1: Now choose AMI (Amazon Machine Image) or the virtual image as per scenario. Here,
Ubuntu Server will be taken as it is ideal.
Step 2: After opting for virtual image, an instance type can be chosen which will be optimized to
fit within so that it can go with Fastfix. Instances imply virtual servers which are liable for
running applications. Here t2.micro can be used as this is free-tier eligible and is enough to
accomplish requirements of firm.
Step 3: Now, the instance details have to be configured and multiple instances can be launched
within same AMI. Within network and subnet settings, auto-assigning of public IP can be
chosen.
opened by sign in. Now go to services, click on EC2 and then dashboard will be opened.
Illustration 13: EC2 Dashboard
Step 1: Now choose AMI (Amazon Machine Image) or the virtual image as per scenario. Here,
Ubuntu Server will be taken as it is ideal.
Step 2: After opting for virtual image, an instance type can be chosen which will be optimized to
fit within so that it can go with Fastfix. Instances imply virtual servers which are liable for
running applications. Here t2.micro can be used as this is free-tier eligible and is enough to
accomplish requirements of firm.
Step 3: Now, the instance details have to be configured and multiple instances can be launched
within same AMI. Within network and subnet settings, auto-assigning of public IP can be
chosen.
Illustration 14: Instance Details
Step 4: Once the settings have been configured, appropriate amount of storage that is required by
Fastfix has to be chosen, as we have opted for free-tier eligible then maximum 30GB space is
available for General Purpose. Here, entire 30 GB will be taken.
Step 5: Now when storage configurations are done then next step involves adding up tags that
will aid within connecting distinct AWS services with one other.
Step 6: This is crucial step in which security protocols will be configured which instances needs
to follow. There will be HTTP-TCP and SSH-TCP which will be adequate for fastfix.
Step 7: The next step illustrates review of all the configurations of instances which have been
carried out. Now administrator of Fastfix needs to choose pair of keys, they are public and
private keys. They will assist to secure EC2 instance and after doing this it has been launched
successfully.
Implementation of cloud platform using open source tool
Amazon EC2 forms crucial part of AWS (Amazon Web Services) which allows users to
have virtual computers where individuals or firms can execute their computer applications. EC2
assure scalable deployment of apps by providing web service through which users can boot AMI
Step 4: Once the settings have been configured, appropriate amount of storage that is required by
Fastfix has to be chosen, as we have opted for free-tier eligible then maximum 30GB space is
available for General Purpose. Here, entire 30 GB will be taken.
Step 5: Now when storage configurations are done then next step involves adding up tags that
will aid within connecting distinct AWS services with one other.
Step 6: This is crucial step in which security protocols will be configured which instances needs
to follow. There will be HTTP-TCP and SSH-TCP which will be adequate for fastfix.
Step 7: The next step illustrates review of all the configurations of instances which have been
carried out. Now administrator of Fastfix needs to choose pair of keys, they are public and
private keys. They will assist to secure EC2 instance and after doing this it has been launched
successfully.
Implementation of cloud platform using open source tool
Amazon EC2 forms crucial part of AWS (Amazon Web Services) which allows users to
have virtual computers where individuals or firms can execute their computer applications. EC2
assure scalable deployment of apps by providing web service through which users can boot AMI
for configuring virtual machine (Nabi, Jamwal and Padmanbh, 2020). After EC2 has been
configured appropriately then instances can be launched and executed. Their status will illustrate
that they are running as well as can be utilized for running any king of computing application.
Amazon RDS (Relational Database Service) implies a web service which is easy to set up,
operate as well as scale RDS within the AWS Cloud. It renders efficient, resizable and cheap
capacity with respect to industry standard relational database along with it manages tasks related
with database administration. MySQL has been used as a default engine option and it has been
connected to the database of cloud. It is being done by making use of following queries in
MySQL:
mysql> Create database Fastfix;
mysql> use Fastfix;
mysql> create table emp(id int primary key, name varchar(10));
mysql> create table cust(id int primary key, name varchar(10));
mysql> alter table cust add foreign key(id) references emp(id);
mysql> desc emp;
Field Type Null Key Default Extra
Id
Name
Int(11)
Varchar(10)
No
Yes
PRI NULL
NULL
mysql> desc cust;
Field Type Null Key Default Extra
Id
Name
Int(11)
Varchar(10)
No
Yes
PRI NULL
NULL
configured appropriately then instances can be launched and executed. Their status will illustrate
that they are running as well as can be utilized for running any king of computing application.
