Cloud Computing Technologies and Applications

Verified

Added on  2020/04/01

|11
|3872
|60
AI Summary
This assignment provides a comprehensive overview of cloud computing. It explores various aspects including core technologies, diverse applications like mobile cloud and IoTs, security concerns, cost-effective resource allocation strategies, and emerging trends. The document highlights the significance of cloud computing in modern computing landscapes and its impact on various industries.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WEBB’S STORES CASE STUDY
Assessment Number:
Webb’s Stores Case Study
Name of the Student:
Student ID:
Student Email:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WEBB’S STORES CASE STUDY
Executive Summary
The objective of this report is to know about the Webb’s Stores case study. Webb’s Stores is a
regional retailer in Australia. Its business is even present in New Zealand. The task of Webb’s
Stores is to mainly sell different food stuffs and some specialty stuffs. The main centers of data
of this company are Melbourne and Sydney. Apart from these main data centers, several
regional data centers of the company are also present. These regional data centers are present
in Brisbane, Bathurst, Port Macquarie, Auckland and Wagga. Webb’s Stores is migrating their
data to IaaS instance from MS SQL Server 2012 R2. The aim of this report is to discuss about the
various techniques of cloud computing for the company. The report also helps to know about
the probable risks of undertaking cloud computing techniques and how to handle these threats
and risks.
Student Name Student ID Page 1
Document Page
WEBB’S STORES CASE STUDY
Table of Contents
Introduction...................................................................................................................................3
Discussion...................................................................................................................................... 3
1. Migration of Data...................................................................................................................3
1.a Type of Security Deployed...............................................................................................3
1.b Benefits and Issues of Deployment..................................................................................4
2. Risks in Migration...................................................................................................................4
2.a The Database................................................................................................................... 4
2.b The IaaS Infrastructure.................................................................................................... 5
2.c The Communications........................................................................................................5
3. Cloud of Backup and Removal of Records..............................................................................5
3.a Risks with Backup of Data................................................................................................5
3.b Cloud Backup in DR Plans.................................................................................................6
4. Protection of Access and Recommendations.........................................................................6
4.a IaaS Infrastructure............................................................................................................6
4.b MS SQL Server 2012 R2 Cloud Instance...........................................................................7
4.c Cloud Network Infrastructure..........................................................................................7
4.d Cloud Backup and Restore Infrastructure........................................................................7
Conclusion..................................................................................................................................... 7
References..................................................................................................................................... 9
Student Name Student ID Page 2
Document Page
WEBB’S STORES CASE STUDY
Introduction
A recognized and renowned regional retailer of Australia is the Webb’s Stores. The main
business of this company is to sell food items. It also sells some of the specialty stuffs. The
company has two original data centers (Arora, Parashar & Transforming, 2013). They are in
Sydney and Melbourne. Apart from these two main data centers, the company even has some
of the regional data centers in Brisbane, Bathurst, Port Macquarie, Auckland and Wagga.
Recently, they have decided to move their database from MS SQL Server 2012 R2 to IaaS
instance. Webb’s Stores have taken a decision of undertaking cloud computing for their
business. The problem with this decision is that the data management, the operational and
application complexities have become much complicated and they are not able to handle them.
They have even decided to close down the regional data center in Auckland because of its
traditional infrastructure (Avram, 2014). They could have easily replaced or updated its existing
infrastructure. All the services and the important data are shifted to the cloud database. A Risk
and Security Workshop is planned to run for accessing the security risks, threats and the
possible control methods, which are need for a hybrid cloud.
The following report covers a detailed discussion on the Webb’s Stores case study. The
report also briefs about the benefits of data migration to cloud IaaS infrastructure. The threats
of data migration to cloud are also provided in the report. The report even describes the use of
cloud in case of removal and backup of the records. The report further helps to understand how
to protect and control the access to the data and services for migration of data. Proper
suggestions and recommendations are given in the following report.
