Project Proposal: Business Cloud Migration Strategy Analysis

Verified

Added on  2022/09/29

|5
|3648
|26
Project
AI Summary
This project proposal focuses on developing effective strategies for business cloud migration, emphasizing the importance of data management and security within the cloud environment. The research aims to explore different cloud migration strategies, including lift and shift, technical, and application migrations, while addressing the challenges associated with data transfer and implementation. The proposal outlines project objectives, research questions, and a comprehensive literature review covering various aspects of cloud computing, including data security, project management strategies, and the impact of cloud migration on business operations. The methodology will involve secondary data collection and quantitative data analysis. The proposal also includes a project schedule, deliverables, and resource allocation, demonstrating a strategic approach to cloud migration projects.
Document Page
Strategy for Business Cloud Migration
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract—This proposal shall emphasize on the use of
different strategies which is required to implement business
cloud migration. Potential management of the data as well as
the overall security features that are associated with the
effectiveness of the business strategies. The effectiveness of
different strategies adopted by business organizations when
they shift their business data from the organizational database
to the cloud servers.
Keywords—Business strategy, Cloud computing, Migration to
the approach
I. INTRODUCTION
The significant focus of this report will adhere the
modern day business strategies which are required for the
implementing cloud service in a business environment. This
report will significantly deal with the overall data,
information as well as the services that are being provided by
the organization. The report will represent a significant
proposal in respect to the research within the field of the
strategies of the project management that intends to migrate
to a cloud computing approach for the potential management
of their business (Glukhov, Ilin & Iliashenko, 2016). This
report will include all the necessary aspects to imply the
cloud based approach within the business to amplify the
business services as well as the consumers associated with it.
The effective migration in this technology are identified to be
useful for the overall management of services by the relevant
organization that is taken into consideration.
A. Aim of the project
The report significantly aims to deliver the stated features
with respect to the migration to the cloud based approach in
respect to any business environment. These are stated
below:
1. To successfully accompany overall aspect of this
technology for providing effective services to the associated
customers.
2. The noteworthy management of the overall services
within the cloud systems thus amplifying the services in
respect to the consumers related with a business
organization.
3. The approach shall examine the business strategy required
for implementing cloud service solutions in a business
environment.
4. Social values will be added if the implementation of the
cloud technologies is done in an organized manner.
B. Objectives of the project
The significant objectives that will be attained after the
completion of the project is sated as follows:
1. Identification of the skills required to deal with the
implementation issues of the cloud solutions is the prime
objective of this proposal.
2. Project management skills required for implementing
cloud solutions is the other expectation from this report.
C. Research Question
What are the different types of strategies used to
shift the organizational data to the cloud servers?
What are the challenges of data transfer to the
cloud servers?
II. LITERATURE REVIEW
According to Chou (2015), selection of cloud computing
strategies can be very much useful for address the
complexities regarding the solutions. The overall impact of
the cloud based approach that will be considered in respect
to the information or credentials that are stored within the
system must imply the overall security so that the third party
unauthorised people cannot access the overall data (Thota et
al., 2018). The principle that are followed in respect to the
interfaces used by the customers that are developed by the
organization to access the data present within the cloud
(Chianese et al., 2017). Moreover, the article also suggests
that the organization may deal with the effective
implementation of the security systems which will intend to
provide the enhanced security to the data or information
present within the cloud approach of the organization.
According to Brandas, Megan & Didraga (2015), is directly
associated with the data which are circulated within the
business environment The effective implementation of the
different cloud based security systems in order to maintain
the effective protection of data is the significant approach in
respect to the overall management of the data (Cleary &
Quinn 2016). The cloud based approach is a well-adapted
strategy regarding the data management or credentials
present with the organization (Hachicha et al., 2016). The
implication of the significant credentials are stated to deal
with the overall data managemt present within the database
of the specified organization (Hashim, Hassan & Hashim,
2015). The article tends to amplify the strategic business
approach that are duly necessary for managing the data
aligned with the database (Brandas, Megan & Didraga,
2015). The cloud computing methodology will tend to serve
the overall products and services alignment that will be
necessary for the important database enrichment (Duncan &
Whittington, 2016).
