Comprehensive Report on Cloud ICT: Benefits, Issues, and Solutions
VerifiedAdded on 2022/11/15
|8
|1801
|305
Report
AI Summary
This report provides a comprehensive analysis of Cloud ICT, addressing its benefits, challenges, and potential solutions. The report explores the advantages of secure hybrid cloud solutions, including business continuity through disaster recovery and data backup. It also examines the disadvantages and threats associated with hybrid cloud usage, along with mitigation strategies. The document further delves into cloud bursting concepts, discussing its benefits and issues such as configuration management, communication latency, and security concerns. The report highlights the advantages of connecting clouds across the public internet, including reduced costs, increased security, and improved scalability. References to various research papers and studies are included to support the analysis.

Running head: CLOUD ICT
CLOUD ICT
Name of Student
Name of University
Author’s Note
CLOUD ICT
Name of Student
Name of University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CLOUD ICT
Answer 10
a. I can explain my organization regarding the benefits from the secure hybrid Cloud
solution by providing them with a report that would be prepared on the advantages
that are provided by the usage of secure could computing along with some real life
examples of their usefulness. I would further mention some examples of numerous
organizations that had implemented hybrid cloud and how it has helped them in
improving their operations (Singh & Chana, 2016). I would also provide them the
example of the most important advantage provided by hybrid cloud which is business
continuity. This is because it provides advantages like disaster recovery along with
data backup.
b. Besides numerous advantages, there are certain issues or threats that are imposed by
the usage of hybrid cloud. These disadvantages can be explained by including them in
the form of a certain report. The disadvantages can be mentioned besides the causes
that could result in the threats and their consequences on the business (Etro, 2015).
The document could also be provided with various examples of organizations which
had encountered the challenges and the effects on the organization and its operations.
Finally various mitigation strategies or recommendations could be provided which
would explain how my organisation can prevent the issues or mitigate them using
numerous strategies.
c. Security feature is very important within the hybrid cloud because having a properly
planned strategy for security of cloud could prove to be the key to having cloud
innovation perfectly. Various security solutions that are designed for cloud might
bring about numerous benefits for the organization as opposition of sing the legacy on
premise solutions for security which would contribute in slowing down the cloud
deployment (Acton, Morgan & Conboy, 2016). Security feature is important because,
Answer 10
a. I can explain my organization regarding the benefits from the secure hybrid Cloud
solution by providing them with a report that would be prepared on the advantages
that are provided by the usage of secure could computing along with some real life
examples of their usefulness. I would further mention some examples of numerous
organizations that had implemented hybrid cloud and how it has helped them in
improving their operations (Singh & Chana, 2016). I would also provide them the
example of the most important advantage provided by hybrid cloud which is business
continuity. This is because it provides advantages like disaster recovery along with
data backup.
b. Besides numerous advantages, there are certain issues or threats that are imposed by
the usage of hybrid cloud. These disadvantages can be explained by including them in
the form of a certain report. The disadvantages can be mentioned besides the causes
that could result in the threats and their consequences on the business (Etro, 2015).
The document could also be provided with various examples of organizations which
had encountered the challenges and the effects on the organization and its operations.
Finally various mitigation strategies or recommendations could be provided which
would explain how my organisation can prevent the issues or mitigate them using
numerous strategies.
c. Security feature is very important within the hybrid cloud because having a properly
planned strategy for security of cloud could prove to be the key to having cloud
innovation perfectly. Various security solutions that are designed for cloud might
bring about numerous benefits for the organization as opposition of sing the legacy on
premise solutions for security which would contribute in slowing down the cloud
deployment (Acton, Morgan & Conboy, 2016). Security feature is important because,

2CLOUD ICT
the speed as well as frequency of the cloud deployment needs a certain security
solution which would be able to keep pace along with it. In the aspect of cloud
security, this represented being able to scale in a rapid manner, scan the vulnerability
at the time of building production as well as testing along with deploying various new
environments within a short period of time.
