Cloud-Based Enterprise Systems: Architecture, Security, and Case Study

Verified

Added on  2019/09/25

|24
|3754
|200
Report
AI Summary
This report delves into the adoption of cloud computing technology within business enterprises. It explores the advantages of cloud solutions, such as scalability and cost-effectiveness, while also addressing critical security concerns. The report examines cloud architecture, including provider, enterprise, and user requirements, and discusses various deployment techniques like public, private, community, and hybrid clouds. It highlights security threats, risks, and vulnerabilities, emphasizing the importance of data governance and security. Furthermore, the report provides an overview of cloud-based business processes and the security concerns for enterprises. It concludes with a case study on migrating enterprise IT services to the cloud, offering practical insights and real-world applications. The report emphasizes the need for purposeful planning and resource management in the design and implementation of cloud-based enterprise systems to ensure data security and operational efficiency.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CLOUD-ENTERPRISE
SYSTEMS
1
Cloud Based Enterprise Systems
Author Name
Your University
Name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD-ENTERPRISE 2
Cloud Based Enterprise Systems
Abstract
This Paper focuses on the adopting Cloud Computing technology in
Business Enter- prises.While advances in technological field and
discovery of new technologies. Cloud storage is a service model where
data are maintained, manager, backed up remotely over internet. Thus
when we just imagine of business enterprise to include cloud computing
it has a great opportunities coming its way when business converts
online. It delivers all types of services with a easy suitable approach
while it turns online. The most ad- vantageous point when cloud usage is
done then the whole enterprise system becomes scalable and the
resources are available at a different priorities, virtualized resources are
available when needed. The new stream is now strikes which opens new
opportunities and business models.The customers also gets benefit for
the resources as they have to pay for the resources what they use.
Computing and internet is the new era of the 21st century and adding
cloud computing to the enterprise infrastructure. These deployment may
cause major issue of this century that is Security. Security of data is most
of the important thing to be taken care.If in a system, there is lack of
security then it is not reliable and not worth. For the successful
implementation there must be purposeful planning and managment of
resources with keeping major key points in mind while design. Here
security is the key point where threats. vulnerbilities and other internet
risks may affect the system if lack of security. Thus every
organization/company must take preventive measures and build or implement
a secured system.
In this paper, we will discuss about the cloud architecture for enterprise
Document Page
CLOUD-ENTERPRISE 3
systems, its basic requirements, the security challenges for enterprise
with its applications in risk managment areas and a case study that will
brief in detail about the migrating enterprise IT system services to cloud
for the better experience and making it more portable.
Document Page
CLOUD-ENTERPRISE 4
Introduction
In the era of 21st century, Cloud computing is the huge bubble with lots
of opportunities in different application areas. Since world is advancing
technically using IT systems thus IT demand is also widely increasing.
While using cloud computing in IT enterprises is an ease in IT industry,
with the combination of cloud computing and IT industry may help
enterprises in delivering on-demand services. Systems become more
distributed, scalable, reliable, cost effective, etc,. are key advantages of
the Cloud based IT enterprises.
Cloud computing(Carr & Yu, 2008) has been expressed in many ways by
different organ- izations based on the application areas. Since there are
no standard definitions has been adopted until now. The commonly used
definition for the cloud(Chan, Mei, & Zhang, 2009) stands for computing
with: “Common, Location-independent, Online Utility that is available on
Demand”. Clouds provide various service models they are IaaS (Infra-
structure as a service), PaaS (Platform as a service) and SaaS (Software
as a Service). Using IaaS customers can develop their own applications
based on processing, storage and network connectivity as provided by
IaaS. Using PaaS customers can increase their focus towards application
feature expansions based on the databases, queues, work flow engines,
etc which is provided by service provider. Using SaaS customer could get
the 3rd party applications with some customizing options as per customer
for their own corporate logo, colors, etc as it provides complete end user
applications.
In business Enterprises and Infrastructure, cloud provides a vast shift
where many out- sourced resources can be used and can be made
available as per requirements. In this paper we will discuss the cloud
based architecture as per the enterprises point of view. Further we will
discuss about the challenges in cloud based IT infrastructures.There are
many threats and risks while cloud is connected to enterprise for easy or
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD-ENTERPRISE 5
remote infra- structure. In reality, many enterprises faced malicious
attacks in this era thus we will discuss its causes, strengths and
weakness. Since cloud computing is the technology in boom and our
researchers are continuously researching and collaboratively work with the
organizations like amazon, Google, Microsoft and others who provide
solutions from any of the XaaS(as a service) here X can be Service,
Platform or Infrastructure.Security re-
Document Page
CLOUD-ENTERPRISE 6
searchers and professionals are working on security risks, potential threats,
vulnerabilities, and possible countermeasure in enterprise cloud
computing constantly.