According to Alharbi (2016), the cloud computing
methodology mainly intends to facilitate the E-Business
strategy of any business. The management of the effective
business services are analysed to be an effective
methodology in respect to the overall analysis of the aspects
that are associated with the primary management of the data
as well as the credentials that are potentially associated with
the organization (Lee et al., 2016). The security of the
services as well as the credentials of the customers are
significant for the data management thus adhering the
concept of the countermeasures in security of this
methodology. The potential management of the data as
management by the organization also intends to effectively
manage the data as associated by the organization thus
ensuring an effective profit to their business (Cesario et al.,
2016). The database server also helps the overall
maintenance of the log as well as manages to maintain the
effective credentials that are associated with the customers.
According to the potential data management linked with this
methodology based approach is depicted to be an important
approach related with overall data management that are
associated with the server of the organization (Alam, Shakil
& Sethi, 2016). The significant analysis of the overall data
maintenance related with the concept of the cloud computing
methodologies are depicted to be important as analysed by
the effective data management within the database server
environment of the organization (Atif, Ding & Jeusfeld,
Document Page
2016). The potential aspects that are comprised by the
company is said to be effective with the data storage of the
different data as associated by the organization. Moreover,
the different types of data security are potentially important
for the management of the data that will enhance the
business processes as associated with the organization.
According to Mourtzis et al., (2016), there are different
categories of cloud migrations strategies which are used by
reputed business organization when they plan to implement
business cloud computing technology in their business
environment such as the lift and shift migration, technical
migration, and application migration. The source and target
of the data are exchanged in an organized manner using the
lift and shift migration policy. None of the current hosting
environment gets affected a result of considering this cloud
migration technique. The investigator of this paper
highlighted that technical migration is one of the most
useful data migration strategies which are used in the
deployment of this technology within the environment of the
business. Visibility of the data can be retained in the first
place if this data migration strategy. On the other hand, the
paper also highlighted that application migration strategy
can be very much useful to migrate the organizational data
from the organizational databases to the cloud servers. But
the paper highlighted that the complications of this cloud
computing strategy is very much complicated as compared
with the other strategies. The investigator of this paper
highlighted that this strategy can be very much useful in
each of the different types of cloud computing services such
as SaaS, it can also be said that this strategy can be very
much useful to implement each of the cloud service types.
As described by Chang, Kuo & Ramachandran, (2016),
internal resistances coming from the employees of a
business is the most significant complexity regarding the
enactment of cloud computing solutions. The paper was
very much useful to understand that a sense of acceptance is
very much desired from each entity of this organization
before and after the enactment of cloud computing
solutions. The investigator of this paper highlighted that a
flexible environment is very much desired in order to enact
this technology in the environment of business. The
significance of collaboration required in a business in order
to implement a cloud computing technology in a business
environment. The paper highlighted that systems
vulnerabilities and the data security issues such as
ransomrware can also have a huge impact on the
effectiveness of using cloud computing solutions. The
investigator of this paper highlighted that user
authentication and contingency plan is the prime solution of
the challenges associated with implementing. The paper was
very much useful to understand that resource management
and cost management plan can be very much to address the
resources required to implement cloud computing
technology.
On the other hand, as discussed by Boubaker et al., (2015),
there are different categories of security issues releted
within the business data that are stored in the servers of the
cloud. Management of the resources required to work on a
long term basis with the cloud computing solutions is the
other challenge associated with the incorporation of cloud
solutions within the environment. The investigators of this
paper highlighted that there different compliance issues
associated with the incorporation of cloud services in a
business environment. Maintaining the challenges of
financial analytics is the other limitations associated with
the enactment of cloud computing solutions in the
environment of business. Management of the multiple cloud
is the other challenge associated with the incorporation of
cloud computing solutions. The investigator of this paper
highlighted that extensive trouble shooting and slow data
migrations are the other challenges associated with the
enactment of the technology. The paper was very much
useful to understand that down time issues is the other
complication associated with the incorporation of cloud
computing in a new environment.
As elaborated by Shyshkina (2018), there are different
categories of project management (PM) strategies which can
be very much useful to implement cloud computing
solutions in a business environment in terms of the
finalizing the project details, setting of clear expectations,
establishment of clear communication, management of the
scope of the project and maintaining the schedule of the
project. The investigator of this paper highlighted that most
of the challenges associated with the enactment of cloud
computing solution can be addressed using the PM
strategies. The paper was very much useful to understand
that creation of a change management plan can be very
much useful to implement the solutions within the business.