Discussion
1. Migration of Data
1.a Type of Security Deployed
Webb’s Stores have decided to move their database from MS SQL Server 2012 R2 to
IaaS instance. They are worried about the security of their data and services. The type of
security policy that should be deployed is the authentication and authorization policy (Dinh et
al., 2013). Authorization is the permission given to a particular organization or individual for
performing a task or job. Authentication is the process of verification of the identity of an
individual, who will be performing a task. This security policy is extremely important in case of
cloud computing as it provides permission and sanctions the activity to be performed. The open
normative format of data, used for authentication purpose in cloud is the SAML or Security
Assertion Markup Language (Garg, Versteeg & Buyya, 2013). Webb’s stores is moving their data
to IaaS instance. The best IaaS instances the Microsoft Azure and AWS. The data moved to
cloud is bulk in quantity. This type of policy would be helpful for them for protection of their
data and services during migration.
Student Name Student ID Page 3

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WEBB’S STORES CASE STUDY
1.b Benefits and Issues of Deployment
The type of data security policy Webb should take is the authentication and
authorization. Various advantages will be obtained by them due to this deployment. The
benefits are as follows:
i) Security: The first and the foremost thing that comes in mind during data migration is
the security. Cloud computing provides excess security for transferring data (Fernando, Loke &
Rahayu, 2013). Moreover, authorization and authentication policy enables only the sanctioned
and authorized users for accessing data or service.
ii) Cost Effective: Cloud computing is extremely cost effective and does not incur much
cost. This type of policy can be easily maintained with lower price.
iii) Flexibility: This is again an important benefit that can be obtained by this security
policy (Rahimi et al., 2014). The whole system turns out to be flexible after deployment.
iv) Scalability: Authentication and authorization makes the database extremely scalable.
The advantages of this security policy do make it popular enough to be accepted by
several organizations (Arora, Parashar & Transforming, 2013). However, it does have few
disadvantages. The problems that can be faced after the deployment are as follows:
i) Encryption: Encoding any message is a must for authentication and authorization
policy. This can be an issue as there always exists a chance of losing the encryption key.
ii) Complexity: this is another issue that is normally faced after deployment of this policy
(Malawski et al., 2015). The implementation of this policy is complex in nature.
iii) Brute Force Attacks: The most common attack that is faced due to this type of policy
is the brute force attack. The hacker or intruder gets the password by a software and is able to
get all the data.
iv) Storage: The storage of usernames and passwords are hacked easily, the moment
they are authenticated.
2. Risks in Migration
2.a The Database
Security risks are extremely common for migration of data. Webb’s Stores will be
migrating the data and services to cloud from MS SQL Server R2 database to IaaS instance
(Botta et al., 2016). This new database can have various risks. The threats that are common for
database are as follows:
i) Loss of Data: This is the most significant threat for migration of data. The data can be
lost when it is transferred to another database (Li et al., 2013). Moreover, there is a chance that
the data cannot be recovered, which is extremely harmful for the company.
Student Name Student ID Page 4
Document Page
WEBB’S STORES CASE STUDY
ii) Database Corruption: This is the second most significant risk during data migration.
The entire database can get corrupted and cannot be recovered.
2.b The IaaS Infrastructure
Threats and risks are also common for the infrastructure of the cloud, which is the IaaS.
The threats are as follows:
i) Denial of Service Attacks: This is the most significant threat that occurs in the
infrastructure during data migration. When a user uses the resources of the cloud, the overall
quality of the services that are used by other users, gets degraded (Almorsy, Grundy & Müller,
2016). The intruders utilize this opportunity and get all the resources for denying or slowing
down the services. The attack is known as the denial of service or DoS attack.
ii) Insider Threats: During migration of data, the infrastructure enables the
administrator for accessing the data and the database. This type of risk is known as the insider
threat.
2.c The Communications
The communications between the IaaS instance and Webb’s Stores can attract various
threats and risks. The risks are as follows:
i) Breaching of Data: Breaching of data is extremely common when migration is done (Li
et al., 2013). The moment IaaS and Webb’s Stores communicates with each other, this type of
risk occurs.
ii) Incompatible Database: The second most significant threat is the incompatibility of
database. It must be compatible to avoid all types of threats while communication.
