CLBE 304: Assessment 3 - Cloud Computing Content Analysis Report

Verified

Added on  2022/03/12

|11
|3657
|108
Report
AI Summary
This report provides a comprehensive analysis of cloud computing, covering key concepts and weekly topics over an eleven-week period. The report begins with an introduction to cloud computing, emphasizing its importance and benefits, and then delves into the weekly content. Week 1 explores the significance of cloud computing and its advantages. Week 2 focuses on cloud architectures, while Week 3 examines hybrid cloud models. Week 4 discusses cloud architecture in more detail, and Week 5 covers cloud computing paradigms, designs, and constraints. The report then moves on to cloud security in Week 6 and risk mitigation in Week 7. The remaining weeks likely cover topics such as cloud storage, virtual machines and various cloud models, offering a comprehensive overview of the subject. Throughout the report, descriptions, analyses, and outcomes for each week are presented, offering a structured learning experience and a deep dive into the world of cloud computing.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CLBE 304 Assesment-3
Cloud Computing – 11 Weeks Content Analysis
Submitted By:
Submitted To:
Roll No:
Contents
Introduction.................................................................................................................................................2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Week 1........................................................................................................................................................2
Description..............................................................................................................................................2
Analysis....................................................................................................................................................2
Outcomes................................................................................................................................................3
Week 2........................................................................................................................................................3
Description..............................................................................................................................................3
Analysis....................................................................................................................................................3
Outcomes................................................................................................................................................3
Week 3........................................................................................................................................................3
Description..............................................................................................................................................3
Analysis....................................................................................................................................................4
Outcomes................................................................................................................................................4
Week 4........................................................................................................................................................4
Description..............................................................................................................................................4
Analysis....................................................................................................................................................4
Outcomes................................................................................................................................................4
Week 5........................................................................................................................................................4
Description..............................................................................................................................................4
Analysis....................................................................................................................................................5
Outcomes................................................................................................................................................5
Week 6........................................................................................................................................................5
Description..............................................................................................................................................5
Analysis....................................................................................................................................................5
Outcomes................................................................................................................................................5
Week 7........................................................................................................................................................6
Description..............................................................................................................................................6
Analysis....................................................................................................................................................6
Outcomes................................................................................................................................................6
Week 8........................................................................................................................................................6
Description..............................................................................................................................................6
Analysis....................................................................................................................................................6
Outcomes................................................................................................................................................6
Week 9........................................................................................................................................................7
Document Page
Description..............................................................................................................................................7
Analysis....................................................................................................................................................7
Outcomes................................................................................................................................................7
Week 10......................................................................................................................................................7
Description..............................................................................................................................................7
Analysis....................................................................................................................................................7
Outcomes................................................................................................................................................7
Week 11......................................................................................................................................................8
Description..............................................................................................................................................8
Analysis....................................................................................................................................................8
Outcomes................................................................................................................................................8
Conclusion...................................................................................................................................................8
References...................................................................................................................................................8
Document Page
Introduction
Students are taught key concepts of cloud computing as an outcome of the study. We would gain the
relevant data required to understand cloud services from one strategic standpoint as well as want to be
a cloud investor. Cloud technology is the internet-based deployment of computing infrastructure such as
hosts or storing. This is viewed, the same as any membership, as an even more cost-effective substitute
to possessing resources. Focusing on a single hosting company may be dangerous because the client has
next to no influence on the distributor's behavior(A New Access Control Scheme for Protecting
Distributed Cloud Services and Resources, 2016). Firms are, meanwhile, increasingly migrating non-
customer information to the server. The platform, depending on how it is classed, would either be open
or confidential. The public cloud is available to all and can indeed be purchased by anybody, but the
private cloud is indeed a closed infrastructure which only a few individuals have control to. Among the
most essential web services to watch for in the coming year are PCs without even an administrator,
portability, network virtualization, and others.
