Cloud Infrastructure: Limitations and Vulnerabilities
Verified
Added on  2023/02/01
|11
|2381
|87
AI Summary
This report discusses the concept of cloud infrastructure and highlights the limitations and vulnerabilities of different cloud infrastructure models. It covers SaaS, PaaS, and IaaS models and their respective limitations and vulnerabilities.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION TECHNOLOGY MANAGEMENT Information Technology Management April 23 2019
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INFORMATION TECHNOLOGY MANAGEMENT 1 Table of Contents Introduction................................................................................................................................2 Cloud Infrastructure...............................................................................................................2 SaaS - Software as a Service..................................................................................................3 Limitations of SaaS............................................................................................................3 Vulnerabilities of SaaS.......................................................................................................4 PaaS - Platform as a Service..................................................................................................4 Limitations of PaaS............................................................................................................4 Vulnerability of PaaS.........................................................................................................5 IaaS – Infrastructure as a Service...........................................................................................5 Limitations of IaaS.............................................................................................................6 Vulnerability of IaaS..........................................................................................................6 Conclusion..................................................................................................................................7 References..................................................................................................................................9
INFORMATION TECHNOLOGY MANAGEMENT 2 Introduction Thetermcloudisusedtorefertoaccessingacomputer,softwareapplication,and information technology (IT), with the connected network, frequently by retrieving data centers with the help of internet connectivity and WAN i.e. wide area networking. Around everyresourceofinformationtechnologycanliveinthecloud:aservice,orentire infrastructure, application or a software program. For instance, if a company desire to create an infrastructure of Information technology, generally it will install the software, networking, and services it needed; however, all these resources and services are today accessible through third parties who are present in the market for offering cloud (SDX Central, 2019). The intent of this report is to discuss the concept of cloud infrastructure. In addition to this, it is highlighting the limitations and vulnerabilities of different cloud infrastructure models. Cloud Infrastructure Cloud infrastructure is said to be a virtual infrastructure that is distributed or retrieved through the internet or network. It is generally called as the on-demand products or services that are being delivered by the models regarded as IaaS i.e. infrastructure as a service, which is one of the fundamental cloud computing models. It is a completely automated service where resources of computing supplemented with networking and storage services are offered to the client (Wang, Ranjan and Chen, 2017). In core, clients have an Information Technology infrastructure that could be used without paying for the physical infrastructure construction. Cloud computing is said to be based on the service model which is categorized into three key models: SaaS – Software as a Service
INFORMATION TECHNOLOGY MANAGEMENT 3 PaaS – Platform as a Service IaaS – Infrastructure as a Service (Safari, 2019) SaaS - Software as a Service It is a model for software distribution where users make use of software over the Internet. In SaaS, the service provider masses the files at the data center and a consumer gets its access through a standard web browser. Limitations of SaaS Interoperability– It is said to be the first complications which result in holding back the decision of adopting the cloud. Business requires concurrent interoperability between the application of SaaS and different applications in other areas like private clouds. Building cloud integration hubs is as same as internal integrations (Agile IT, 2017). Decreased support for integration– The key driver for the growth of SaaS is how properly applications unified with each other. Integrating application of cloud with on-premises systems can represent a lot of support issues. In this case, the data is mined, interpreted and then loaded from one system to a different system. These types of operations highlight higher risk of security than on-premises integration. The procedure of integration is also considered to be very time consuming which weakens from a few of the basic benefits of a cloud file server migration (Messmer, 2010). Data Exchange– Data exchange between systems could be awkward and inexact. Enhancing the procedure of exchanging the data comprises understanding the current issues, determining the data that has to be exchanged, scheming a data alteration and integration solution, finishing the operation and testing the outcomes. Exchange of data looks like one of the simple procedure, but it is boring and demanding.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
INFORMATION TECHNOLOGY MANAGEMENT 4 Vulnerabilities of SaaS Instability– Stability and security are said to be the true pillars that support in establishing reliable SaaS Software. The services today becoming very famous that is also called as the double-edged sword. On one side, it offers a number of options for the customers and services of high quality because it enforces each provider to maintain the competitive edge. However, on the other side, everyone will not be capable to sustain with the developing market. And it can result in shutting down of the employed provide due to incapability to compete in the market. Lack of Transparency– SaaS providers are mostly private and promise their customers they can properly secure their data in comparison to other providers. In the end, they also guarantee that they have the capability to secure files and information more adeptly. However, there is a number of issues in the context of the lack of transparency of providers on how their complete security protocol is being managed. Inappropriately, it raises the points for debate. The lack of transparency can also result in distrust in the mind of clients. PaaS - Platform as a Service Platform as a service is said to be the notion that defines the platform of computing which is deliveredorrentedastheintegratedsolution,solutionpileorserviceviainternet connectivity. PaaS is developed from SaaS, which makes use of the internet in order to host the applications of software. Limitations of PaaS Vendor Lock-in– The general disapproval of PaaS is vendor lock-in. Clients of PaaS are placed at the mercy of the service provider at the time of increasing prices, unwelcoming changes in the technology and changes in the direction of the provider which even require rewriting the complete application.
