Benefits and Issues of Secure Hybrid Cloud Solution
Verified
Added on 2022/11/15
|8
|1801
|305
AI Summary
This document discusses the benefits and issues of using secure hybrid cloud solution with real-life examples. It explains the importance of security feature in cloud computing and explores the concept of cloud bursting and its issues. Additionally, it highlights the advantages of connecting cloud across public internet.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD ICT CLOUD ICT Name of Student Name of University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CLOUD ICT Answer 10 a.I can explain my organization regarding the benefits from the secure hybrid Cloud solution by providing them with a report that would be prepared on the advantages that are provided by the usage of secure could computing along with some real life examples of their usefulness. I would further mention some examples of numerous organizations that had implemented hybrid cloud and how it has helped them in improving their operations (Singh & Chana, 2016). I would also provide them the example of the most important advantage provided by hybrid cloud which is business continuity. This is because it provides advantages like disaster recovery along with data backup. b.Besides numerous advantages, there are certain issues or threats that are imposed by the usage of hybrid cloud. These disadvantages can be explained by including them in the form of a certain report. The disadvantages can be mentioned besides the causes that could result in the threats and their consequences on the business (Etro, 2015). The document could also be provided with various examples of organizations which had encountered the challenges and the effects on the organization and its operations. Finally various mitigation strategies or recommendations could be provided which would explain how my organisation can prevent the issues or mitigate them using numerous strategies. c.Security feature is very important within the hybrid cloud because having a properly planned strategy for security of cloud could prove to be the key to having cloud innovation perfectly. Various security solutions that are designed for cloud might bring about numerous benefits for the organization as opposition of sing the legacy on premise solutions for security which would contribute in slowing down the cloud deployment (Acton, Morgan & Conboy, 2016). Security feature is important because,
2CLOUD ICT the speed as well as frequency of the cloud deployment needs a certain security solution which would be able to keep pace along with it. In the aspect of cloud security, this represented being able to scale in a rapid manner, scan the vulnerability at the time of building production as well as testing along with deploying various new environments within a short period of time. Answer 11 Cloud bursting concepts: cloud bursting can be defined as a certain model that can be used for the purpose of application deployment, here a certain application runs within a particular private cloud or a certain data centre and then bursts into the public cloud where the demand of public necessity for the capacity of computing tends to spike (Ye, Qian & Hu, 2016). The main benefit that is provide by the hybrid cloud deployment is the fact that a particular organization has to pay for only the extra resources whenever needed. Various experts tend to suggest cloud bursting for reliable performance, various applications that are not critical which handle insensitive data. A certain application could be deployed locally and then burst in cloud for meeting numerous demands (Kaleem, Jain & Husain, 2017). This can also be done by moving the application to public cloud for freeing up numerous local resources for the applications that are business critical. Cloud bursting tends to function its best for numerous applications which do not depend on various delivery infrastructures that arecomplexinnatureorintegratingwithdifferentapplications,systemsaswellas components internal to data centre. In the concept of cloud bursting, a certain organization should consider regulatory as well as security compliance requirements. Such as cloud bursting is usually cited in the form of viable option in case of the retailers who tend to ace peak in demand (Kyriakou & Loukis, 2017). Service providers of cloud computing do not provide PCI DSS environment, besides these numerous retailers can put data that is sensitive in nature at risk besides bursting to the public cloud.