We seem to be aware with internet technology's vocabulary and major properties, including its origins,
the feasibility study for cloud platforms, and emerging technological application scenarios enabled by
web services. Cloud technology refers to the distribution of application areas which including software,
hosts, ports, databases, and interfaces throughout the internet. Cloud computing is quickly has become
requirement for said vast majority of international businesses. This assessment covers a wide range of
industries on a weekly basis, together with their benefits, descriptions, and analyses.
Week 1
Description
We spent session delving on why cloud computing is so vital in current world. Cloud computing has been
the high-tech practice of accessing the information and applications thru online than on the disk of any
machine. This word "cloud" is now a morphological expression for the Web. Moreover, Cloud
Technology is more than just a contemporary and novel alternative; it is also a fairly new strategy that
can be applied to any form of organization.
Analysis
This even though has been accepted by the general public at a higher percentage than almost any
advanced technology because of those facts(Dimitri, 2020). This growth has been accompanied by the
continual increment in the number of mobile platforms and certain other electrical items that also can
access the internet. Cloud computing is perhaps the most expense effective technique for reliably and
speedily saving and recovering programs and information. We may also use real-world data via firms
that supply basic tools, communication, and workspace for the clientele.
Outcomes
I noticed how cloud computing technology seems to be a widespread clear response towards the supply
of a wide range of computational web services, such as websites, storing areas, predictive analytics,
linkage, programming, review, and perception. I've learned well about advantages of cloud resources,
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
like increased organizational agility and lower operating costs. I have researched the cloud's many
aspects, namely the roles it performs in modern frameworks and also its apparent parameters.
Week 2
Description
This following week's coursework acquainted us to cloud based architectures. Cloud platform
infrastructure is concerned well with evaluation, research, planning, implementation, and incorporation
of web services, which enables firms to carry out their operations in the internet (Abdelmoneem,
Benslimane and Shaaban, 2020). The layout of cloud services takes into account the primary business
objectives and aligns those with a viable cloud - based alternatives.
Analysis
The primary goal of cloud software design is to establish a transition plan for deployment of cloud that
incorporates the optimal methods both to technical and commercial administration aspects of
computing. It specifies how an enterprise will adopt the solution and also the repercussions of doing so.
Cloud platform design could comprise many of the cloud's service offerings, such as hardware,
applications, memory, and protection. In everyday world, examples of digital services are Amazon, that
users are using to purchase various things, and Google Street view.
Outcomes
Cloud platforms are made up of data storing, hosts, vms, and perhaps other physical network
components. It provides the user with a realistic graphical user interface. Its system throughput,
improves info necessities, and reduces IT operating costs by simplifying exposure to computation
capabilities. It lets businesses to rapidly move data their web services, permitting customers to perform
their tasks. Difficulties, changes in openness, reducing data invasions, and digital communication are all
instances of privacy problems that exist.
Week 3
Description
In contrast to the previous week, the attention in week 3 was entirely on hybrid computing models. Each
firm must have a well-defined cloud-based plan in mind to be efficient. Converting to a mixed cloud
platform could well be costly and difficult. We must select how or when to deploy and shift our tasks
amongst distinct virtual servers to help the management save time & expense throughout the
changeover.
Analysis
Organizations rely on a wide range of programs to carry out their responsibilities on a frequent basis,
thus requires a variety of deployment methods to run their diverse uses. Putting protections in place is
not an easy process. If a portion of the cloud infrastructure is infiltrated, it will gradually put
confidential applications mostly on cloud environment at danger(Cheng, van Dongen and van der Aalst,
2020). Nonetheless, businesses embrace the public cloud because of its mobility, handling less-critical
actions there while keeping important documents in-house. Hybrid cloud additionally enables
organizations to adapt swiftly, notably during traffic spikes.
Document Page
Outcomes
Multiple formalized virtual servers can indeed be interconnected simultaneously, I observed. We never
can fully leverage on the capabilities that a specific cloud ecosystem does have to deliver since the same
program is running in multiple situations. This occurrence exclusively makes use of platform-
independent features. Putting access to sensitive data is not an easy process.I studied well about
application of IaaS in a hybrid cloud model. I came to know about different dimensions of service
orientation.
Week 4
Description
In week 4, the cloud architecture got covered. It is the action of forging a new degree of effectiveness in
care provision and establishing a huge opportunity for IT firms. It has been identified to tackle many of
the most difficult parts involving massive data handling. Work overload dispersal infrastructure is to be
used when one or maybe more IT systems are introduced, and a balancer that has been found delivering
a real-time algorithm likely to spread the strain equitably amongst IT assets.
Analysis
Visibility, adaptability, confidentiality, and proactive surveillance seem to be just few of the most
essential limitations that any infrastructure as a service would face. Recent research on these other
significant limits is assisting cloud computing systems in establishing novel functionalities and tactics
capable of giving more comprehensive cloud infrastructure(Cloud Computing : Architecture, Challenges
and Application, 2017). The most essential component of this debate is the classification of cyber
ecosystem, which might also contain a bunch of alternative hosts, private/hybrid approaches which also
includes blended streams.
Outcomes
The framework of cloud technology is separated into two sections: front-end and back-end. A
connection or the web is used to connect the front-end as well as back-end. I was aware that even this
strategy cuts IT overhead costs, offers easy access to info and analytics capabilities, and enables
organizations to simply ramp up. After studying about multiple cloud installation patterns designs, I also
understood that all model has its own number of characteristics and functions.
Week 5
Description
The fifth session emphasized on the cloud computing paradigm, design, and constraints. The primary
aim of the strategy is to improve the use of resource sharing. Users confront substantial obstacles in
implementing cloud-based products privacy reasons(Kollolu, 2020). The primary advantage of cloud
seems to be that customers do not need to pay for configuration, or employees to preserve similar
systems.
Analysis
Firms have faced a myriad of challenges in implementing cloud computing within plugin settings.
Unencrypted flaws such as data leak, bribery, and spammers are main risks to a corporation's file types.
The internet computing cross model and multiple computer infrastructure have introduced new
Document Page
vulnerabilities, such as competences on another platform, which supports an offside position path
among a hostile program and a genuine source. According to surveys, the top advantages of using cloud
services include integrating programs, improving client collaboration and synchronization, and
enhancing consumer effectiveness.
Outcomes
The hugest obstacle to cloud platform, in my opinion, is informational along with data security.
Encryption, safe equipment, and antimalware may all be utilized in tandem to address data safety
issues. Determining the best operational plan for effective and lawful consumption, completing
scheduled reviews and recoveries, and maintaining the connection as reliable and practical as possible
have all been proposed approaches to coping with problems.
Week 6
Description
In the week 6, the cloud's confidentiality was addressed. Encryption is indeed the method through which
confidential information is secured and guaranteed; contemporary security mechanisms are absolutely
wonderful. Cloud security is the protection of regulations, requirements, strict limits, and processes
used to preserve cloud-based operations, information, and infrastructural facilities.
Analysis
The system design department inside this organization that produces and administers vital data bears
the weight of safety and compliance. Many legislative procedures must always be introduced inside the
IT function to provide a great deal of responsibility. To protect cloud-based systems, Cloud Security
employs regulation and supervision, inventiveness, contingency planning, prescribed protocols, and
availability limits. A strong data security strategy protects data across its full life cycle, from creation to
destruction.
Outcomes
The safety regulations are intended to safeguard files in the database, ensure compliance with
applicable regulations, and preserve personal privacy. This subject has taught me about several
potential risks that could hurt any sort of business, as well as techniques for dealing with these kinds of
weaknesses. I also learn about words like LaaS, SaaS and even PaaS(Anselmi, Ardagna and
Passacantando, 2014). To reduce the risk of data, encoding, protected credentials, cross identifier, and
corroborated backups really should be utilized.
Week 7
Description
Cloud risk mitigation was explored in week 7. Because of their increased efficiency, computing resources
are developed to yield a cutting-edge cloud biosphere, so risk must always be organized. Nefarious
institutions are discovered attempting to exploit alike predictable and unpredictable security problems,
presumably jeopardizing the privacy and integrity of information being analyzed and relocated.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Analysis
Each department must comprehend the framework in which it employs cloud solutions. Furthermore,
the level of effort got to spend on threat assessment should always be proportionate of hazard. In
exercise, this entails performing an original estimate of the categorization of the components involved,
as well as determining if there were any secrecy or autonomy concerns. Risk assessments, while crucial,
are only the first step toward efficient data risk mitigation(Davoli, Belli, Veltri and Ferrari, 2017). Even
before resources are insufficient, organizations should focus their efforts on managing and monitoring
risk via intervention.
Outcomes
While cloud technology intends significant benefits including such incredibly quick acquisition, stretchy
augmentation, and reduced cashflow, it is critical that whatever entity fully understands the privacy
issues associated with cloud computing. I learned a lot about the cloud infrastructure. I also discovered
how patrons maneuver potential threat. My understanding of the strategic plan for such risks in a cloud
infrastructure has indeed enhanced.
Week 8
Description
We dedicated the 8th week in preparing for a commercial cloud migration. Cloud computing technology
has evolved as a marketing strategy in which consumers have instant access toward a configurable
computing resource only through the world wide web. This platform gives an entirely change initiative,
dispatching, and utilizing technological innovations to achieving the optimum and self-heal legacy
systems.
Analysis
Relocation to the data center is amongst the most favorable advancements for businesses of all sizes
and industries seeking increased market position, adjustability, and efficiencies. Furthermore,
cybersecurity and also the convenience of enhancing mechanisms are upsides of this innovation. The
different ERP models are been utilized in real life applications(Miyachi, 2018). Migration to the server is
simple when competent activities are done along with forethought. To avoid affecting teams during the
transition process, the alternatives must be spontaneously associated to the institution's power grid.
Outcomes
After finishing this session, I learned about various cloud platforms. I also managed to learn well about
cloud's general and unique functionality. I learned how security mechanisms is assessed. I've now made
clear the benefits of confidentiality. Cloud computing enables registry replacement, updates, and data
retrieval servicing on a regular basis. The cloud hosting might well handle these specifics invariably, so
all information would be obtainable wherever it's necessary.
Week 9
Description
The topic of Service Level Agreement was inspected in the ninth week. In certain ways, the SLA
establishes expectations with both stakeholders and serves as a framework for transition inside the web
service – alike anticipated and unanticipated variations. An SLA is necessary when dealing with
Document Page
virtualized environment, just as much as any IT venture that has a guideline with strongly outlined
milestones.
Analysis
SLAs have classically been included in the IT market to enhance the goals of service users who use IT
offerings. An SLA characterized the preconceptions of both the support client and the contractor. It is
necessary for businesses to provide packages with vastly differing standards for quality tied to the value
of the product. An SLA is critical in assisting all stakeholders in acknowledging the trade-offs with both
finances, timetable, and brilliance(Nelli and Jogdand, 2022). SLA cannot guarantee that you will receive
the attention explained, even as premiums cannot guarantee that one’s machine will stop functioning.
Outcomes
Following this class, not all cloud vendor will agree politically to one's demands, although most patrons
can reach good-faith negotiated agreements with practitioners.I also realized that acknowledging
professions and procedures, dissecting corporate strategy laws, acknowledging the dichotomy among
amenities and distribution model disparities, and establishing indispensable performance standards are
all necessary conditions when assessing web service plans.
Week 10
Description
The topic of cloud governance practices has been the centerpiece of Week 10. Cloud governance is a
configuration used in appreciating cloud computing and implies an IT management perspective that is
aimed on culpability, adjusting perks, and other things. On public cloud leadership, various tutorials are
used. The thresholds of skills and performance that even a business utilizes to excel can be characterized
as effectiveness and allocation threat.