Answer 11
Cloud bursting concepts: cloud bursting can be defined as a certain model that can be
used for the purpose of application deployment, here a certain application runs within a
particular private cloud or a certain data centre and then bursts into the public cloud where
the demand of public necessity for the capacity of computing tends to spike (Ye, Qian & Hu,
2016). The main benefit that is provide by the hybrid cloud deployment is the fact that a
particular organization has to pay for only the extra resources whenever needed. Various
experts tend to suggest cloud bursting for reliable performance, various applications that are
not critical which handle insensitive data. A certain application could be deployed locally and
then burst in cloud for meeting numerous demands (Kaleem, Jain & Husain, 2017). This can
also be done by moving the application to public cloud for freeing up numerous local
resources for the applications that are business critical. Cloud bursting tends to function its
best for numerous applications which do not depend on various delivery infrastructures that
are complex in nature or integrating with different applications, systems as well as
components internal to data centre. In the concept of cloud bursting, a certain organization
should consider regulatory as well as security compliance requirements. Such as cloud
bursting is usually cited in the form of viable option in case of the retailers who tend to ace
peak in demand (Kyriakou & Loukis, 2017). Service providers of cloud computing do not
provide PCI DSS environment, besides these numerous retailers can put data that is sensitive
in nature at risk besides bursting to the public cloud.
the speed as well as frequency of the cloud deployment needs a certain security
solution which would be able to keep pace along with it. In the aspect of cloud
security, this represented being able to scale in a rapid manner, scan the vulnerability
at the time of building production as well as testing along with deploying various new
environments within a short period of time.
Answer 11
Cloud bursting concepts: cloud bursting can be defined as a certain model that can be
used for the purpose of application deployment, here a certain application runs within a
particular private cloud or a certain data centre and then bursts into the public cloud where
the demand of public necessity for the capacity of computing tends to spike (Ye, Qian & Hu,
2016). The main benefit that is provide by the hybrid cloud deployment is the fact that a
particular organization has to pay for only the extra resources whenever needed. Various
experts tend to suggest cloud bursting for reliable performance, various applications that are
not critical which handle insensitive data. A certain application could be deployed locally and
then burst in cloud for meeting numerous demands (Kaleem, Jain & Husain, 2017). This can
also be done by moving the application to public cloud for freeing up numerous local
resources for the applications that are business critical. Cloud bursting tends to function its
best for numerous applications which do not depend on various delivery infrastructures that
are complex in nature or integrating with different applications, systems as well as
components internal to data centre. In the concept of cloud bursting, a certain organization
should consider regulatory as well as security compliance requirements. Such as cloud
bursting is usually cited in the form of viable option in case of the retailers who tend to ace
peak in demand (Kyriakou & Loukis, 2017). Service providers of cloud computing do not
provide PCI DSS environment, besides these numerous retailers can put data that is sensitive
in nature at risk besides bursting to the public cloud.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CLOUD ICT
Issues in cloud bursting and their impacts on present cloud systems are mentioned
below
1. Managing the configuration: there are huge variations among the cloud providers that
are chosen by a certain organization and require configuration a well as managing the
applications, besides the stacking of their technologies across two environments that
are different from each other, some differences include hypervisor features along with
machine image formats, the cloud APIs behave differently along with in the cell that
are available (Walnum & Andrae, 2016). This further tends to create downstream
effect, such as using numerous hypervisors along with storage subsystems which
usually needs to be built for every cloud and hence maintain along with all the
operating system as well as security path which comes out.
2. Communication latency: latency as well as throughput can prove to be a challenge in
case the application used by an organization required to be shift a certain amount of
information between the database and the application tire while they are placed in
different clouds (Ghobadi, Testa & Spogli, 2019). This particular issue regarding the
latency is pronounced while the communication is carried out through the public
internet.
3. managing security: security of communication path among the clouds is also one of
the issues, this means setting various channels that are encrypted besides dealing with
numerous inevitable issues within the routing along with the compliance as well as
requirements of auditing. On the basis of the availability requirements of applications
the channels of communication might require being redundant at all eth levels, this
would contribute in increasing routing complexity and hence add a multiplier of cost
to the pipe costs and equipment cost. Allocation of dynamic server tends to create
Issues in cloud bursting and their impacts on present cloud systems are mentioned
below
1. Managing the configuration: there are huge variations among the cloud providers that
are chosen by a certain organization and require configuration a well as managing the
applications, besides the stacking of their technologies across two environments that
are different from each other, some differences include hypervisor features along with
machine image formats, the cloud APIs behave differently along with in the cell that
are available (Walnum & Andrae, 2016). This further tends to create downstream
effect, such as using numerous hypervisors along with storage subsystems which
usually needs to be built for every cloud and hence maintain along with all the
operating system as well as security path which comes out.
