logo

Hybrid Cloud Computing

   

Added on  2023-04-04

11 Pages1827 Words104 Views
 | 
 | 
 | 
Running head: HYBRID CLOUD COMPUTING
Hybrid Cloud Computing
Name of the Student
Name of the University
Author Note
Hybrid Cloud Computing_1

1HYBRID CLOUD COMPUTING
Table of Contents
Introduction:....................................................................................................................................2
Hybrid Cloud and Microservices Strategy:.....................................................................................2
Hybrid Cloud:..............................................................................................................................2
Risks:...........................................................................................................................................2
Microservices:..............................................................................................................................4
Risk:.............................................................................................................................................4
General Information Security Steps and Controls:..........................................................................5
Recommendation:........................................................................................................................6
Conclusion:......................................................................................................................................8
References:......................................................................................................................................9
Hybrid Cloud Computing_2

2HYBRID CLOUD COMPUTING
Introduction:
Cloud computing strategy is very much important in current aspects as it provides various
of business functionality to the business organization (Rittinghouse & Ransome, 2016). In this
aspect hybrid cloud computing is very much crucial for gaining various of business advantages.
DTGOV has taken the step of moving their business on Hybrid Cloud and in this report it will be
demonstrated how they can successfully achieve this.
Hybrid Cloud and Microservices Strategy:
Hybrid Cloud:
The hybrid cloud is a typical type of environment for cloud computing which comprises
different types of cloud services model which include mix model of private cloud, on premises
and third party public clouds service with orchestration between two of the platforms (Farokhi et
al., 2016). Through the hybrid cloud model workloads can be interchanged between the public
cloud and private cloud as there can some business requirement of cost changes and computing
needs. Through this technology of hybrid cloud computing businesses will be able to gain greater
flexibility and with that more data deployment options will be gained by the businesses.
It has been assessed that the hybrid type of cloud faces various of risks regarding their
operations. In the following table these risks related with the hybrid cloud will be presented and
with that possible solution for mitigating those risks will be evaluated.
Risks:
Risk Name Risk Description Possible control for the Risk
Hybrid Cloud Computing_3

3HYBRID CLOUD COMPUTING
Lack of Encryption Due to lack of proper
encryption network
transmission becomes
vulnerable to attack of Man in
the Middle and
eavesdropping (Shabir et al.,
2016).
Reliable type of VPN and
proxy server can be used.
Also, all types of
transmission can be encrypted
using the TLS/SSL server
authentication.
Poor type of Compliance Poor compliance is also a
factor in this case.
Maintaining and
demonstrating compliance
can be problem in hybrid
model. Due diligence factor
become weak for this.
There must be a good
coordination among two
clouds for mitigating the
problem. The coordinated
cloud also needs to meet
industry standards.
Data Leakage Data leakage can occur in the
system due to the improper
security protocols of the
cloud providers (Chou, 2015).
Infrastructure malfunctions
and security breaches need to
be countered. Customer also
need to be responsible for
protecting their data.
DDoS Attack DDoS attack is performed
over the network by sending a
high amount of traffic to the
victim’s computer (Yan &
A DDoS mitigation device is
required in this case for
processing all the incoming
and outgoing traffic. Through
Hybrid Cloud Computing_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents