Advantages of Cloud Computing and Private vs Public Cloud Differences
Verified
Added on  2023/06/07
|19
|4561
|259
AI Summary
This article discusses the advantages of cloud computing, differences between private and public cloud, considerations when implementing private cloud, security issues with cloud computing, and service models in cloud computing. It also includes a verification of the health status of System Center components.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: CLOUD COMPUTING1 CLOUD COMPUTING Student Name Institution Affiliation Facilitator Course Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING4 cloud operates in a single tenancy because the data in this cloud belongs to a single organization. On the other hand, public cloud operates as a multi-tenancy because it deals with data from multiple organizations in a shared environment (Ali, Khan & Vasilakos, 2015). In terms of exposure to public exposure, the private cloud does not allow exposure because it’s only the organization itself that can use the cloud services (Goyal, 2014). For, public cloud; the infrastructure allows exposure of the services to all the organizations which wishes to use it under shared environment. For private cloud, data center is located within the organization network while for public cloud it’s located anywhere on the internet where the cloud service provider is located(Krishnan, Bhagwat & Utpat, 2015). In regard to cloud service management, under private cloud management of cloud services is done by the internal team while under public cloud it’s the responsibility of the service provider to manage and control the cloud service where organization data is stored. Finally, in regard to hardware components of the two services, in private cloud the organization provides the components which entail servers and other storage devices while in public cloud that’s the responsibility of CSP (Rittinghouse & Ransome, 2016). Question 2 (a) Considerations when Implementing Private Cloud Although, on premise data centers have problems when it comes to resources, management skills and monitoring, there are some instances where private cloud is more preferable than the public cloud. This depends on the client requirements.Here are some of the cases I would advise a client to go for private cloud services (Cooper, Nedbal & Nadkarni, 2017). Backup and Recovery needs of the Organization
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING5 If theclient would like to have full control of their backup frequencies and recovery, I would advise the clients to go for this cloud service because in public cloud service they would get what is supported by the service provider regardless of whether it meets their demands or not (Krishnan, Bhagwat & Utpat, 2015). Securityaspect It’s beyond any reasonable doubt that public cloud service has some weaknesses in regard to organization data privacy and encryption has remained to be a challenge. So, if the client is handling sensitive data which requires high levels of privacy, I would encourage him to go for private cloud service which won’t compromise with its requirements in terms of privacy goals(Krishnan, Bhagwat & Utpat, 2015). Performanceaspect Although both public and private cloud services have good performance, in public cloud service the client will be confiscated on the level of performance provided by the service provider. However, if the client needs to remain in full control of his or her data center performance like moving certain information to faster disks or pushing something into memory and increase caching performance whenever a need arises, private cloud is the best (Jiang, Song, Wang, Gu, Sun & Sha, 2017).). Flexibility aspect Beyond the flexibility offered by both public and private cloud services in terms of servers and storage, private cloud service has an additional flexibility aspect of allowing the
CLOUD COMPUTING6 client to do what he or she wants at any instance. For such a case, the client should consider private cloud. (b) Private Cloud Monitoring and Operation by System Centre Mainly, private cloud monitoring and operation solution relies on System Centers as the virtualization engine platforms that enable pooling and sharing of computing resources like network, storage and memory. Also System Centers support private cloud security and isolation of hosted services(Krishnan, Bhagwat & Utpat, 2015). The components of System Center which include System Center Virtual Machine Manager, System Center Configuration Manager, System Center Operations Manager, System Center Data Protection Manager, System Center App Controller, System Center Service Manager and System Center Orchestrator work together to provide automation, operation, and management of private cloud, as well as enabling the elasticity, self-service, and metering attributes. Question 3 (a) (I) Security issues with Cloud Computing Data Breaches Considering the fact that data breaches have been existing for quite a long time while cloud computing is a new technology which has not been scrutinized fully by the IT security experts, this clearly shows that security in cloud computing must be low (Krishnan, Bhagwat & Utpat, 2015). A research conducted by Ponemon Institute indicated that over 50% of the IT security professionals were not adequately conversant with the security aspects of cloud
CLOUD COMPUTING7 computing. For that matter, they believed that security in cloud computing infrastructure was highly exposed to data breaches. Malware Injection These are scripts and codes which are embedded into the cloud services to act as “valid instances” and run as normal SaaS to the cloud servers. Once these injections are executed and cloud begins to operate in tandem with them, attackers can easily eavesdrop hence compromising the integrity of data inside the servers especially if it’s sensitive data, they can also steal the data (Krishnan, Bhagwat & Utpat, 2015). Insecure APIs For users to be able to customize their cloud experience, cloud technology uses Application Programming Interfaces (API). However, these APIs have turned to be a threat in cloud security because they can also give attackers the chance to customize features ofthe cloud servicesto fit target goals by authenticating, provide access, and effecting encryption just like the real users (Krishnan, Bhagwat & Utpat, 2015). Denial of Service Attacks Rather than other cyberattacks, DoS attacks usually make organization servers at the cloud environment unavailable with an aim of legitimizing users. In other instances , however, DoS attacks are used as smokescreens for other malicious activities like taking down the security appliances likeweb application firewalls. (ii) Security Controls in Cloud Security Architecture
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING8 Setting up strong cloud data security policies Strong policies play a very crucial role in preventing organization data breaches and maintaining security within the cloud computing environment. Policies help in preventing data breaches originating from the inside of the organization and which has been ranked as the top source of the current data breaches (Julian et al, 2017). Encryptions to sensitive data Sensitive data and which is more prone to compromises should always be kept in encrypted manner whether being retrieved of under storage. That way, even under successful attacks the data is secure because it’s meaningless to the attackers who may not have decryption keys. This control measure backed up by the strong security policies ensures high security of data in cloud computing infrastructures (Rittinghouse & Ransome, 2016). DLP and Activity Monitoring Data leaks in organizations can also be caused by employees, and whether they are whether inadvertently or maliciously pose security concerns to the organization. So, organizations need to back up their security policies and the encryption strategies with Data Loss Prevention (DLP) and activity monitoring solutions which helps in detecting any attempts made to access or transmit sensitive data from the cloud servers (Rittinghouse & Ransome, 2016). (b) Selection Criteria Assessment for Private and Public Cloud Security Aspect
CLOUD COMPUTING9 The main selection criteria of private and public cloud services in regard to security are the sensitivity of data being handled and the level of privacy required. Looking at this criterion however, there are a lot of concerns. First, if data privacy can be compromised in the cloud computing environment implies that security of data from different angles can also be compromised. For that matter, data security can either be 100% or 0% and therefore any organization that worries of privacy in any of these two should also be worried of insecurity from the rest of data security aspects (Rittinghouse & Ransome, 2016). Question 4: Verifying the Health Status of System Center Components Operations Manager The main function of this component is to keep eye on cloud servers, operating systems, applications and networks. So, if tested throughSystem Center Configuration Manager(SCCM) and cannot return the results based on the status of the three, it is deemed to have a fault. However, if it can return the status its health status is approved (Kampas, Tarkowski, Portell & Bhatti, 2016). Virtual Machine Manager This component manages fabric infrastructure for virtualization right from the hosts, networks to clusters. When tested throughSystem Center Configuration Manager(SCCM) and accessibility of virtual machines does not go through, it is deemed to have a fault. However, if it can be accessed its said to be healthy.
CLOUD COMPUTING10 Service Manager Service manager acts as a help desk system that helps in tracking incidents, changing requests and configuring management at the configuration management database. If it can’t achieve these functionalities when tested by a System Center Configuration Manager(SCCM) then its deemed fault otherwise its healthy. Orchestrator This component links and integrates all the other components of System Center through automation. So, if the components of system center are not integrated at any instance, it is deemed as fault, otherwise it is seen as healthy. Application Controller This component allows the end users to see Virtual Machine Manager Private clouds as well as the services deployed in them. If the end users cannot see the Virtual Machine Manager Private Cloud, the component is declared faulty otherwise it is considered healthy. Question 5: Service Models in Cloud Computing
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CLOUD COMPUTING11 Software as aService (SaaS) Under this level, consumers are provided with the capability of using the service provider applications running on cloud infrastructure. Also, the applications running the cloud infrastructure are availed from different client device either via thin client interfaces like web browsers or through program interface. Consumers are restricted from managing or controlling the core cloud resources like the network, individual application, servers, storage and OS except user-specific application configurations(Huang & Wu, 2017).