3. Cloud of Backup and Removal of Records
3.a Risks with Backup of Data
i) Backup: Periodical backup is extremely needed for any company. Although, there are
some risks that are common during the backup of data (Malawski et al., 2015). The risks are as
follows:
Security: Lack of security can be vulnerable during backup of data. Often data is lost
during this backup.
Control over Data: During backup of data, the cloud provider obtains the total control
and access of the data. There is always a chance that the data can be intercepted.
ii) Storing of Data: Data is normally stored in the cloud storage. Webb’s stores might
face various threats during this storage of data (Xiao, Song & Chen, 2013). They are as follows:
Security: Security is the most significant threat during data storing. Often data is lost
during this phenomenon.
Student Name Student ID Page 5
Document Page
WEBB’S STORES CASE STUDY
Lack of Standardization: The cloud vendor never follow a normal set of protocols or
rules for supporting their business (Xiao, Song & Chen, 2013). The selection of the vendors
should be done carefully by Webb’s Stores.
iii) Data Retrieval: Several risks are even common during retrieval of data. They are as
follows:
Snooping: The intruder can always snoop into the data, the moment it is retrieved from
the cloud (Almorsy, Grundy & Müller, 2016). This is extremely dangerous for confidential data.
Leakage of Data: Leakage of data is the most significant risk during data retrieval.
Webb’s Stores should be careful during their retrieval especially because they are using public
cloud.
3.b Cloud Backup in DR Plans
Cloud DR Plan or disaster recovery is a strategy for any type of backup and recovery of
data that is utilized for storing and maintaining of records (Whaiduzzaman et al., 2014). These
are stored for security issues. The most important task is done by the cloud backup. The DR
plan will simplify the overall procedure of data migration. Only the storage is needed to be
transferred. This will in case migrate the entire the data with that particular storage (Xiao, Song
& Chen, 2013). The benefit that Webb’s Stores will be getting is that the entire data will have a
copy that is sent to the offsite server by a public network.
The major benefit of backup and restore strategy is the easy and simple backing up of
data. The whole system of the database of Webb’s Stores will be altered with this strategy
(Rahimi et al., 2014). The second benefit is that if any data is lost during migration, it can be
quickly and easily recovered. Therefore, the cloud recovery plan is extremely helpful for Webb’s
Stores.
4. Protection of Access and Recommendations
Access is the most important security factor. Everyone should not have the access to all
the data and services. The authorized and authenticated users should be allowed to access the
data and services of Webb’s Stores.
4.a IaaS Infrastructure
The IaaS infrastructure should not be accessed by everyone. Two significant methods
are mentioned below for protection of access to the IaaS infrastructure. They are as follows:
i) Physical Access to Infrastructure: The physical access should be protected and
secured so that there exists no loopholes in the security (Wei et al., 2014). This will prevent the
unauthorized users to access the infrastructure and thus it can be protected.
ii) Access via API: Unauthorized use of API should be stopped and mitigated for Webb’s
Stores (Sanaei et al., 2014). It is recommended that they should check and stop this type of
access on an immediate basis.
Student Name Student ID Page 6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WEBB’S STORES CASE STUDY
4.b MS SQL Server 2012 R2 Cloud Instance
The overall access to the previous database, which is the MS SQL Server 2012 R2 can be
protected by some methods (Rahimi et al., 2014). Two suggested methods are as follows:
i) Physical Access: The physical access should be protected and secured so that there
exists no loopholes in the security of the components of hardware and server.
ii) Operating system Access: Webb’s Stores should be strict about their access to the
operating system (Rittinghouse & Ransome, 2016). Firewalls might protect their operating
system easily.
4.c Cloud Network Infrastructure
Webb’s Stores should protect and control their access to the cloud network
infrastructure. Two recommendations are provided for controlling the access to the cloud
network infrastructure. They are as follows:
i) External and Internal Threats: Cloud network infrastructure always have the risk from
external and internal threats (Sanaei et al., 2014). Webb’s stores should be careful about their
security of cloud network infrastructure.
ii) Server Monitoring: Webb’s Stores should monitor their server regularly so that the
access is controlled (Tao et al., 2014). This can protect the access of the cloud network
infrastructure.