Figure 1 . Service Model: XaaS
Later in the study we will discuss about how an enterprises are transiting
their IT infra- structure to cloud using case study and here a simple
background with its work will be discussed followed by its working
methods and outcomes.
Document Page
CLOUD-ENTERPRISE 7
Architectural Requirements of Cloud Computing for
Enterprises
Since we have already discussed that cloud computing has a wide range
of scope in different areas such as enterprise level to academics too.
These days cloud computing is more used for study and research purpose
for the advancements For the purpose of making it generalized usage there
needs to be a requirement of standard API’s i.e., application program
interface and standard usage guide for the developers and architects but
the development of standard factors might take place of challenges in
making cloud computing reliable, scalable, interoperability.
Figure 2 . Service Requirements: Provider, Enterprise, User
As shown in figure mentioned above, the cloud architectural
requirements are basically divided into 3 parts:
Provider Requirements: Here visionary architecture must be
designed to sup- port infrastructure. To provide dynamic services
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CLOUD-ENTERPRISE 8
and virtualized services is also one
Document Page
CLOUD-ENTERPRISE 9
of the goal for provider requirements. In this architecture approach
storage, data security and cost model must be taken care of.
Enterprise Requirements: With consideration to Enterprise point of
view, where an infrstructure on which many data and information are
dependent in a large or small scale enterprise. Thus the cloud
architecture design must be secure i.e., QoS- enabled, scalable and
inter-operable that provide efficient business management services.
User Requirements: For user architectural design must be design
such that is easy for operations to users. Interface must be simple
and must adopt the user requirements easily, it must have
capabilities of learning that can answer the service level
agreements, pricing and metering. Security should be considered as
a highest priority so as to make system stable and usability of cloud
to users.
Enterprise Requirements
As per some survey in 2012 (Pring, Brown, Frank, Hayward, & Leong,
2009), 20% of enterprises email communication will be hosted on cloud.
Thus the potential of cloud based opportunities are increasing. Every
enterprises should checklist their requirements according to environment
and resources required keeping all points into consideration from
technology to resources requirements. To understand the new system, the
outsource resource must be used for survey and getting in touch with
specs discussed by experts or analysts. For an enterprise (Rimal, Jukan,
Katsaros, & Goeleven, 2011), every resources must be re-verified with
their requirements with care and attention from security of data to data
mobility and ownership. Here we will discuss about security, data
governing for business outcomes management and other skill
requirements.
Document Page
CLOUD-ENTERPRISE 1
There are four types of cloud deployment techniques and all these
techniques have its own key responsibilities and pitfalls, they are as
follows:
Public Cloud: This is expensive but less than private cloud for
procuring its deployment. It has pre developed Standard API’s to
make data seamlessly. For
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD-ENTERPRISE 1
this type of cloud deployment target audience are large as well as
SMEs. The main pitfall is that the security is low and system may get
affected by malicious attacks like DDoS attacks. The legal issue of
this cloud is boundaries for data storage.
Private Cloud: It has the highest priority at the security and control
of resources over internet. Thus it is basically targeted at Large
organizations and corporations. For migration, Standard API’s are
required between public, community and hybrid. It is the most
expensive deployment techniques.
Community Cloud: This deployment technique is the cheapest
among all other technique and it requires Standard API’s for
migration to specific community. It has low priority to security thus
audience is small SME’s.
Hybrid Cloud: This model is meant for cost savings and audience is
multiple internals and/or external providers. For the easy movement
of data standard API’s are needed to be developed.Issue here in this
deployment type is app compatibility. Highly limited resources and
boundary for data storage.
In Enterprises, not only technology is considered but the economical
factors are also considered in procuring any new system. The use of
cloud computing is benefitial eco- nomically too as enterprises will have
choice to usage and billing as per usage cycle which is also known as
pay-per-use model. The major disadvantage of cloud computing is lack of
cost based transparency.
For cloud data must be governed properly with security, since there are
many political as well as geographical issues. When data is traversed out
of any organization then the risk of threat or attack is increasing and the
question of data security for any organ- ization rises. The cloud users
must be protected against "data lock-in". Vendor must be able to lock the
Document Page
CLOUD-ENTERPRISE 1
data and control all information. Due to lack of interoperability and
standardization efforts, providers doesnot guarantee for security when user
wants to move data/information from one cloud to another
Data migration means distributing information to different users in most
efficient way.such as data streaming, VoIP,etc,. While data distribution
there are different goals to acheive
Document Page
CLOUD-ENTERPRISE 1
they are no data loss, high and efficient performance with availability of
data, Cost efficient and scalable, among all the major goal is Security of
data. This process of migration is one of the valuable process.
