Strategic Cloud Migration Plan for Regional Gardens Ltd Web Services
VerifiedAdded on 2023/06/11
|13
|3204
|181
Report
AI Summary
This report outlines a cloud computing and migration strategy for Regional Gardens Ltd, an Australian company with various gardening enterprises. The proposal involves retaining the Bathurst data center for data storage while migrating all other infrastructure, particularly web services, to the cloud for increased high availability and flexibility using a microservices model. The report discusses the requirements for remote server administration, resource management, and SLA management in a cloud environment. It also details the steps involved in migrating services to the cloud, including the plan for migration and critical points and issues that may arise at each step. The report emphasizes the importance of security considerations during cloud migration and the need for careful planning to ensure data integrity and service availability. This document is available on Desklib, a platform offering a wide range of study resources, including past papers and solved assignments for students.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CLOUD COMPUTING
Cloud Computing
Name of the Student:
Name of the University:
Author note:
Cloud Computing
Name of the Student:
Name of the University:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

CLOUD COMPUTING
Table of Contents
5. Requirements of Regional Gardens considering conduction of remote server administration,
resource management and SLA management..................................................................................3
6. A. The steps including the plan for migration of the services.....................................................5
6. B. The critical points and issues occurring at each step..............................................................7
References......................................................................................................................................11
Table of Contents
5. Requirements of Regional Gardens considering conduction of remote server administration,
resource management and SLA management..................................................................................3
6. A. The steps including the plan for migration of the services.....................................................5
6. B. The critical points and issues occurring at each step..............................................................7
References......................................................................................................................................11

CLOUD COMPUTING
5. Requirements of Regional Gardens considering conduction of remote server
administration, resource management and SLA management
The remote administration system mechanism gives several tools and user-interfaces to
the external cloud resource management for configuring and administrating cloud-based
resources. However, a remote administration system helps to develop a portal for evaluating
administration and management features of various underlying systems. It includes resource
management, remote server administration as well as SLA management. The system is also
underlying management systems for exposing and makes centralize administration control for
external cloud resource administrators. The system also gives a customizable user control and
customizes the online portals that can provide cloud customers with various administrative
systems (Hashem et al. 2015). Cloud provider in order to develop as well as customize online
portals providing cloud customers with several ranges of administrative controls usually utilizes
the tools as well as APIs given by a remote administration system. The following are considered
as the types of portals created with remote administration system.
Figure 1: Remote administration system
(Source: Botta et al. 2016, p.685)
5. Requirements of Regional Gardens considering conduction of remote server
administration, resource management and SLA management
The remote administration system mechanism gives several tools and user-interfaces to
the external cloud resource management for configuring and administrating cloud-based
resources. However, a remote administration system helps to develop a portal for evaluating
administration and management features of various underlying systems. It includes resource
management, remote server administration as well as SLA management. The system is also
underlying management systems for exposing and makes centralize administration control for
external cloud resource administrators. The system also gives a customizable user control and
customizes the online portals that can provide cloud customers with various administrative
systems (Hashem et al. 2015). Cloud provider in order to develop as well as customize online
portals providing cloud customers with several ranges of administrative controls usually utilizes
the tools as well as APIs given by a remote administration system. The following are considered
as the types of portals created with remote administration system.
Figure 1: Remote administration system
(Source: Botta et al. 2016, p.685)

CLOUD COMPUTING
The following are considered as primary types of portals that is helpful to provide
customizable user console at the time of interfacing management. It provides a customizable user
control at the time of programming management system through APIs.
Remote server administration tool:
(Almorsy et al. 2016). In addition, in restricted place, instruments are used to overcome
parts as well as elements that are running over Windows Server 2008 or Windows Server 2008.
On the other hand, some of the needs are performing to control similar as Windows Server 2003.
Requirements of resource management:
It is important for Windows 8 for incorporating with server manager. The Microsoft
Management Console snap and Windows PowerShell along with suppliers have an important
role in it. It includes command-line tools for controlling feature and responsibility that are
running on Windows Server 2012.
SLA management:
On the other hand, the ‘OnCommand’ cloud manager could be utilized in order to deliver
core points about management. It can be achieved on cloud. It helps to replace data across multi-
cloud and hybrid storage. In addition, it manages expenses of the cloud storages. However,
movement to cloud includes various ramifications. It is an imperative change on the standard of
SLA. However, it is characterizing SLAs as per the abilities of domains. It is closed on premises
(Pulier et al. 2015). In addition, with hybrid cloud includes on-premises as well as distinctive
off-premises assets as well as stages. The SLAs require covering up ability of several IT
atmosphere.
The following are considered as primary types of portals that is helpful to provide
customizable user console at the time of interfacing management. It provides a customizable user
control at the time of programming management system through APIs.
Remote server administration tool:
(Almorsy et al. 2016). In addition, in restricted place, instruments are used to overcome
parts as well as elements that are running over Windows Server 2008 or Windows Server 2008.
On the other hand, some of the needs are performing to control similar as Windows Server 2003.
Requirements of resource management:
It is important for Windows 8 for incorporating with server manager. The Microsoft
Management Console snap and Windows PowerShell along with suppliers have an important
role in it. It includes command-line tools for controlling feature and responsibility that are
running on Windows Server 2012.
SLA management:
On the other hand, the ‘OnCommand’ cloud manager could be utilized in order to deliver
core points about management. It can be achieved on cloud. It helps to replace data across multi-
cloud and hybrid storage. In addition, it manages expenses of the cloud storages. However,
movement to cloud includes various ramifications. It is an imperative change on the standard of
SLA. However, it is characterizing SLAs as per the abilities of domains. It is closed on premises
(Pulier et al. 2015). In addition, with hybrid cloud includes on-premises as well as distinctive
off-premises assets as well as stages. The SLAs require covering up ability of several IT
atmosphere.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