Amazon RDS (Relational Database Service) implies a web service which is easy to set up,
operate as well as scale RDS within the AWS Cloud. It renders efficient, resizable and cheap
capacity with respect to industry standard relational database along with it manages tasks related
with database administration. MySQL has been used as a default engine option and it has been
connected to the database of cloud. It is being done by making use of following queries in
MySQL:
mysql> Create database Fastfix;
mysql> use Fastfix;
mysql> create table emp(id int primary key, name varchar(10));
mysql> create table cust(id int primary key, name varchar(10));
mysql> alter table cust add foreign key(id) references emp(id);
mysql> desc emp;
Field Type Null Key Default Extra
Id
Name
Int(11)
Varchar(10)
No
Yes
PRI NULL
NULL
mysql> desc cust;
Field Type Null Key Default Extra
Id
Name
Int(11)
Varchar(10)
No
Yes
PRI NULL
NULL
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The above commands illustrate database named Fastfix is creates and within this two
tables emp (employee), cust (customers) are created along with their attributes. Few commands
have been illustrated below to put values in table and are connected via primary and foreing key.
mysql> insert into emp(id, name) values (1, “Aliza”);
mysql> insert into emp(id, name) values (2, “Mark”);
mysql> select * from emp;
Id Name
1
2
Aliza
Mark
mysql> insert into cust(id, name) values (1, “John”);
mysql> insert into cust(id, name) values (2, “Sophie”);
mysql> select * from cust;
Id Name
1
2
John
Sophie
In this way relational database system can be implemented.
Probable solution to problems
Some issues that may be faced by Fastfix while opting for cloud computing has been
illustrated below:
Data Integrity: This is one of the critical elements which illustrate guarding data from
unwanted modification, deletion or fabrication. This can occur due to human errors,
cyberattacks, malware, insider threats, etc (Neware and et. al, 2020). It can be handled by
management of Fastfix by making use of privileges and admittance for peculiar firm
resources to ensure valuable data. It can be done by authenticating input & data,
eliminating replicated data and access control.
tables emp (employee), cust (customers) are created along with their attributes. Few commands
have been illustrated below to put values in table and are connected via primary and foreing key.
mysql> insert into emp(id, name) values (1, “Aliza”);
mysql> insert into emp(id, name) values (2, “Mark”);
mysql> select * from emp;
Id Name
1
2
Aliza
Mark
mysql> insert into cust(id, name) values (1, “John”);
mysql> insert into cust(id, name) values (2, “Sophie”);
mysql> select * from cust;
Id Name
1
2
John
Sophie
In this way relational database system can be implemented.
Probable solution to problems
Some issues that may be faced by Fastfix while opting for cloud computing has been
illustrated below:
Data Integrity: This is one of the critical elements which illustrate guarding data from
unwanted modification, deletion or fabrication. This can occur due to human errors,
cyberattacks, malware, insider threats, etc (Neware and et. al, 2020). It can be handled by
management of Fastfix by making use of privileges and admittance for peculiar firm
resources to ensure valuable data. It can be done by authenticating input & data,
eliminating replicated data and access control.
Threats: If firm is online then there is a threat of attack. Cloud services will provide
Fastfix with adequate security tools but still issues takes place. They are data breaches
(due to lost password or hacked accounts), data loss (if someone erase everything) and
hijacked accounts (Parekh and Sridaran, 2013). This can be handled by creating a backup
of data via off-site storage, strong passwords, two-factor verification and monitor unusual
compute activities.
Security issues
There are certain security aspects which must be taken into consideration Fastfix to
ensure that they do not get into any kind of trouble by opting for cloud computing. Some of these
are specified beneath:
Virtualization security: In cloud computing, virtualization denotes creation of virtual
version of resources or devices like servers, storage devices and network. Risks
associated with this are compromised virtualization layer that will compromise workload,
absence of controls and visibity.
SaaS Security issues: This involves network security in which data flow via network
may leak the sensitive information and there can be issue related with resource locality
(Rabai and et. al, 2013).
PaaS Security issues: In this, OS of Fastfix executes on architecture that is provided by
vendor. This lead to wide security challenges as user data or objects are spread over host
of cloud.