The investigators of the paper have successfully highlighted
that the selection of a PM methodology can be very much
useful to address the complexities of the implementation
procedure of cloud computing solutions in a business
environment. The paper highlighted that most of the
challenges associated with the incorporation of a cloud
computing solution. The investigator of this paper
highlighted that managing the project risks is much easier if
there is a contingency plan which can help to address the
complications of the implementation process of cloud
computing solutions. The investigator of this paper
highlighted that a strategic plan is required to improve the
communication between the internal as well as the external
stakeholders of a business. Most of the dependencies of a
project can be addressed in the first place using the PM
strategies. Identification of the resources required to
implement the cloud computing solutions. Tracking the
progress of a project and conflict management is the other
contribution of PM while incorporating make any new
changes in a business environment. The investigator of this
paper helped in understanding that the concept of PM can
also be very much useful to identify the exact resources who
can play a key role to implement cloud computing solutions
in a business environment.
III. RESEARCH METHODOLOGY
The significant methodology that will be potentially deal
with the overall respect to the management of the
implementation procedure. The data collection method
which will be considered in this proposal is the secondary
Document Page
data collection procedure. The data analysis of this proposal
is quantitative data analysis procedure. The sampling
method which will be considered to sample the collected
data is non-probabilistic sampling method.The potential
implementation also deals with the potential management of
the research design that are associated with the fact of
implementation the procedure thus analysing the significant
features associated with the project. The potential data
management technique that are included within the
organization thus adhering the overall aspect of the different
tools as well as the techniques is depicted to be significant
with this technology based approach with the stated
organization (Mohamed et al., 2015). The following unit of
this proposal shall highlight the deliverables required in this
project.
IV. PROJECT DELIVERABLES
The report tends to provide an effective infrastructure of the
methodology approach in a business thus adhering the
concept of the technology which is identified to deal with the
business strategy for the organization that are associated with
an organization. The project deliverable is analysed to be an
effective management of the implemented cloud computing
methodology that will provide an enhanced profit to the
overall business strategy. The potential management of the
overall procedures are analysed to be effective for the
implementation procedure of the cloud computing approach
within a specified organization. The management of the
procedures are provided by the effective Gantt Chart which
is stated below.2 Phas e 1 12 days Tue 20-11-18Wed 05-12-18
3 Understanding the exact requirment
of cloud solutions
1 day Tue
20-11-18
Tue
20-11-18
4 Analysis of the investigation 3 days Wed
21-11-18
Fri 23-11-18
5 Documentation of the project 6 days Mon
26-11-18
Mon
03-12-18
6 Analysis of the documentation 2 days Tue
04-12-18
Wed
05-12-18
7 Phas e 2 12 days Thu 06-12-18Fri 21-12-18
8 Stakeholder identification 3 days Thu
06-12-18
Mon
10-12-18
9 Identification of the risks involved
in the project
5 days Tue
11-12-18
Mon
17-12-18
10 Data backup 4 days Tue
18-12-18
Fri 21-12-18
11 Phas e 3 11 days Sun 23-12-18Fri 04-01-19
12 Selection of cloud service partner
and service provider
5 days Sun
23-12-18
Thu
27-12-18
13 Monitor the entire procedure 6 days Fri 28-12-18 Fri 04-01-19
14 Project closure 0 days Fri 04-01-19 Fri 04-01-19 04-01
V. RESOURCES USED
The resources which might play a key role in order to
identify the exact cloud computing strategy which is
required for any business organization who is looking
forward to incorporate cloud computing solutions to
enhance the reliability of the business data.
Software:
IBM-Unix using Oracle E-Business(12.1.3).(Group
of multiple business)
Separate EBS sample for every country.
Hardware:
P6 virtualization server of IBM, which has a
capacity of hosting 250 virtual servers.
Database Server can log and collect the data
coming from the offshore in to the database and
off-site drive tape is taking daily backups of the
database.
Application server has a power to host a huge
monitoring applications and data reporting and the
end-user can access these using applications on
mobile devices or desktops over the internet.
VI. RECOMMENDATIONS
1. The employee database must also be adhered within
the cloud computing approach so that there exists a
single platform for the potential data management.
2. The proper identification of the data which are
effectively stored must adhere all the security
components that will be comprised of the
organizational database.
VII. CONCLUSION
Thus the overall report states the potential criteria as well as
the effective procedures that are associated with this
technology based approach related with any significant
organization. Selection of cloud strategy has to be aligned
with the products and services provided by the business.
Thus, the prime outcome of this report is that effective
strategies has to be selected in the first place in order to
address the implementation issues of the cloud solutions.
There are different categories of cloud migration strategies
such as the application migration strategy, technical
migration and lift and shift migration which can be
incorporated by business organizations who wants to shift
the business from the organizational database to the cloud
servers. There are different categories of resources which
are required in order to shift the business data from the
organizational databases to the cloud servers such as IBM-
Unix using Oracle E-Business, Database Server and
Application server.
