CLBE 304: Comprehensive Analysis of Cloud Computing Content (11 Weeks)
VerifiedAdded on 2022/03/12
|10
|3427
|21
Report
AI Summary
This report provides a detailed analysis of the cloud computing content covered over 11 weeks in a CLBE 304 course. The report begins with an introduction to cloud computing and its importance, followed by an analysis of each week's content. Week 1 focuses on the significance of cloud computing, while Week 2 explores cloud service architectures (SaaS, PaaS, IaaS). Week 3 delves into hybrid cloud models, and Week 4 examines cloud architecture. Week 5 addresses cloud computing concepts, architecture, and challenges, while Week 6 discusses privacy and security. Week 7 covers cloud risk management, and Week 8 focuses on business cloud migration. The report highlights key concepts, real-world examples, and outcomes from each week, including cloud models, security concerns, and risk management strategies. The analysis covers cloud services, security, architecture, and the challenges and benefits of cloud adoption, concluding with an overview of the key takeaways from the course.

CLBE 304 Assesment-3
Cloud Computing – 11 Weeks Content Analysis
Submitted By:
Submitted To:
Roll No:
Cloud Computing – 11 Weeks Content Analysis
Submitted By:
Submitted To:
Roll No:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Contents
Introduction.................................................................................................................................................4
Week 1........................................................................................................................................................4
Description..............................................................................................................................................4
Analysis....................................................................................................................................................4
Outcomes................................................................................................................................................4
Week 2........................................................................................................................................................4
Description..............................................................................................................................................4
Analysis....................................................................................................................................................5
Outcomes................................................................................................................................................5
Week 3........................................................................................................................................................5
Description..............................................................................................................................................5
Analysis....................................................................................................................................................5
Outcomes................................................................................................................................................5
Week 4........................................................................................................................................................5
Description..............................................................................................................................................5
Analysis....................................................................................................................................................6
Outcomes................................................................................................................................................6
Week 5........................................................................................................................................................6
Description..............................................................................................................................................6
Analysis....................................................................................................................................................6
Outcomes................................................................................................................................................6
Week 6........................................................................................................................................................7
Description..............................................................................................................................................7
Analysis....................................................................................................................................................7
Outcomes................................................................................................................................................7
Week 7........................................................................................................................................................7
Description..............................................................................................................................................7
Analysis....................................................................................................................................................7
Outcomes................................................................................................................................................7
Week 8........................................................................................................................................................8
Description..............................................................................................................................................8
Analysis....................................................................................................................................................8
Introduction.................................................................................................................................................4
Week 1........................................................................................................................................................4
Description..............................................................................................................................................4
Analysis....................................................................................................................................................4
Outcomes................................................................................................................................................4
Week 2........................................................................................................................................................4
Description..............................................................................................................................................4
Analysis....................................................................................................................................................5
Outcomes................................................................................................................................................5
Week 3........................................................................................................................................................5
Description..............................................................................................................................................5
Analysis....................................................................................................................................................5
Outcomes................................................................................................................................................5
Week 4........................................................................................................................................................5
Description..............................................................................................................................................5
Analysis....................................................................................................................................................6
Outcomes................................................................................................................................................6
Week 5........................................................................................................................................................6
Description..............................................................................................................................................6
Analysis....................................................................................................................................................6
Outcomes................................................................................................................................................6
Week 6........................................................................................................................................................7
Description..............................................................................................................................................7
Analysis....................................................................................................................................................7
Outcomes................................................................................................................................................7
Week 7........................................................................................................................................................7
Description..............................................................................................................................................7
Analysis....................................................................................................................................................7
Outcomes................................................................................................................................................7
Week 8........................................................................................................................................................8
Description..............................................................................................................................................8
Analysis....................................................................................................................................................8

Outcomes................................................................................................................................................8
Week 9........................................................................................................................................................8
Description..............................................................................................................................................8
Analysis....................................................................................................................................................8
Outcomes................................................................................................................................................8
Week 10......................................................................................................................................................9
Description..............................................................................................................................................9
Analysis....................................................................................................................................................9
Outcomes................................................................................................................................................9
Week 11......................................................................................................................................................9
Description..............................................................................................................................................9
Analysis....................................................................................................................................................9
Outcomes................................................................................................................................................9
Conclusion...................................................................................................................................................9
References.................................................................................................................................................10
Week 9........................................................................................................................................................8
Description..............................................................................................................................................8
Analysis....................................................................................................................................................8
Outcomes................................................................................................................................................8
Week 10......................................................................................................................................................9
Description..............................................................................................................................................9
Analysis....................................................................................................................................................9
Outcomes................................................................................................................................................9
Week 11......................................................................................................................................................9
Description..............................................................................................................................................9
Analysis....................................................................................................................................................9
Outcomes................................................................................................................................................9
Conclusion...................................................................................................................................................9
References.................................................................................................................................................10

Introduction
Cloud computing and cloud storage had already sparked a huge interest around the globe, and then all
organizations require cloud services to function and sustain their operations. Cloud computing is indeed
the distribution of computer resources over the internet, including such as software, servers, memory,
databases, and networks.Cloud computing has now become a requirement for the majority of
businesses worldwide. Formerly, due to regulatory limits, banks and other financial organizations were
not able to relocate client information to the cloud. Non-customer info, on the other hand, is being
rapidly moved to the cloud. The cloud could be open or confidential, depending on the classification.