IaaS Security issues: The major concerns in this are CIA (confidentiality, integrity and
availability) and multitenancy.
Ways to overcome issues
Few issues which can be faced by Fastfix while making use of cloud computing are specified
above and to deal with them certain solutions are illustrated below:
Virtualization security solution: Vendors must support measurement of
VMM/hypervisor layer on boot-up for ensuring that this is not compromised. To
minimize chances of mismanagement and misconfiguration, security vendors must span
Fastfix with adequate security tools but still issues takes place. They are data breaches
(due to lost password or hacked accounts), data loss (if someone erase everything) and
hijacked accounts (Parekh and Sridaran, 2013). This can be handled by creating a backup
of data via off-site storage, strong passwords, two-factor verification and monitor unusual
compute activities.
Security issues
There are certain security aspects which must be taken into consideration Fastfix to
ensure that they do not get into any kind of trouble by opting for cloud computing. Some of these
are specified beneath:
Virtualization security: In cloud computing, virtualization denotes creation of virtual
version of resources or devices like servers, storage devices and network. Risks
associated with this are compromised virtualization layer that will compromise workload,
absence of controls and visibity.
SaaS Security issues: This involves network security in which data flow via network
may leak the sensitive information and there can be issue related with resource locality
(Rabai and et. al, 2013).
PaaS Security issues: In this, OS of Fastfix executes on architecture that is provided by
vendor. This lead to wide security challenges as user data or objects are spread over host
of cloud.
IaaS Security issues: The major concerns in this are CIA (confidentiality, integrity and
availability) and multitenancy.
Ways to overcome issues
Few issues which can be faced by Fastfix while making use of cloud computing are specified
above and to deal with them certain solutions are illustrated below:
Virtualization security solution: Vendors must support measurement of
VMM/hypervisor layer on boot-up for ensuring that this is not compromised. To
minimize chances of mismanagement and misconfiguration, security vendors must span
virtual and physical environment with continuous policy management along with
enforcement framework (Rachana and Guruprasad, 2014).
SaaS Security solution: The network security aspect can be handled by Fastfix making
use of strong encryption techniques like TLS and SSL. Resource locality can be handled
by abiding to privacy laws which are being devised by peculiar country.
PaaS Security solution: Privacy of users must be maintained along with this, fault
tolerant systems must be used so that privacy of users can be preserved.
IaaS Security solution: Virtual firewall must be created in between virtual devices while
delivering packets along with certain security policies and roles.
Conclusion
From above it can be concluded that cloud computing plays a crucial role within ways firm
renders out their operations. It provides firm to have access to services without having
infrastructure, they can pay as per their requirement and can opt for services whenever they need
it. There are different deployment and service models which can be utilized depending upon
operations and size of firm. Furthermore, cloud service providers provide services as what is
being demanded by their customers and are liable for maintaining all the crucial aspects related
with them. Furthermore, there are some security concerns for which organization need to have
peculiar protocols so that their operations and information is not accessed by third person.
enforcement framework (Rachana and Guruprasad, 2014).
SaaS Security solution: The network security aspect can be handled by Fastfix making
use of strong encryption techniques like TLS and SSL. Resource locality can be handled
by abiding to privacy laws which are being devised by peculiar country.
PaaS Security solution: Privacy of users must be maintained along with this, fault
tolerant systems must be used so that privacy of users can be preserved.
IaaS Security solution: Virtual firewall must be created in between virtual devices while
delivering packets along with certain security policies and roles.
Conclusion
From above it can be concluded that cloud computing plays a crucial role within ways firm
renders out their operations. It provides firm to have access to services without having
infrastructure, they can pay as per their requirement and can opt for services whenever they need
it. There are different deployment and service models which can be utilized depending upon
operations and size of firm. Furthermore, cloud service providers provide services as what is
being demanded by their customers and are liable for maintaining all the crucial aspects related
with them. Furthermore, there are some security concerns for which organization need to have
peculiar protocols so that their operations and information is not accessed by third person.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
Books & Journals
Kalaiprasath, R., Elankavi, R. and Udayakumar, D.R., 2017. Cloud. Security and Compliance-A
Semantic Approach in End to End Security. International Journal Of Mechanical
Engineering And Technology (Ijmet), 8(5), pp.987-994.