INFORMATION TECHNOLOGY MANAGEMENT 5 Runtime Limitations- PaaS runtimes are augmented for a precise set of frameworks and language. TheGoogle App Engine just supports Java, Go, and Python. On the other side, Cloud Foundry supports Ruby, Node.js, and Java.Because there is restricted entry to the operating system, even if the designed framework of language programming is supported, changes can be identified by analyzing the limitations: There is a possibility that the desired framework version and runtime may or may not be available (Monroy, 2012) It is possible that the client is not able to install the libraries that are needed. Vulnerability of PaaS Default Application Configurations– While operating an application on the infrastructure of the cloud, the chances that the application is protected in its evasion outline are perhaps zero. Therefore, making alterations in the installation of the default application will be the key security mitigation that needs to be performed. SSL Protocol and implementation flaws– Another bigger threat to the users of PaaS is SSL-based attacks. SSL is the reinforcements of many of the "security" that is used in the cloud and, in that case, the Internet is normal. The present emphasis of the community of hacking on breaking SSL will be a key exploit course in the coming time duration (Cox. 2019). Insecure permissions on cloud data– The thirst key threat that the users of PaaS have to deal with is assuring the proper consents on data kept in the cloud. IaaS – Infrastructure as a Service IaaS is the Infrastructure as a service is said to be a prompt infrastructure of computing, provisioned and accomplished over the internet. Classically, the providers of IaaS are servers,
INFORMATION TECHNOLOGY MANAGEMENT 8 be considered by the clients while implementing the models into the system. The limitations of SaaS are Interoperability and decreased support for integration. The limitations of PaaS are Vendor Lock-in and runtime limitation. Besides this, the limitation of IaaS is the requirement of internet connectivity and restricts customization and user-privacy.
INFORMATION TECHNOLOGY MANAGEMENT 9 References Agile IT (2017)5 SaaS Limitations That Could Derail Your Cloud Migration[online]. Availablefromhttps://www.agileit.com/news/saas-limitations-file-server-migration/ [accessed 23 April 2019] Aguado, D., Andersen, T., and Avetisyan, A. (2016)A Practical Approach to Cloud IaaS with IBM SoftLayer: Presentations Guide1sted. U.S: IBM Redbooks. Altmann,J.,andRana,O.F.(2010)ComputerCommunicationNetworksand Telecommunications1sted. Germany: Springer Science & Business Media. BarryandAssociations(2019)ServiceArchitecture[online].Availablefrom https://www.service-architecture.com/articles/cloud-computing/infrastructure_as_a_service_i aas.html[accessed 23 April 2019] Cox. P. (2019)Top threats in a PaaS cloud service and how to avoid them[online]. Available fromhttps://searchcloudcomputing.techtarget.com/tip/Top-threats-in-a-PaaS-cloud-service- and-how-to-avoid-them[accessed 23 April 2019] E-Security Planet (2017)IaaS Security: Threats and Protection Methodologies[online]. Available fromhttps://www.esecurityplanet.com/network-security/iaas-security-threats-and- protection-methodologies.html[accessed 23 April 2019] Economics of Grids, Clouds, Systems, and Services: 7th International Workshop, GECON 2010, Ischia, Italy, August 31, 2010, Proceedings
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
INFORMATION TECHNOLOGY MANAGEMENT 10 Messmer, E. (2010)Limitations of software-as-a-service highlighted at Gartner ITxpo [online].Availablefromhttps://www.networkworld.com/article/2192283/limitations-of- software-as-a-service-highlighted-at-gartner-itxpo.html[accessed 23 April 2019] Monroy,G.(2012)UnderstandingPaaSLimitations[online].Availablefrom http://www.itbriefcase.net/understanding-paas-limitations[accessed 23 April 2019] Safari(2019)CloudInfrastructureModels[online].Availablefrom https://www.oreilly.com/library/view/cloud-application-architectures/9780596157647/ ch01s04.html[accessed 23 April 2019] SDX Central (2019) What is the Cloud? – Definition SDXCentral(2019)WhatistheCloud?–Definition[online].Availablefrom https://www.sdxcentral.com/cloud/definitions/what-is-cloud/[accessed 23 April 2019] SSHCommunicationSecurity(2018)IAAS&SECURITY[online].Availablefrom https://www.ssh.com/cloud/iaas/[accessed 23 April 2019] Wang, L., Ranjan, R., and Chen, J. (2017)Cloud Computing: Methodology, Systems, and Applications2nded. U.S: CRC Press.