The public cloud is open to all, and anybody can purchase it, whereas the private cloud is a closed
system that only a few individuals have access to. Cloud computing provides speedier services and more
resources flexibility. Because you only invest for the cloud storage you use, your maintenance costs are
reduced, allowing your system to operate more efficiently. Minimal expenses, speed, worldwide
expansion, profitability, and effectiveness are just a few of the benefits of cloud computing.
Week 1
Description
The first week of the class is focused to explaining why the cloud is so important in today's environment.
Cloud computing refers to a collection of computer networks that give customers almost unlimited
access to computer processing, information management, telecommunications, and set of programs.
(Concepts of Cloud Computing and Protection of Data in Cloud Computing, 2019). Another
cloud notion is ramping, which is described as a resource's capacity to withstand expanding or declining
consumption needs.
Analysis
What really is cloud computing, the multiple cloud model properties, software as a service,
infrastructure as a service, and cloud deployment models were the most relevant and essential material
in this content. In real-world cloud and cloud computing scenarios, we can also use a range of theories.
When it comes to cloud computing, it’s very vast term that refers to a wide range of use cases and
implementation methods(Kollolu, 2020). Organizations which have been providing their consumers
with fundamental computing, networking, and storage capabilities are among the real-world examples
we can use.
Outcomes
I discovered that cloud computing is a widespread term which refers to the supply of numerous
computing services in the internet, inclusion of hosts, memory, databases, connectivity, application,
analysis, and intelligence. I've learned about cloud services' advantages, such as enabling company
agility and lowering capital costs. I came to know about different qualities of the cloud, as well as what
functions it performs in societal structure and what its limits seem to be.
Week 2
Description
The second week of the program introduced me to cloud service architectures. There are three types of
cloud services: platform as a service (PaaS), infrastructure as a service (IaaS) and software as a service
(SaaS). SaaS technology is a business strategy that allows customers to use and rent programs from a
Cloud computing and cloud storage had already sparked a huge interest around the globe, and then all
organizations require cloud services to function and sustain their operations. Cloud computing is indeed
the distribution of computer resources over the internet, including such as software, servers, memory,
databases, and networks.Cloud computing has now become a requirement for the majority of
businesses worldwide. Formerly, due to regulatory limits, banks and other financial organizations were
not able to relocate client information to the cloud. Non-customer info, on the other hand, is being
rapidly moved to the cloud. The cloud could be open or confidential, depending on the classification.
The public cloud is open to all, and anybody can purchase it, whereas the private cloud is a closed
system that only a few individuals have access to. Cloud computing provides speedier services and more
resources flexibility. Because you only invest for the cloud storage you use, your maintenance costs are
reduced, allowing your system to operate more efficiently. Minimal expenses, speed, worldwide
expansion, profitability, and effectiveness are just a few of the benefits of cloud computing.
Week 1
Description
The first week of the class is focused to explaining why the cloud is so important in today's environment.
Cloud computing refers to a collection of computer networks that give customers almost unlimited
access to computer processing, information management, telecommunications, and set of programs.
(Concepts of Cloud Computing and Protection of Data in Cloud Computing, 2019). Another
cloud notion is ramping, which is described as a resource's capacity to withstand expanding or declining
consumption needs.