To procure own product in any organization there must be business
process management which provides business structure, security and
consistent rules across business processes, users, organization and
territory. The points to be taken care for business cloud services are as
follows:
price and cost structure
Fundraising strategies
Return of Investment
Performance Indicators
Ownership costs and features
Risk managment tools
Evaluation processes and decision making
For any business, the technology supports make an important role for its
growth. Tech- nology dissemination, discussion with experts groups,
offshoring or outsourcing helps in making the service more stable.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CLOUD-ENTERPRISE 1
Security Concern for
Enterprises
As cloud computing being an emerging technology, its growth rate is
increasing with the demand and usage. There are many providers like
Amazon, Google, etc,. With this connectivity over internet there are many
possibilities of viruses, worms, hackers and cyber-terrorists for probing
and attacking. Many enterprises have started adapting new technologies
to save cost but with increase in usage there are many chances of
vulnerability and other attacks(Bisong, Rahman, et al., 2011).Over the
internet the data are shared in different countries and thus attack can be
done by any country hackers/attackers as traced by Cyber Forensics and
one of the attack was coming from china when Google cloud was used
and Software as a Service (Markoff & Barboza, 2010).
Threats-There are many attacks which harms the existing
platforms, network, intranets in enterprises.There are seven threats
which are announced by Cloud Security Alliance (Hubbard, Sutton,
et al., 2010):
Abuse and Nefarious Use of Cloud Computing.
Insecure Application Programming Interfaces.
Malicious Insiders.
Shared Technology Vulnerabilities.
Data Loss/Leakage.
Account, Service & Traffic Hijacking.
Unknown Risk Profile.
Risks- It represents the strength of having harm from some process
or some exe- cution(Hosseini, Sommerville, & Sriram, 2010).For IT
security, risk management is the process in which we understand and
respond to factors that may lead to a fail- ure in the confidentiality,
Document Page
CLOUD-ENTERPRISE 1
integrity or availability of an information system the IT security risk
is the harm to a process or the related information resulting from
some purposeful or accidental event that negatively impacts the
process or the related information (Bisong, Rahman, et al., 2011).
Document Page
CLOUD-ENTERPRISE 1
Vulnerability- It is the security loop hole and can be exploited to
cause harm. En- terprise cloud computing is just as vulnerable as
any other technology that uses the public internet for connectivity. The
vulnerability includes eavesdropping, hacking, cracking, malicious
attacks and outages. Moving your data to a cloud service is just like
“putting all your eggs in one basket” (Bisong, Rahman, et al., 2011)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD-ENTERPRISE 1
Case Study: Migration of Infrastructure of Enterprises to
Cloud
In this paper here we discuss about the case study that explains the
potential benefits and pitfalls in association with migration of IT
infrastructure in Oil and Gas Industry from data center to cloud provider
AWS using amazon EC2 Instance across the wide range of enterprise
stakeholders. Analysts who research financial conditions and technical
conditions in market also provide their analysis. The goal of this case
study is to focus on financial as well as socio-technical enterprise issues
and to segregate the potential benefits and pitfalls while transiting IT
systems to cloud. This Case study is designed and discussed based on
data collected from any enterprise, whose IT solutions are transited to
cloud provider: Amazon aws using EC2. Here to bring up the enterprise
solutions we must consider major point that is easy migrations so
Infrastructure-as-a-Service layer is most suitable service. For enterprises,
application images are available in different well known database such as
Oracle Database and Citrix XenApp(Khajeh-Hosseini, Greenwood, &
Sommerville, 2010).
Proposed System
Our study is based on SME’s that provide an IT solutions for Oil and Gas
Industry. Here study of migration consists of feasibility of organization’s
offered services to Amazon EC2. Considering the situation, There are 3
companies A,B and C with different functionality of all companies.
Company C is a SME in field of oil and gas industry having offshore
assets and they need a data acquisition system to allow management of
the offshore operations by monitoring data continuously within time
interval and this is totally dependent on Company A which is described
later. Company B is an IT solution company which is a cloud service
provider. Company A is a Large scale oil company which is responsible
Document Page
CLOUD-ENTERPRISE 1
for the production. Thus we can say that the data comes from the
company A links that is onshore, now There is a need for data computing
and analytics and maintaining so there comes need of some IT solution
company hence outsource developed systems are hired from Company B
with data center as per requirements.
As shown in figure this complete use case requires two servers one to run
application
Document Page
CLOUD-ENTERPRISE 1
for monitoring the data feeded from company C and which are accessed
to company C remotely and other known as database servers which logs
and archives the data offshore. Also used for data backup on daily basis.