3CLOUD ICT Issues in cloud bursting and their impacts on present cloud systems are mentioned below 1.Managing the configuration: there are huge variations among the cloud providers that are chosen by a certain organization and require configuration a well as managing the applications, besides the stacking of their technologies across two environments that are different from each other, some differences include hypervisor features along with machine image formats, the cloud APIs behave differently along with in the cell that are available (Walnum & Andrae, 2016). This further tends to create downstream effect, such as using numerous hypervisors along with storage subsystems which usually needs to be built for every cloud and hence maintain along with all the operating system as well as security path which comes out. 2.Communication latency: latency as well as throughput can prove to be a challenge in case the application used by an organization required to be shift a certain amount of information between the database and the application tire while they are placed in different clouds (Ghobadi, Testa & Spogli, 2019). This particular issue regarding the latency is pronounced while the communication is carried out through the public internet. 3.managing security: security of communication path among the clouds is also one of the issues, this means setting various channels that are encrypted besides dealing with numerous inevitable issues within the routing along with the compliance as well as requirements of auditing. On the basis of the availability requirements of applications the channels of communication might require being redundant at all eth levels, this would contribute in increasing routing complexity and hence add a multiplier of cost to the pipe costs and equipment cost. Allocation of dynamic server tends to create
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CLOUD ICT added complexities because various new servers that had added to a certain array should join the VPN dynamically. Answer 12 Five advantages of connecting cloud across public internet are as follows Reduced cost: numerous offerings of public cloud tend to be more expensive when it charges fee for the activity of data retrieval. For the purpose of incentivising the usage of private, secure connectivity, numerous service providers would bill those customers who had been using the solutions at very low rates. Increased security: for the purpose of integrating cloud strategy which contains high level of security, the organizations tend to connect to various digital ecosystems that bypass various public networks that are public in nature (Haverkort & Zimmermann, 2017). With the help of establishing a certain private connection, the users tend to reduce the overall threat of data breach or cyber-attack with the help of limiting is exposure in the public internet. Simple network management: in the process of establishing a certain cloud strategy enterprises would be allowed to spread various services throughout numerous platforms for supporting different applications. The main outcome is the fact that various in house professionals undertake numerous tasks that are difficult for the purpose of managing various interconnections and hence make sure on demand access. A particular circuit of direct connectivity provides access to a huge amount of cloud providers as well as solutions which contributes in saving time as well as frustration. More scalability: direct connection to fabrics of cloud exchange tends to ease the process of establishing solution of proper size which could be scaled up as well as down with minimum amount of effort needed.
5CLOUD ICT Reliable computing: along with high bandwidth along with interconnectivity having low latency, direct connections provide better performance of applications besides more reliable experience of end users. Application like FiberLight Cloud Connect tends to provide a better alternative to proper internet connectivity with the cloud (Von Faber & Behnsen, 2017).Itfurtheroffersnumerouscustomerswithcrossconnectionsolutionsthatare dedicated in nature. They also nourish the partnership with trusted providers of cloud exchange.
6CLOUD ICT References Acton, T., Morgan, L., Conboy, K., & Clohessy, T. (2016, June). The times they are a- changin for ICT service provision: A cloud computing business model perspective. In24th European Conference in Information Systems (ECIS). AIS Electronic Library (AISeL). Etro, F. (2015). The economics of cloud computing. InCloud Technology: Concepts, Methodologies, Tools, and Applications(pp. 2135-2148). IGI Global. Ghobadi, H., Testa, P., Spogli, L., Cafaro, M., Alfonsi, L., Romano, V., & Bru, R. (2019). User-OrientedICTCloudArchitectureforHigh-AccuracyGNSS-Based Services.Sensors,19(11), 2635. Haverkort, B. R., & Zimmermann, A. (2017). Smart industry: How ICT will change the game!.IEEE internet computing,21(1), 8-10. Kaleem, M. K., Jain, R., & Husain, M. A. (2017). Role of cloud computing in creating a sustainablegreenictinfrastructure.InternationalJournalofComputer Applications,160(1). Kyriakou, N., & Loukis, E. (2017, September). Hard And Soft ICT Capital And Cloud Computing Benefits. In11th Mediterranean Conference on Information Systems (MCIS 2017). Singh,S.,&Chana,I.(2016).QoS-awareautonomiccloudcomputingforICT. InProceedings of International Conference on ICT for Sustainable Development(pp. 569-577). Springer, Singapore. Von Faber, E., & Behnsen, W. (2017).Secure ICT Service Provisioning for Cloud, Mobile and Beyond. Springer Fachmedien Wiesbaden.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CLOUD ICT Walnum, H. J., & Andrae, A. S. (2016). The internet: explaining ICT service demand in light of cloud computing technologies. InRethinking Climate and Energy Policies(pp. 227-241). Springer, Cham. Ye, F., Qian, Y., & Hu, R. Q. (2016). Identity‐based schemes for a secured big data and cloud ICT framework in smart grid system.Security and Communication Networks,9(18), 5262-5277.