CLOUD COMPUTING12 Platform as a Service (PaaS) Under this level, consumers are provided with the ability to deploy client applications onto cloud platform by the use of programminglanguages, libraries and services. At this level, consumers are not privileged to manage and control any underlying cloud resources like servers, networks, storage and operating system. They are however accorded control over installed applicationsand configurationsettings in the applications-hosting environments (Manuel, 2015). Infrastructure as a Service (IaaS) At this level, consumers are provided with the capability of provision processing, managing fundamental computing resources like storage and networks and can install and run subjectivesoftwareslikeoperatingsystemandotherapplications.Consumersarenot privileged to manage and control the primarycloud infrastructure but have control over deployed applications, operating system and storage(Jula, Sundararajan & Othman, 2014). (b) Key Features of VMM and their Role in Private Cloud Windows PowerShell This feature enables the VMM to have a great automation and control as well as being fully scriptable. The role of this tool in the private cloud infrastructure is to enable IT administrators to execute scripted services remotely against virtual machines hence avoiding labor-intensive processes performed manually in graphic user interfaces (Levchenko & Cardoso, 2018). Fast and Reliable Physical to Virtual (P2V) Conversions
CLOUD COMPUTING13 By this feature, VMM improves the P2V experience. In private cloud infrastructure, it helps in creating virtual machines faster and without interrupting the source physical servers. Intelligent Placement This feature enables the VMM to analyze data performance and resource requirements after the virtual machines are deployed. Through the feature, IT administrators can fine tune placement algorithms for customization in private clouds (Palanichamy, Charles & Gonsalves, 2016). Centralized Resource Management and Optimization This is central work area providing a VMM administrator with a Console to perform resource tuning. Through this feature, resource settings are changed on private cloud virtual machines without workload interruptions. Rapid Deployment and Migration of Virtual Machines This feature provides for rapid provisioning of virtual machines by authorized self- service users and VMM administrators. Through the feature, quick provisioning of new virtual machines can be done it a private cloud infrastructure (Phan, 2017). Question 6: Increasing the Capacity of Private Cloud Through Storage Virtualization This is a technique of pooling physical storage from various storage devices into a single storage like device or a pool of accessible storage capacity managed through a central console. This technology mainly relies on softwares to identify the available storage capacities from physical devices and then aggregate the capacities as storage pools to be used in virtual environments by virtual machines (Sun & Jafar, 2017). The softwares at virtual storage will intercept I/O requests from both physical and virtual machines and then convey those requests to
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CLOUD COMPUTING14 appropriate physical locations of storage devices and that form part of overall storage pool in virtualized environments (Villari, Fazio, Dustdar, Rana & Ranjan, 2016). Question 7: Aspects of Multitenancy Cloud technology uses multi-tenancy to enable sharing of IT resources, services and softwares in cost efficient and secure ways. From an IT point of view, multi-tenancy has two aspects (Giannoulakis et al, 2016): Internal Aspect This is a scenario where an organization treats its departments as totally different tenants. In this case therefore, a logical isolation of infrastructure and applications is demanded while the physical infrastructure is being shared (Tewari & Kumar, 2016). External Aspects These are service provider environments where each tenant is handled as a different entity. For instance, financial companies require dedicated infrastructures (physical isolation), while retail companies can share the platform with other companies (logical isolation). It is very interesting to comprehend how the magic of multi-tenancy operates unnoticeably and its significance to the cloud design. Certain factors like security, scalability, reliability and serviceability play crucial roles. The Typical client expectations in a multi-tenant cloud or whatever the business, are: ď‚·The understanding of a dedicated cloud ď‚·Being Secure and isolated ď‚·Compliance with standards and regulations ď‚·Cost efficiency ď‚·Scalability and manageability