2. Communication latency: latency as well as throughput can prove to be a challenge in
case the application used by an organization required to be shift a certain amount of
information between the database and the application tire while they are placed in
different clouds (Ghobadi, Testa & Spogli, 2019). This particular issue regarding the
latency is pronounced while the communication is carried out through the public
internet.
3. managing security: security of communication path among the clouds is also one of
the issues, this means setting various channels that are encrypted besides dealing with
numerous inevitable issues within the routing along with the compliance as well as
requirements of auditing. On the basis of the availability requirements of applications
the channels of communication might require being redundant at all eth levels, this
would contribute in increasing routing complexity and hence add a multiplier of cost
to the pipe costs and equipment cost. Allocation of dynamic server tends to create
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CLOUD ICT
added complexities because various new servers that had added to a certain array
should join the VPN dynamically.
Answer 12
Five advantages of connecting cloud across public internet are as follows
Reduced cost: numerous offerings of public cloud tend to be more expensive when it
charges fee for the activity of data retrieval. For the purpose of incentivising the usage of
private, secure connectivity, numerous service providers would bill those customers who had
been using the solutions at very low rates.
Increased security: for the purpose of integrating cloud strategy which contains high
level of security, the organizations tend to connect to various digital ecosystems that bypass
various public networks that are public in nature (Haverkort & Zimmermann, 2017). With the
help of establishing a certain private connection, the users tend to reduce the overall threat of
data breach or cyber-attack with the help of limiting is exposure in the public internet.
Simple network management: in the process of establishing a certain cloud strategy
enterprises would be allowed to spread various services throughout numerous platforms for
supporting different applications. The main outcome is the fact that various in house
professionals undertake numerous tasks that are difficult for the purpose of managing various
interconnections and hence make sure on demand access. A particular circuit of direct
connectivity provides access to a huge amount of cloud providers as well as solutions which
contributes in saving time as well as frustration.
More scalability: direct connection to fabrics of cloud exchange tends to ease the
process of establishing solution of proper size which could be scaled up as well as down with
minimum amount of effort needed.
added complexities because various new servers that had added to a certain array
should join the VPN dynamically.
Answer 12
Five advantages of connecting cloud across public internet are as follows
Reduced cost: numerous offerings of public cloud tend to be more expensive when it
charges fee for the activity of data retrieval. For the purpose of incentivising the usage of
private, secure connectivity, numerous service providers would bill those customers who had
been using the solutions at very low rates.
Increased security: for the purpose of integrating cloud strategy which contains high
level of security, the organizations tend to connect to various digital ecosystems that bypass
various public networks that are public in nature (Haverkort & Zimmermann, 2017). With the
help of establishing a certain private connection, the users tend to reduce the overall threat of
data breach or cyber-attack with the help of limiting is exposure in the public internet.
Simple network management: in the process of establishing a certain cloud strategy
enterprises would be allowed to spread various services throughout numerous platforms for
supporting different applications. The main outcome is the fact that various in house
professionals undertake numerous tasks that are difficult for the purpose of managing various
interconnections and hence make sure on demand access. A particular circuit of direct
connectivity provides access to a huge amount of cloud providers as well as solutions which
contributes in saving time as well as frustration.
More scalability: direct connection to fabrics of cloud exchange tends to ease the
process of establishing solution of proper size which could be scaled up as well as down with
minimum amount of effort needed.

5CLOUD ICT
Reliable computing: along with high bandwidth along with interconnectivity having
low latency, direct connections provide better performance of applications besides more
reliable experience of end users. Application like FiberLight Cloud Connect tends to provide
a better alternative to proper internet connectivity with the cloud (Von Faber & Behnsen,
2017). It further offers numerous customers with cross connection solutions that are
dedicated in nature. They also nourish the partnership with trusted providers of cloud
exchange.