REFERENCES
Alam, M., Shakil, K. A., & Sethi, S. (2016, August).
Analysis and clustering of workload in google
cluster trace based on resource usage. In 2016
IEEE Intl conference on computational science and
engineering (CSE) and IEEE Intl conference on
embedded and ubiquitous computing (EUC) and
15th Intl symposium on distributed computing and
applications for business engineering (DCABES)
(pp. 740-747). IEEE.
Alharbi, F., Atkins, A., Stanier, C., & Al-Buti, H. A. (2016).
Strategic value of cloud computing in healthcare
organisations using the Balanced Scorecard
approach: a case study from a Saudi hospital.
Procedia Computer Science, 98, 332-339.
Atif, Y., Ding, J., & Jeusfeld, M. A. (2016). Internet of
things approach to cloud-based smart car parking.
Procedia Computer Science, 98, 193-198.
Boubaker, S., Gaaloul, W., Graiet, M., & Hadj-Alouane, N.
B. (2015, June). Event-b based approach for
verifying cloud resource allocation in business
process. In 2015 IEEE International Conference on
Services Computing (pp. 538-545). IEEE.
Brandas, C., Megan, O., & Didraga, O. (2015). Global
perspectives on accounting information systems:
mobile and cloud approach. Procedia Economics
and Finance, 20, 88-93.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Brandas, C., Megan, O., & Didraga, O. (2015). Global
perspectives on accounting information systems:
mobile and cloud approach. Procedia Economics
and Finance, 20, 88-93.
Cesario, E., Folino, F., Guarascio, M., & Pontieri, L. (2016,
August). A cloud-based prediction framework for
analyzing business process performances.
In International Conference on Availability,
Reliability, and Security (pp. 63-80). Springer,
Cham.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud
computing adoption framework: A security
framework for business clouds. Future Generation
Computer Systems, 57, 24-41.
Chianese, A., Marulli, F., Piccialli, F., Benedusi, P., & Jung,
J. E. (2017). An associative engines based
approach supporting collaborative analytics in the
internet of cultural things. Future generation
computer systems, 66, 187-198.
Chou, D. C. (2015). Cloud computing risk and audit issues.
Computer Standards & Interfaces, 42, 137-142.
Cleary, P., & Quinn, M. (2016). Intellectual capital and
business performance: An exploratory study of the
impact of cloud-based accounting and finance
infrastructure. Journal of Intellectual
Capital, 17(2), 255-278.
Duncan, R. A. K., & Whittington, M. (2016). Enhancing
cloud security and privacy: the cloud audit
problem. Cloud Computing 2016.
Glukhov, V. V., Ilin, I. V., & Iliashenko, O. J. (2016).
Improving the efficiency of architectural solutions
based on cloud services integration. In Internet of
Things, Smart Spaces, and Next Generation
Networks and Systems (pp. 512-524). Springer,
Cham.
Hachicha, E., Assy, N., Gaaloul, W., & Mendling, J. (2016,
June). A configurable resource allocation for multi-
tenant process development in the cloud. In
International Conference on Advanced Information
Systems Engineering (pp. 558-574). Springer,
Cham.
Hashim, H. S., Hassan, Z. B., & Hashim, A. S. (2015).
Factors influence the adoption of cloud computing:
A comprehensive review. International Journal of
Education and Research, 3(7), 295-306.
Lee, C. K. H., Choy, K. L., Ho, G. T., & Lin, C. (2016). A
cloud‐based responsive replenishment system in a
franchise business model using a fuzzy logic
approach. Expert systems, 33(1), 14-29.
Mohamed, M., Amziani, M., Belaïd, D., Tata, S., & Melliti,
T. (2015). An autonomic approach to manage
elasticity of business processes in the cloud. Future
Generation Computer Systems, 50, 49-61.
Mourtzis, D., Vlachou, E., Milas, N., & Xanthopoulos, N.
(2016). A cloud-based approach for maintenance of
machine tools and equipment based on shop-floor
monitoring. Procedia Cirp, 41, 655-660.
Shyshkina, M. (2018). The hybrid service model of
electronic resources access in the cloud-based
learning environment. arXiv preprint
arXiv:1807.09264.
Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan,
R., & Priyan, M. K. (2018). Centralized fog
computing security platform for IoT and cloud in
healthcare system. In Fog Computing:
Breakthroughs in Research and Practice (pp. 365-
378). IGI global.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]