Analysis
What really is cloud computing, the multiple cloud model properties, software as a service,
infrastructure as a service, and cloud deployment models were the most relevant and essential material
in this content. In real-world cloud and cloud computing scenarios, we can also use a range of theories.
When it comes to cloud computing, it’s very vast term that refers to a wide range of use cases and
implementation methods(Kollolu, 2020). Organizations which have been providing their consumers
with fundamental computing, networking, and storage capabilities are among the real-world examples
we can use.
Outcomes
I discovered that cloud computing is a widespread term which refers to the supply of numerous
computing services in the internet, inclusion of hosts, memory, databases, connectivity, application,
analysis, and intelligence. I've learned about cloud services' advantages, such as enabling company
agility and lowering capital costs. I came to know about different qualities of the cloud, as well as what
functions it performs in societal structure and what its limits seem to be.
Week 2
Description
The second week of the program introduced me to cloud service architectures. There are three types of
cloud services: platform as a service (PaaS), infrastructure as a service (IaaS) and software as a service
(SaaS). SaaS technology is a business strategy that allows customers to use and rent programs from a
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

provider without having to install them on their own computers(B. and D., 2018). PaaS technology, on
either hand, creates conditions or platform in which developers may create systems and programs, and
IaaS technology, on the other hand, offers a virtual infrastructure including raw hardware that can be
produced, maintained, and removed.
Analysis
The most essential components of this issue are the models of cloud, the different types of cloud
services, and the possible attacks in cloud computing service delivery models. We've also used cloud
service models in the real world. One of the real-life examples is Google Apps, which is a frequently used
program by individuals around the globe. People utilize Google maps if they are unable to access their
location, and it has improved people's lives easier.
Outcomes
Several of the primary cloud deployment models, I've observed, has a lot of security problems. Cloud
security is a problem, and SaaS security is an issue. Users may have some liberty to build programs on
top of the platform because the provider permits it; it is much more extendable than SaaS although at
the expense of customer-ready capabilities; but it is far more flexible over SaaS. Security problems in
IaaS include malfunctioning, changes in visibility, restricting data intrusions, and cloud email.
Week 3
Description
As opposed to the previous week, which focused on models of cloud services, later this week's focus was
solely on hybrid cloud models. A hybrid cloud is a concept in which the benefits of private cloud services
are blended with those of public cloud services. The purpose of this hybrid cloud is to provide a
standardized and controlled computing environment that combines data and services.
Analysis
The Hybrid cloud, cloud interface, workings of BPaas in the real world of cloud computing, and the
prerequisites for cloud - based solutions were the most useful aspects of this course. Cloud integration is
a set of tools and technology that integrates numerous systems, applications, and IT environments in
order to allow for real-time data and process interchange(Khan, 2016). cloud. Microsoft Azure is an
illustration of hybrid cloud in real life situations that companies and organizations have really been
adopting to thrive in their new ventures.
Outcomes
While taking this course, I realized that the phrase "hybrid cloud" is a misrepresentation because it
refers to a hybrid cloud that includes a dual private and accessible cloud. The main properties of cloud
computing's service orientation, such as versatility, recyclability, and adaptability, were also taught to
me. Account holders, efficiency, and privacy are just simply few of the essential skills in cloud - based
deployment management.
Week 4
Description
The structure of the cloud was explored this week. According to the terminology, it is the practice of
pursuing new levels of efficiency in service delivery, culminating in a lucrative prospect for IT firms.
either hand, creates conditions or platform in which developers may create systems and programs, and
IaaS technology, on the other hand, offers a virtual infrastructure including raw hardware that can be
produced, maintained, and removed.
Analysis
The most essential components of this issue are the models of cloud, the different types of cloud
services, and the possible attacks in cloud computing service delivery models. We've also used cloud
service models in the real world. One of the real-life examples is Google Apps, which is a frequently used
program by individuals around the globe. People utilize Google maps if they are unable to access their
location, and it has improved people's lives easier.
Outcomes
Several of the primary cloud deployment models, I've observed, has a lot of security problems. Cloud
security is a problem, and SaaS security is an issue. Users may have some liberty to build programs on
top of the platform because the provider permits it; it is much more extendable than SaaS although at
the expense of customer-ready capabilities; but it is far more flexible over SaaS. Security problems in
IaaS include malfunctioning, changes in visibility, restricting data intrusions, and cloud email.
Week 3
Description
As opposed to the previous week, which focused on models of cloud services, later this week's focus was
solely on hybrid cloud models. A hybrid cloud is a concept in which the benefits of private cloud services
are blended with those of public cloud services. The purpose of this hybrid cloud is to provide a
standardized and controlled computing environment that combines data and services.
Analysis
The Hybrid cloud, cloud interface, workings of BPaas in the real world of cloud computing, and the
prerequisites for cloud - based solutions were the most useful aspects of this course. Cloud integration is
a set of tools and technology that integrates numerous systems, applications, and IT environments in
order to allow for real-time data and process interchange(Khan, 2016). cloud. Microsoft Azure is an
illustration of hybrid cloud in real life situations that companies and organizations have really been
adopting to thrive in their new ventures.
Outcomes
While taking this course, I realized that the phrase "hybrid cloud" is a misrepresentation because it
refers to a hybrid cloud that includes a dual private and accessible cloud. The main properties of cloud
computing's service orientation, such as versatility, recyclability, and adaptability, were also taught to
me. Account holders, efficiency, and privacy are just simply few of the essential skills in cloud - based
deployment management.
Week 4
Description
The structure of the cloud was explored this week. According to the terminology, it is the practice of
pursuing new levels of efficiency in service delivery, culminating in a lucrative prospect for IT firms.

Cloud architecture has been discovered to be capable of handling some of the most difficult parts of
large-scale data processing.
Analysis
The specification of cloud environments, which could include several of distinct clouds, and
private/hybrid clouds, heterogeneous clouds is the most important part of this topic. The relevance of
cloud formations is also highlighted.In terms of actual settings, one instance is the IBM cloud, which
allows enterprises to utilize virtualized IT assets and has done so in the past(Hariram and Arramraju,
2016). Another instance is Oracle, which is utilized by both students and organizations for academic
reasons.
Outcomes
I learned from this unit that cloud designs handle fundamental challenges in large-scale data handling.
The apps developed on cloud architectures execute in the cloud, while the infrastructure's specific
presence is with the operator. Cloud designs include a variety of business benefits, including minimal
upfront infrastructure spending, just-in-time architecture, more effective resource consumption, usage-
based costing, and the ability to reduce time consumption, to name a few.I also got to learnt about
several forms of cloud architecture and discovered that each design has its own set of features and
functions.
Week 5
Description
The fifth week focused on cloud computing's idea, architecture, and problems. Cloud computing's main
goal is to make better use of resource sharing by integrating them for increased production and
resolving large-scale calculation problems(Hutson, 2019).
Analysis
Companies have faced numerous problems while deploying cloud computing in real-world applications.
According to the results of the poll, roughly 77 percent of respondents are concerned about security in
cloud computing. Organizations are not always possible to forecast all expenses and quantities. When
data is transported there, it must adhere to industry standards and legislation.The key advantages of
using cloud services, according to the findings, include integrating systems and software, improving
communication and collaboration amongst users, and increasing user performance. The key obstacles to
adoption, on the other hand, are the availability of electricity, the expense of internet access, the quality
of communication networks, and the pace of the online connection.
Outcomes
I now understand that the greatest obstacle to cloud computing is information data security. Encryption,
security hardware, and security software can all be used to address security and privacy concerns.
Several ways are recommended to address these difficulties, including selecting the appropriate
technology strategy for efficient and appropriate use, performing regular and routine inspections and
backups, and managing infrastructure as effectively and efficiently as feasible as needed.
large-scale data processing.
Analysis
The specification of cloud environments, which could include several of distinct clouds, and
private/hybrid clouds, heterogeneous clouds is the most important part of this topic. The relevance of
cloud formations is also highlighted.In terms of actual settings, one instance is the IBM cloud, which
allows enterprises to utilize virtualized IT assets and has done so in the past(Hariram and Arramraju,
2016). Another instance is Oracle, which is utilized by both students and organizations for academic
reasons.
Outcomes
I learned from this unit that cloud designs handle fundamental challenges in large-scale data handling.
The apps developed on cloud architectures execute in the cloud, while the infrastructure's specific
presence is with the operator. Cloud designs include a variety of business benefits, including minimal
upfront infrastructure spending, just-in-time architecture, more effective resource consumption, usage-
based costing, and the ability to reduce time consumption, to name a few.I also got to learnt about
several forms of cloud architecture and discovered that each design has its own set of features and
functions.
Week 5
Description
The fifth week focused on cloud computing's idea, architecture, and problems. Cloud computing's main
goal is to make better use of resource sharing by integrating them for increased production and
resolving large-scale calculation problems(Hutson, 2019).
Analysis
Companies have faced numerous problems while deploying cloud computing in real-world applications.
According to the results of the poll, roughly 77 percent of respondents are concerned about security in
cloud computing. Organizations are not always possible to forecast all expenses and quantities. When
data is transported there, it must adhere to industry standards and legislation.The key advantages of
using cloud services, according to the findings, include integrating systems and software, improving
communication and collaboration amongst users, and increasing user performance. The key obstacles to
adoption, on the other hand, are the availability of electricity, the expense of internet access, the quality
of communication networks, and the pace of the online connection.
Outcomes
I now understand that the greatest obstacle to cloud computing is information data security. Encryption,
security hardware, and security software can all be used to address security and privacy concerns.
Several ways are recommended to address these difficulties, including selecting the appropriate
technology strategy for efficient and appropriate use, performing regular and routine inspections and
backups, and managing infrastructure as effectively and efficiently as feasible as needed.

Week 6
Description
The cloud's privacy and security were explored this week. Since we all know, cloud computing, like every
other technology, comes with its own set of issues, one of which is the RAS factor. The RAS element is a
problem in cloud computing, and a cloud service's RAS characteristics should indeed be enhanced. Cloud
security is a collection of policies, protocols, controls, and tools that work together to safeguard cloud-
based applications, information, and architecture. These security procedures are in place to safeguard
cloud data, ensure regulatory compliance, and safeguard consumer privacy.
Analysis
In this article, the most important topics were the public cloud, hybrid cloud and private cloud.
These following are the three models of cloud environments. The three fundamental kinds of cloud
services, along with Gartner's 7 possible threats that cloud consumers should be cognizant of, are also
important topics.Data integrity refers to the encryption of information by organizations, data
confidentiality refers to the storage of sensitive data in the cloud, and homomorphic encryption refers
to the use of homomorphic encryption to guarantee secrecy and avoid loss(Data Confidentiality and
Security Enhancement for Cloud Storage utilizing OB-MECC Encryption, 2020).
Outcomes
I studied about web privacy and security. I learned why RAS concerns must be resolved right now. I now
understand the differences between SaaS, PaaS, and IaaS security concerns. When designing cloud
services, I learned about the necessity of anonymity. I also studied about cloud computing's privacy
threats and how to solve cloud security issues.
Week 7
Description
Cloud risk management was covered in week 7. Because of their scale economies, cloud service
providers are able to deliver a cutting-edge cloud ecosystem, which necessitates risk management.
Illegal entities have been discovered abusing both known and unknown flaws, posing a risk to the
security and availability of the data being processed and communicated.
Analysis
The risk management process, which is a sequence of risk procedures, is the most significant
information in this material. They are: classify, choose, execute, review, permit, and supervise. Some of
the tactics that corporations have been applying include teaching all personnel about risk management
and concerns in cloud computing, adopting a data backup strategy by most organizations, big or small,
and employing a penetration approach.
Outcomes
I gained the knowledge about the cloud's ecology. I identified how users control their risk. The risk
management framework for a cloud ecosystem has now become clear to me.
Description
The cloud's privacy and security were explored this week. Since we all know, cloud computing, like every
other technology, comes with its own set of issues, one of which is the RAS factor. The RAS element is a
problem in cloud computing, and a cloud service's RAS characteristics should indeed be enhanced. Cloud
security is a collection of policies, protocols, controls, and tools that work together to safeguard cloud-
based applications, information, and architecture. These security procedures are in place to safeguard
cloud data, ensure regulatory compliance, and safeguard consumer privacy.
Analysis
In this article, the most important topics were the public cloud, hybrid cloud and private cloud.
These following are the three models of cloud environments. The three fundamental kinds of cloud
services, along with Gartner's 7 possible threats that cloud consumers should be cognizant of, are also
important topics.Data integrity refers to the encryption of information by organizations, data
confidentiality refers to the storage of sensitive data in the cloud, and homomorphic encryption refers
to the use of homomorphic encryption to guarantee secrecy and avoid loss(Data Confidentiality and
Security Enhancement for Cloud Storage utilizing OB-MECC Encryption, 2020).
Outcomes
I studied about web privacy and security. I learned why RAS concerns must be resolved right now. I now
understand the differences between SaaS, PaaS, and IaaS security concerns. When designing cloud
services, I learned about the necessity of anonymity. I also studied about cloud computing's privacy
threats and how to solve cloud security issues.
Week 7
Description
Cloud risk management was covered in week 7. Because of their scale economies, cloud service
providers are able to deliver a cutting-edge cloud ecosystem, which necessitates risk management.
Illegal entities have been discovered abusing both known and unknown flaws, posing a risk to the
security and availability of the data being processed and communicated.
Analysis
The risk management process, which is a sequence of risk procedures, is the most significant
information in this material. They are: classify, choose, execute, review, permit, and supervise. Some of
the tactics that corporations have been applying include teaching all personnel about risk management
and concerns in cloud computing, adopting a data backup strategy by most organizations, big or small,
and employing a penetration approach.
Outcomes
I gained the knowledge about the cloud's ecology. I identified how users control their risk. The risk
management framework for a cloud ecosystem has now become clear to me.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 8
Description
Week 8 was about arranging for a business cloud migration. From a business standpoint, cloud
computing can be characterized as a paradigm in which users have simple access to a shared pool of
configurable computing resources via the internet(Shirvani and Vahdat-Nejad, 2016). Cloud
computing is a model that allows users to connect to a pool of configurable computing resources on
need.
Analysis
The cloud service concepts, including such cloud software as a service, which utilizes a provider's
requests over the channel, cloud infrastructure as a service, that incorporates customer-created
requests to a web, and cloud infrastructures as a service, which rents processing, available bandwidth,
and other numerous computing services, seem to be the most essential information inside this subject
matter.
Outcomes
After completing this class, I acquired a wide range of topics, including common cloud characteristics
like homogeneity, powerful processing, decreased application, virtualization, geographic range, and
responsiveness. When it comes to cloud security, reliability, multi-tenancy, confidentiality, and
compliance are all critical factors to consider. Furthermore, I've realized that clouds are really complex
systems, and that cloud security is a doable concern.
Week 9
Description
SLA management is covered in the ninth week of the curriculum. A service level agreement (SLA) is a
formal contract that guarantees that the user's service quality requirements are met(Atan and Haider,
2016). A service level agreement (SLA) for cloud technology can be presented in the form that specifies
the service level parameter specification, service level goals, and assurances. SLA can't be thought of as
a one-way street.
Analysis
When it concerns to any form of company, SLA is crucial. It affects all these parties engaged in the
industry. In actual conditions, too many various agreements are established between a consumer and a
service provider, and both sides must obey the laws and restrictions outlined in the agreement in any
type of organization or corporation, which has helped ensure trust between the parties.
Outcomes
After analyzing this unit, I learned that cloud storage contracts are comprised of three major points:
customer agreement, guidelines, and service level agreement. I also learned that acknowledging the
tasks and functions, evaluating corporate level policies, knowing the difference between service and
deployment model discrepancies, and identifying critical performance goals are all necessary steps in
appraising cloud service pacts.
Description
Week 8 was about arranging for a business cloud migration. From a business standpoint, cloud
computing can be characterized as a paradigm in which users have simple access to a shared pool of
configurable computing resources via the internet(Shirvani and Vahdat-Nejad, 2016). Cloud
computing is a model that allows users to connect to a pool of configurable computing resources on
need.
Analysis
The cloud service concepts, including such cloud software as a service, which utilizes a provider's
requests over the channel, cloud infrastructure as a service, that incorporates customer-created
requests to a web, and cloud infrastructures as a service, which rents processing, available bandwidth,
and other numerous computing services, seem to be the most essential information inside this subject
matter.
Outcomes
After completing this class, I acquired a wide range of topics, including common cloud characteristics
like homogeneity, powerful processing, decreased application, virtualization, geographic range, and
responsiveness. When it comes to cloud security, reliability, multi-tenancy, confidentiality, and
compliance are all critical factors to consider. Furthermore, I've realized that clouds are really complex
systems, and that cloud security is a doable concern.
Week 9
Description
SLA management is covered in the ninth week of the curriculum. A service level agreement (SLA) is a
formal contract that guarantees that the user's service quality requirements are met(Atan and Haider,
2016). A service level agreement (SLA) for cloud technology can be presented in the form that specifies
the service level parameter specification, service level goals, and assurances. SLA can't be thought of as
a one-way street.
Analysis
When it concerns to any form of company, SLA is crucial. It affects all these parties engaged in the
industry. In actual conditions, too many various agreements are established between a consumer and a
service provider, and both sides must obey the laws and restrictions outlined in the agreement in any
type of organization or corporation, which has helped ensure trust between the parties.
Outcomes
After analyzing this unit, I learned that cloud storage contracts are comprised of three major points:
customer agreement, guidelines, and service level agreement. I also learned that acknowledging the
tasks and functions, evaluating corporate level policies, knowing the difference between service and
deployment model discrepancies, and identifying critical performance goals are all necessary steps in
appraising cloud service pacts.

Week 10
Description
The topic of cloud governance and management was the focus of Week 10. Cloud governance is just a
framework that is used in accepting cloud computing and includes a perspective of IT governance that is
centered on accountability, balancing incentives, and many other things. On cloud computing
governance, various guides are utilized. The levels of skills and performance that a firm requires to
succeed might be characterized as efficiency and accessibility threat.
Analysis
One of most important insights obtained from this study was the premise of cloud administration, which
involves the ability to provide overall planning, distribute necessary resources, and track progress. Audit
vulnerabilities, possible attacks, and data consequences are just a few of the dangers that come with
running on the cloud. The companies have been cooperating and adhering to well-defined protocols.
Outcomes
After taking this course, I've understood that a cloud governance plan must include two key elements:
understanding the risk and compliance requirements that enterprises must follow, and setting the
business's performance objectives. I've additionally gained valuable skills and cloud management
necessitates the use of people, processes, and technologies.
Week 11
Description
The administration of cloud infrastructure was studied in the eleventh week's curriculum. The ability of a
system to separate computational power from their base architecture. The physical and administrative
services that are essential to host applications, as well as a framework on which to execute them, are
provided by the Iaas provider. In computer, virtualization refers to the creation of a virtual machine, OS,
data network, or another device.
Analysis
Learning how to handle cloud infrastructure, cloud computing fundamentals such as virtualization and
automation, and replaceable assets such as servers, network, and storage were the most significant
aspects of this topic. In computer, virtualization also refers to the construction of a virtual environment,
such as a program, operating system, memory stick, or maybe even a data network(Bhattacharjee and
Lustig, 2017).
Outcomes
I was able to comprehend how cloud infrastructure may be controlled after finishing this section. I also
learned aboust the various layers that exist in cloud computing. In cloud computing, I learned about
virtualization processes. I learned why virtualization is important and what benefits it will bring to cloud
computing.
Conclusion
This reflective journal includes all of the criteria for my duties, such as definitions, objectives, and
perceptions of the subject 'cloud and beyond.' So, after researching this subject, cloud computing and
beyond, I've come to comprehend and learn a lot concerning cloud computing, its origins, development,
Description
The topic of cloud governance and management was the focus of Week 10. Cloud governance is just a
framework that is used in accepting cloud computing and includes a perspective of IT governance that is
centered on accountability, balancing incentives, and many other things. On cloud computing
governance, various guides are utilized. The levels of skills and performance that a firm requires to
succeed might be characterized as efficiency and accessibility threat.
Analysis
One of most important insights obtained from this study was the premise of cloud administration, which
involves the ability to provide overall planning, distribute necessary resources, and track progress. Audit
vulnerabilities, possible attacks, and data consequences are just a few of the dangers that come with
running on the cloud. The companies have been cooperating and adhering to well-defined protocols.
Outcomes
After taking this course, I've understood that a cloud governance plan must include two key elements:
understanding the risk and compliance requirements that enterprises must follow, and setting the
business's performance objectives. I've additionally gained valuable skills and cloud management
necessitates the use of people, processes, and technologies.
Week 11
Description
The administration of cloud infrastructure was studied in the eleventh week's curriculum. The ability of a
system to separate computational power from their base architecture. The physical and administrative
services that are essential to host applications, as well as a framework on which to execute them, are
provided by the Iaas provider. In computer, virtualization refers to the creation of a virtual machine, OS,
data network, or another device.
Analysis
Learning how to handle cloud infrastructure, cloud computing fundamentals such as virtualization and
automation, and replaceable assets such as servers, network, and storage were the most significant
aspects of this topic. In computer, virtualization also refers to the construction of a virtual environment,
such as a program, operating system, memory stick, or maybe even a data network(Bhattacharjee and
Lustig, 2017).
Outcomes
I was able to comprehend how cloud infrastructure may be controlled after finishing this section. I also
learned aboust the various layers that exist in cloud computing. In cloud computing, I learned about
virtualization processes. I learned why virtualization is important and what benefits it will bring to cloud
computing.
Conclusion
This reflective journal includes all of the criteria for my duties, such as definitions, objectives, and
perceptions of the subject 'cloud and beyond.' So, after researching this subject, cloud computing and
beyond, I've come to comprehend and learn a lot concerning cloud computing, its origins, development,

and how easy it makes our daily lives easier. I've also learned about the dangers of cloud computing,
service level contractual arrangements, cloud online services, platforms as a resource, and managed
service providers, among several other important issues.
References
Computer Engineering and Intelligent Systems, 2019. Concepts of Cloud Computing and
Protection of Data in Cloud Computing.
Kollolu, R., 2020. Characteristics, Applications and Use Cases of Cloud Computing. SSRN
Electronic Journal,.
B., M. and D., A., 2018. Cloud Storage for Data Sharing: Infrastructure as Service (IaaS) in
Cloud Environment. SSRN Electronic Journal,.
Khan, M., 2016. Multiresolution coding of motion capture data for real-time multimedia
applications. Multimedia Tools and Applications, 76(15), pp.16683-16698.
Hariram, V. and Arramraju, S., 2016. Assessment of cardiovascular risk in low resource
settings “So much to do - So little done”. Indian Heart Journal, 68(3), pp.260-262.
Hutson, M., 2019. Scientists teach computers fear—to make them better drivers. Science,.
International Journal of Emerging Trends in Engineering Research, 2020. Data Confidentiality
and Security Enhancement for Cloud Storage utilizing OB-MECC Encryption. 8(10), pp.7501-
7509.
Shirvani, H. and Vahdat-Nejad, H., 2016. Storing shared documents that are customized by
users in cloud computing. Computing, 98(11), pp.1137-1151.
Atan, R. and Haider, H., 2016. Service Level Agreement (SLA) Enforcement: Is it
Impactful?. Indian Journal of Science and Technology, 9(48).
Bhattacharjee, A. and Lustig, D., 2017. Architectural and Operating System Support for
Virtual Memory. Synthesis Lectures on Computer Architecture, 12(5), pp.1-175.
service level contractual arrangements, cloud online services, platforms as a resource, and managed
service providers, among several other important issues.
References
Computer Engineering and Intelligent Systems, 2019. Concepts of Cloud Computing and
Protection of Data in Cloud Computing.
Kollolu, R., 2020. Characteristics, Applications and Use Cases of Cloud Computing. SSRN
Electronic Journal,.
B., M. and D., A., 2018. Cloud Storage for Data Sharing: Infrastructure as Service (IaaS) in
Cloud Environment. SSRN Electronic Journal,.
Khan, M., 2016. Multiresolution coding of motion capture data for real-time multimedia
applications. Multimedia Tools and Applications, 76(15), pp.16683-16698.
Hariram, V. and Arramraju, S., 2016. Assessment of cardiovascular risk in low resource
settings “So much to do - So little done”. Indian Heart Journal, 68(3), pp.260-262.
Hutson, M., 2019. Scientists teach computers fear—to make them better drivers. Science,.
International Journal of Emerging Trends in Engineering Research, 2020. Data Confidentiality
and Security Enhancement for Cloud Storage utilizing OB-MECC Encryption. 8(10), pp.7501-
7509.
Shirvani, H. and Vahdat-Nejad, H., 2016. Storing shared documents that are customized by
users in cloud computing. Computing, 98(11), pp.1137-1151.
Atan, R. and Haider, H., 2016. Service Level Agreement (SLA) Enforcement: Is it
Impactful?. Indian Journal of Science and Technology, 9(48).
Bhattacharjee, A. and Lustig, D., 2017. Architectural and Operating System Support for
Virtual Memory. Synthesis Lectures on Computer Architecture, 12(5), pp.1-175.
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.