4.d Cloud Backup and Restore Infrastructure
Webb’s Stores should protect and control the access of the backup and restoration
infrastructure. Two suggestions that can help Webb’s Stores in this phenomenon are as follows:
i) Encryption: Encryption is the procedure of hiding a confidential data or information in
such a way so that it does not get stolen by intruder (Hashem et al., 2015). It encrypts the data
into a cipher text and only the authorized receiver is able to access that data. Webb’s Stores
should opt for encryption for protection of access to the backup and restore infrastructure.
ii) Passwords: Passwords can protect any system from hackers and intruders. Webb’s
Stores should protect their cloud backup and restore infrastructure by applying password
protection to it (Botta et al., 2016). It is recommended that the password should be biometric
authenticated.
The above mentioned recommendations will be extremely helpful for the Board of
Webb’s Stores for migration of data.
Conclusion
Therefore, from the above report it can concluded that, a recognized and renowned
regional retailer of Australia is the Webb’s Stores. The main business of this company is to sell
food items. It also sells some of the specialty stuffs. The company has two original data centers.
They are in Sydney and Melbourne. Apart from these two main data centers, the company even
Student Name Student ID Page 7
Document Page
WEBB’S STORES CASE STUDY
has some of the regional data centers in Brisbane, Bathurst, Port Macquarie, Auckland and
Wagga. Recently, they have decided to move their database from MS SQL Server 2012 R2 to
IaaS instance. Webb’s Stores have taken a decision of undertaking cloud computing for their
business. The problem with this decision is that the data management, the operational and
application complexities have become much complicated and they are not able to handle them.
They have even decided to close down the regional data center in Auckland because of its
traditional infrastructure. They could have easily replaced or updated its existing infrastructure.
All the services and the important data are shifted to the cloud database. A Risk and Security
Workshop is planned to run for accessing the security risks, threats and the possible control
methods, which are need for a hybrid cloud. The above report covers a detailed discussion on
the Webb’s Stores case study. The report also briefs about the benefits of data migration to
cloud IaaS infrastructure. The type of security policy that should be deployed is the
authentication and authorization policy. The various threats of data migration to cloud are also
provided in the report. The report even describes the use of cloud in case of removal and
backup of the records. The report further helps to understand how to protect and control the
access to the data and services for migration of data. Proper suggestions and recommendations
are given in the following report. Migration of data from MS SQL Server R2 database to any IaaS
instance would be extremely helpful for the company.
Student Name Student ID Page 8
Document Page
WEBB’S STORES CASE STUDY
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future
generation computer systems, 29(1), 84-106.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing
services. Future Generation Computer Systems, 29(4), 1012-1023.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of
“big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of
security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal
health records in cloud computing using attribute-based encryption. IEEE transactions
on parallel and distributed systems, 24(1), 131-143.
Malawski, M., Juve, G., Deelman, E., & Nabrzyski, J. (2015). Algorithms for cost-and deadline-
constrained provisioning for scientific workflow ensembles in IaaS clouds. Future
Generation Computer Systems, 48, 1-18.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile
cloud computing: A survey, state of art and future directions. Mobile Networks and
Applications, 19(2), 133-143.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management,
and security. CRC press.
Student Name Student ID Page 9

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WEBB’S STORES CASE STUDY
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing:
taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-
392.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and
internet of things-based cloud manufacturing service system. IEEE Transactions on
Industrial Informatics, 10(2), 1435-1442.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and
privacy for storage and computation in cloud computing. Information Sciences, 258,
371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud
computing. Journal of Network and Computer Applications, 40, 325-344.
Xiao, Z., Song, W., & Chen, Q. (2013). Dynamic resource allocation using virtual machines for
cloud computing environment. IEEE transactions on parallel and distributed
systems, 24(6), 1107-1117.
Student Name Student ID Page 10
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]