Analysis
Cloud governance is a system that governs how potential users utilize cloud storage by defining
measures to control expenses, mitigate privacy issues, boost productivity, and expedite mobilization. It
is critical to have provided by the cloud leadership since it is a critical foundation of one’s cloud practice
that allows you to adjust and succeed. Cloud- based solutions combine a lot of choices and instruments
to offer a cohesive, smoother practices.
Outcomes
After learning this course, I eventually realized that a web governance plan should include two essential
elements: understanding the audit and risk management laws that entities must follow, and instituting
the firm's quality standards. Consequences cloud services include inspection weaknesses, targeted
threats, and info ramifications. I've also gained real skills, as data governance necessitates the use of
professionals, operations, and portals.
Document Page
Week 11
Description
The management of cloud platform was covered in the eleventh week's duration. The potential of a pc
to obscure computing capacity from its foundational architecture(Sun, Gregor and Fielt, 2021). The IaaS
insurer is noticed procuring the devices and organizational facilities required to accommodate requests
and a framework through which to run those. Virtualization in computer technology refers to the
creation of virtual machine, OS, networking equipment, and so on.
Analysis
The most basic factors of this curriculum seemed to be how to effectively manage a cloud framework,
online services principles like vms and instrumentation, and edible assets like servers, channels, and
storage. Alternative ways used by modern businesses to oversee network infrastructure also include
emergence of a special server, the configuration of a new OS, the allotment of disk space or other web
systems, the provision of supplies, the efficiency of fees, and others.
Outcomes
After finishing this section, I had a better understanding of how computing infrastructure might be
handled. I furthermore learnt about various strands that exist in cloud applications. I learned regarding
cloud computing vms. I managed to learn why virtualization is requisite and what the benefits will be if it
is implemented in cloud services.
Conclusion
Enterprises, unbiased designers, experts, teachers and students can all benefit from cloud technologies.
Individuals can add smart judgments about how to effectively reap the benefits of cloud's products by
perceiving its variety of services, concepts, perks, and consequences. As a result, this technology is
relatively modern tech innovation with the prospects to have a massive international impact. It is
capable of providing countless benefits to the users and businesses. People these days are worried
about the protection and confidentiality of their private details.
References
Services Transactions on Cloud Computing, 2016. A New Access Control Scheme for Protecting
Distributed Cloud Services and Resources. 4(3).
Dimitri, N., 2020. Pricing cloud IaaS computing services. Journal of Cloud Computing, 9(1).
Abdelmoneem, R., Benslimane, A. and Shaaban, E., 2020. Mobility-aware task scheduling in
cloud-Fog IoT-based healthcare architectures. Computer Networks, 179, p.107348.
Cheng, L., van Dongen, B. and van der Aalst, W., 2020. Scalable Discovery of Hybrid Process
Models in a Cloud Computing Environment. IEEE Transactions on Services Computing, 13(2),
pp.368-380.
International Journal of Recent Trends in Engineering and Research, 2017. Cloud Computing :
Architecture, Challenges and Application. 3(6), pp.182-188.
Kollolu, R., 2020. Infrastructural Constraints of Cloud Computing. SSRN Electronic Journal,.
Anselmi, J., Ardagna, D. and Passacantando, M., 2014. Generalized Nash equilibria for
SaaS/PaaS Clouds. European Journal of Operational Research, 236(1), pp.326-339.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Davoli, L., Belli, L., Veltri, L. and Ferrari, G., 2017. THORIN: an Efficient Module for Federated
Access and Threat Mitigation in Big Stream Cloud Architectures. IEEE Cloud Computing, pp.1-
1.
Miyachi, C., 2018. Community of Practice: Who has your Cloud-Back?. IEEE Cloud Computing,
5(2), pp.7-10.
Nelli, A. and Jogdand, R., 2022. SLA-WS: SLA-based workload scheduling technique in multi-
cloud platform. Journal of Ambient Intelligence and Humanized Computing,.
Sun, R., Gregor, S. and Fielt, E., 2021. Generativity and the paradox of stability and flexibility
in a platform architecture: A case of the Oracle Cloud Platform. Information & Management,
58(8), p.103548.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]