Reliable computing: along with high bandwidth along with interconnectivity having
low latency, direct connections provide better performance of applications besides more
reliable experience of end users. Application like FiberLight Cloud Connect tends to provide
a better alternative to proper internet connectivity with the cloud (Von Faber & Behnsen,
2017). It further offers numerous customers with cross connection solutions that are
dedicated in nature. They also nourish the partnership with trusted providers of cloud
exchange.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CLOUD ICT
References
Acton, T., Morgan, L., Conboy, K., & Clohessy, T. (2016, June). The times they are a-
changin for ICT service provision: A cloud computing business model perspective.
In 24th European Conference in Information Systems (ECIS). AIS Electronic Library
(AISeL).
Etro, F. (2015). The economics of cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Ghobadi, H., Testa, P., Spogli, L., Cafaro, M., Alfonsi, L., Romano, V., & Bru, R. (2019).
User-Oriented ICT Cloud Architecture for High-Accuracy GNSS-Based
Services. Sensors, 19(11), 2635.
Haverkort, B. R., & Zimmermann, A. (2017). Smart industry: How ICT will change the
game!. IEEE internet computing, 21(1), 8-10.
Kaleem, M. K., Jain, R., & Husain, M. A. (2017). Role of cloud computing in creating a
sustainable green ict infrastructure. International Journal of Computer
Applications, 160(1).
Kyriakou, N., & Loukis, E. (2017, September). Hard And Soft ICT Capital And Cloud
Computing Benefits. In 11th Mediterranean Conference on Information Systems
(MCIS 2017).
Singh, S., & Chana, I. (2016). QoS-aware autonomic cloud computing for ICT.
In Proceedings of International Conference on ICT for Sustainable Development (pp.
569-577). Springer, Singapore.
Von Faber, E., & Behnsen, W. (2017). Secure ICT Service Provisioning for Cloud, Mobile
and Beyond. Springer Fachmedien Wiesbaden.
References
Acton, T., Morgan, L., Conboy, K., & Clohessy, T. (2016, June). The times they are a-
changin for ICT service provision: A cloud computing business model perspective.
In 24th European Conference in Information Systems (ECIS). AIS Electronic Library
(AISeL).
Etro, F. (2015). The economics of cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Ghobadi, H., Testa, P., Spogli, L., Cafaro, M., Alfonsi, L., Romano, V., & Bru, R. (2019).
User-Oriented ICT Cloud Architecture for High-Accuracy GNSS-Based
Services. Sensors, 19(11), 2635.
Haverkort, B. R., & Zimmermann, A. (2017). Smart industry: How ICT will change the
game!. IEEE internet computing, 21(1), 8-10.
Kaleem, M. K., Jain, R., & Husain, M. A. (2017). Role of cloud computing in creating a
sustainable green ict infrastructure. International Journal of Computer
Applications, 160(1).
Kyriakou, N., & Loukis, E. (2017, September). Hard And Soft ICT Capital And Cloud
Computing Benefits. In 11th Mediterranean Conference on Information Systems
(MCIS 2017).
Singh, S., & Chana, I. (2016). QoS-aware autonomic cloud computing for ICT.
In Proceedings of International Conference on ICT for Sustainable Development (pp.
569-577). Springer, Singapore.
Von Faber, E., & Behnsen, W. (2017). Secure ICT Service Provisioning for Cloud, Mobile
and Beyond. Springer Fachmedien Wiesbaden.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CLOUD ICT
Walnum, H. J., & Andrae, A. S. (2016). The internet: explaining ICT service demand in light
of cloud computing technologies. In Rethinking Climate and Energy Policies (pp.
227-241). Springer, Cham.
Ye, F., Qian, Y., & Hu, R. Q. (2016). Identity‐based schemes for a secured big data and cloud
ICT framework in smart grid system. Security and Communication Networks, 9(18),
5262-5277.
Walnum, H. J., & Andrae, A. S. (2016). The internet: explaining ICT service demand in light
of cloud computing technologies. In Rethinking Climate and Energy Policies (pp.
227-241). Springer, Cham.
Ye, F., Qian, Y., & Hu, R. Q. (2016). Identity‐based schemes for a secured big data and cloud
ICT framework in smart grid system. Security and Communication Networks, 9(18),
5262-5277.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.