Kumar, P. and Kumar, L., 2013. Security Threats to Cloud Computing. International Journal of
IT, Engineering and Applied Sciences Research (IJIEASR), 2(1).
Lee, K., 2012. Security threats in cloud computing environments. International journal of
security and its applications, 6(4), pp.25-32.
Modi, C. and et. al, 2013. A survey on security issues and solutions at different layers of Cloud
computing. The journal of supercomputing, 63(2), pp.561-592.
Nabi, F., Jamwal, S. and Padmanbh, K., 2020. Wireless sensor network in precision farming for
forecasting and monitoring of apple disease: a survey. International Journal of
Information Technology, pp.1-12.
Neware, R. And et. al, 2020. Survey on Security Issues in Mobile Cloud Computing and
Preventive Measures. In Smart Computing Paradigms: New Progresses and
Challenges (pp. 89-100). Springer, Singapore.
Parekh, D.H. and Sridaran, R., 2013. An analysis of security challenges in cloud
computing. IJACSA) International Journal of Advanced Computer Science and
Applications, 4(1).
Rabai, L.B.A. and et. al, 2013. A cybersecurity model in cloud computing
environments. Journal of King Saud University-Computer and Information
Sciences, 25(1), pp.63-75.
Rachana, S.C. and Guruprasad, H.S., 2014. Emerging Security Issues and challenges in cloud
computing. International Journal of Engineering Science and Innovative
Technology, 3(2), pp.485-490.
Sharma, R. and Trivedi, R.K., 2014. Literature review: cloud computing–security issues, solution
and technologies. International Journal of Engineering Research, 3(4), pp.221-225.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications, 75, pp.200-222.
Online
The Evolution of Cloud Computing – Where’s it Going Next?. 2019. [Online]. Available
through: <https://itchronicles.com/cloud/the-evolution-of-cloud-computing-wheres-it-
going-next/>.
Books & Journals
Kalaiprasath, R., Elankavi, R. and Udayakumar, D.R., 2017. Cloud. Security and Compliance-A
Semantic Approach in End to End Security. International Journal Of Mechanical
Engineering And Technology (Ijmet), 8(5), pp.987-994.
Kumar, P. and Kumar, L., 2013. Security Threats to Cloud Computing. International Journal of
IT, Engineering and Applied Sciences Research (IJIEASR), 2(1).
Lee, K., 2012. Security threats in cloud computing environments. International journal of
security and its applications, 6(4), pp.25-32.
Modi, C. and et. al, 2013. A survey on security issues and solutions at different layers of Cloud
computing. The journal of supercomputing, 63(2), pp.561-592.
Nabi, F., Jamwal, S. and Padmanbh, K., 2020. Wireless sensor network in precision farming for
forecasting and monitoring of apple disease: a survey. International Journal of
Information Technology, pp.1-12.
Neware, R. And et. al, 2020. Survey on Security Issues in Mobile Cloud Computing and
Preventive Measures. In Smart Computing Paradigms: New Progresses and
Challenges (pp. 89-100). Springer, Singapore.
Parekh, D.H. and Sridaran, R., 2013. An analysis of security challenges in cloud
computing. IJACSA) International Journal of Advanced Computer Science and
Applications, 4(1).
Rabai, L.B.A. and et. al, 2013. A cybersecurity model in cloud computing
environments. Journal of King Saud University-Computer and Information
Sciences, 25(1), pp.63-75.
Rachana, S.C. and Guruprasad, H.S., 2014. Emerging Security Issues and challenges in cloud
computing. International Journal of Engineering Science and Innovative
Technology, 3(2), pp.485-490.
Sharma, R. and Trivedi, R.K., 2014. Literature review: cloud computing–security issues, solution
and technologies. International Journal of Engineering Research, 3(4), pp.221-225.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications, 75, pp.200-222.
Online
The Evolution of Cloud Computing – Where’s it Going Next?. 2019. [Online]. Available
through: <https://itchronicles.com/cloud/the-evolution-of-cloud-computing-wheres-it-
going-next/>.
What is cloud computing?, 2020. [Online]. Available through: < https://azure.microsoft.com/en-
in/overview/what-is-cloud-computing/#uses>.
in/overview/what-is-cloud-computing/#uses>.
1 out of 24
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.