CLOUD COMPUTING15 Question 8: VMM profiles The main reason behind the design of VMM was to enable building and management of dynamic IT environment while reducing the time taken in configuration and application of settings across virtualization infrastructures. VMM offers several profiles which contain configuration settings to be re-used while deploying virtual machines including guest OS profiles, application profiles, capability profiles, hardware profiles and SQL server profiles. There are no limitations in the number of VMM profiles to be created, but, it’s always advisable to avoid creating too many (Paithane & Vashisht, 2016). Configuring Application Profile (Bacher, Lueck, Raspl & Spatzier, 2015) On Opening the VMM admin console; At the “Library” section navigate and expand the “Profiles” section to see the profiles Right click on Application profile and choose “Create Application Profile”. Specific on the Application Profile configurations desired in the “New Application profile dialog”, Give a name for the selected “Application profile” at the “General tab” Select “Application Configuration” Tab then select “New Application Deployment” Finally, click “OK” to save the profile. Configuring SQL Server Profile (Vincent & Thomas, 2016) On Opening the VMM admin console; At the “Library” section navigate and expand the “Profiles” section to see the profiles Right click on SQL Server Profile and choose “Create SQL Server Profile”. Specific on the SQL Server configurations desired in the “New SQL server profile dialog”
CLOUD COMPUTING17 Giannoulakis, I., Xylouris, G., Kafetzakis, E., Kourtis, M. A., Fajardo, J. O., Khodashenas, P. S., ... & Vassilakis, V. (2016, June). System architecture and aspects of SESAME: Small cEllS coordinAtion for Multi-tenancy and Edge services. In2nd IEEE Conference on Network Softwarization (NetSoft), Workshop on Software Defined 5G Networks (Soft5G), Seoul, Korea. Jiang, Y., Song, H., Wang, R., Gu, M., Sun, J., & Sha, L. (2017). Data-centered runtime verification of wireless medical cyber-physical system.IEEE transactions on industrial informatics,13(4), 1900-1909. Jula, A., Sundararajan, E., & Othman, Z. (2014). Cloud computing service composition: A systematic literature review.Expert Systems with Applications,41(8), 3809-3824. Julian, M., Gordana, M., Lukas, K., Maximilian, H., Markus, H., & Jörg, F. (2017). Process and Energy Data Acquisition on Machining Center and Individual Machine Components.Applied Mechanics & Materials,856. Kampas, S. R., Tarkowski, A. R., Portell, C. M., & Bhatti, N. (2016).U.S. Patent No. 9,235,442. Washington, DC: U.S. Patent and Trademark Office. Krishnan, Y. N., Bhagwat, C. N., & Utpat, A. P. (2015, February). Fog computing—Network based cloud computing. InElectronics and Communication Systems (ICECS), 2015 2nd International Conference on(pp. 250-251). IEEE. Levchenko, R., & Cardoso, E. A. (2018). System Center 2016 Virtual Machine Manager Cookbook-: Design, configure, and manage an efficient virtual infrastructure with VMM in System Center 2016.
CLOUD COMPUTING18 Manuel, P. (2015). A trust model of cloud computing based on Quality of Service.Annals of Operations Research,233(1), 281-292. Palanichamy, R., Charles, C., & Gonsalves, D. (2016).U.S. Patent No. 9,473,953. Washington, DC: U.S. Patent and Trademark Office. Phan, L. T. X. (2017). Real-time network function virtualization with timing interfaces.ACM SIGBED Review,14(3), 57-62. Paithane, S., & Vashisht, S. (2016).U.S. Patent No. 9,262,635. Washington, DC: U.S. Patent and Trademark Office Rittinghouse, J. W., & Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sun, H., & Jafar, S. A. (2017). The capacity of private information retrieval.IEEE Transactions on Information Theory,63(7), 4075-4088. Tewari, D., & Kumar, V. R. (2016).U.S. Patent Application No. 15/043,545. Villari, M., Fazio, M., Dustdar, S., Rana, O., & Ranjan, R. (2016). Osmotic computing: A new paradigm for edge/cloud integration.IEEE Cloud Computing,3(6), 76-83. Vincent, P., & Thomas, N. (2016).U.S. Patent No. 9,250,863. Washington, DC: U.S. Patent and Trademark Office. Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking.Computer Networks,81, 308-319.