Figure 3 . Overview of IT system in Enterprise: Oil and Gas Industry
Figure 4 . Deployment of above scenario using cloud services
Now, let us see if we implement the cloud computing using amazon EC2
how it could be implemented and here Company B would deploy the
system and maintain the system. As shown in above figure. Here,
Implementation and changes in system usage causes technological as
well as fundamental improvements by IT (Creeger, 2009). To deploy
cloud computing in any enterprises multiple points are to be considered
like: benefits,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CLOUD-ENTERPRISE 2
risk factors and other effects on their organization model. Here
considered case study is the real-life organization to provide basic effects
in deploying cloud computing(Zhou, Chen, Lin, Wang, & Yang, 2013).
Method of Implementation
As discussed in the main section, here Company B is an IT solution
company so it has to make some ground level work like documentation
work by relating and investigating and study. In all there are three
stages for this work:
Stage 1: Infrastructure cost calculation and evaluation by
comparing different infrastructure setup.
Stage 2: Analysis of potential affect by migrating systems in support
calls with the existing database of support and maintenance issues.
Stage 3: Results obtained from above stages are then projected to
employees and then different sessions are arranged for the
understanding of Amazon EC2 to get familiar with the
technology.These meetings are recorded and formed transcripts for the
others who are not present in meetings and a numbers of issues
were identified and agreed using a stakeholder impact analysis
Stakeholders review in important for the business enterprise as it
identifies potential sources and risk factors. Meetings review points are :
Identifying relevant stakeholders. Recognizing changes to be perform as
per requirement and the way to perform them. Identifying key resources,
time, abilities, values, status and satisfaction for changes with respect to
stakeholders. Analyize all changes in context to relational factors for
individual as well as groups of stakeholders. Determining whether the
stakeholder will perceive the change as unjust (either proceduraly or
distributively) based upon changes and their relational context.
Expected Outcomes
Document Page
CLOUD-ENTERPRISE 2
These are obtained by analysis of infrastructure costs, Support and
Maintenance & Stake- holder Analysis
Document Page
CLOUD-ENTERPRISE 2
Infrastructure Cost. Below table shows the analysis comparison as per
ground work done by team.
Table 1
Comparison of infrastructure cost
Support and Maintenance.
Figure 5 . Support calls ratio
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CLOUD-ENTERPRISE 2
Conclusion
A combination of cloud computing and enterprises is a trend changing
technical turnout. The facility of pay-per use model is the best concept
for the enterprises so as to use resource as per requirements and pay as
per use. without any waste of resources. Thus it will increase in its
productivity economically too. The security is the important re-
sponsibility of any provider for enterprises. The strength of cloud
computing is risk management and develop the system which has ability
to manage risk more effectively from central planning. Architectural
approach and requirements provides for all provider, user and enterprise
which creates bridge between complete implementation.
As per above case study, we obtain 35% above cost deduction in a span of
5 years with using EC2 and 20% or more reduction in support calls that
proves the system stability increment.
Document Page
CLOUD-ENTERPRISE 2
References
Bisong, A., Rahman, M. et al. (2011). An overview of the security concerns
in enterprise cloud computing. arXiv preprint arXiv:1101.5613.
Carr, N. & Yu, F. (2008). It is no longer important: the internet great
change of the
high ground-cloud computing. In The big switch: rewining the
world, from edison to google (pp. 1–1). CITIC Publishing House.
Chan, W., Mei, L., & Zhang, Z. (2009). Modeling and testing of cloud
applications. In
2009 ieee asia-pacific services computing conference (apscc) (pp.
111–118). IEEE. Creeger, M. (2009). Cto roundtable: cloud computing.
Queue, 7 (5), 1.
Hosseini, A., Sommerville, I., & Sriram, I. (2010). Research challenges for
enterprise cloud computing. In Proc. acm socc (pp. 1–11).
Hubbard, D., Sutton, M. et al. (2010). Top threats to cloud computing v1.
0. Cloud
Security Alliance, 1–14.
Khajeh-Hosseini, A., Greenwood, D., & Sommerville, I. (2010). Cloud
migration: a case study of migrating an enterprise it system to iaas.
In 2010 ieee 3rd international conference on cloud computing (pp.
450–457). IEEE.
Markoff, J. & Barboza, D. (2010). 2 china schools said to be tied to online
attacks. The
New York Times, 18.
Pring, B., Brown, R. H., Frank, A., Hayward, S., & Leong, L. (2009).
Forecast: sizing the cloud; understanding the opportunities in cloud
services. Gartner, Inc., Research Report G, 166525.
Rimal, B. P., Jukan, A., Katsaros, D., & Goeleven, Y. (2011). Architectural
require- ments for cloud computing systems: an enterprise cloud
approach. Journal of Grid Computing, 9 (1), 3–26.
Zhou, Z., Chen, S., Lin, M., Wang, G., & Yang, Q. (2013). Minimizing
average startup latency of vms by clustering-based template caching
scheme in an iaas system. International Journal of u-and e-Service,
Science and Technology, 6 (6), 145–158.
chevron_up_icon
1 out of 24
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]