CLOUD COMPUTING
Cloud computing can represent a new model of computing, which poses several
demanding security issues in various levels. Network host, application as well as data levels are
included in it. Several types of delivery models can present security challenges depending on the
particular model of quality of service requirements. Integrity, authenticity as well as privacy are
the major concerns for cloud providers as well as customers.
6. A. The steps including the plan for migration of the services
The SharePoint over AWS needs to run. It is achieved for scaling as well as development
of collaboration platform in faster way. The benefits of cloud of AWS have been delivering
taken as getting advantages (Sen 2015). It consists of scalability, data integrity as well as pricing
in order to run present Sharepoint workloads. On the other hand, the AWS is delivering scopes
in order to use present licenses of Microsoft.
Cloud are enormous pools of adequately usable and accessible virtualized resources.
These advantages can be dynamically reconfigured to comply with a variable load (scale),
allowing perfect resource utilization. Programming, Platform, and Infrastructure as a Service are
the three essential organization transport models for Cloud Computing. Those models are open
as an organization over the Internet (Tao et al. 2014). Organizations and individuals can benefit
by mass preparing and limit centers, outfitted by tremendous Organizations with consistent and
strong cloud structures. Disseminated processing combines virtualization, on demand course of
action, Internet transport of organizations, and open source programming. From one perspective,
dispersed registering is only old news new in light of the fact that it uses philosophies, thoughts,
and best practices that have quite recently been set up. From another perspective, everything is
new in light of the way that conveyed processing changes how we envision, make, send, scale,
Cloud computing can represent a new model of computing, which poses several
demanding security issues in various levels. Network host, application as well as data levels are
included in it. Several types of delivery models can present security challenges depending on the
particular model of quality of service requirements. Integrity, authenticity as well as privacy are
the major concerns for cloud providers as well as customers.
6. A. The steps including the plan for migration of the services
The SharePoint over AWS needs to run. It is achieved for scaling as well as development
of collaboration platform in faster way. The benefits of cloud of AWS have been delivering
taken as getting advantages (Sen 2015). It consists of scalability, data integrity as well as pricing
in order to run present Sharepoint workloads. On the other hand, the AWS is delivering scopes
in order to use present licenses of Microsoft.
Cloud are enormous pools of adequately usable and accessible virtualized resources.
These advantages can be dynamically reconfigured to comply with a variable load (scale),
allowing perfect resource utilization. Programming, Platform, and Infrastructure as a Service are
the three essential organization transport models for Cloud Computing. Those models are open
as an organization over the Internet (Tao et al. 2014). Organizations and individuals can benefit
by mass preparing and limit centers, outfitted by tremendous Organizations with consistent and
strong cloud structures. Disseminated processing combines virtualization, on demand course of
action, Internet transport of organizations, and open source programming. From one perspective,
dispersed registering is only old news new in light of the fact that it uses philosophies, thoughts,
and best practices that have quite recently been set up. From another perspective, everything is
new in light of the way that conveyed processing changes how we envision, make, send, scale,

CLOUD COMPUTING
invigorate, keep up, and pay for applications and the establishment on which they run. (Wei et al.
2014). IaaS gives fundamental provisioning of planning, amassing, frameworks, and other
essential enlisting resources over a framework. With IaaS, IT organizations can be passed on as
an enrollment advantage, taking out ahead of time costs and driving down constant help costs
(enabling Organizations to make a key move from a CAPEX to OPEX based plan of activity.
So also as with regulated encouraging, IaaS providers limit costs by pooling resources
and giving customers access to a shared office. Regardless, a significant difference is that IaaS
resources are adaptable and available on a self-service, on-ask for start (Di Spaltro et al. 2016).
While IaaS providers every now and again fluctuate in their specific commitments, key features
of all IaaS models include instant association, Ability to rapidly scale, Lower TCO and
Predictable uptime. Structure as-a-Service (IaaS) addresses another usage appears for its use
resources. An IaaS provider offers customers’ transmission limits, storing and figure control on
an adaptable, on-ask for commence, over the Internet. Organizations' motivations behind picking
an IaaS area differentiate, dependent upon the measure of the Organization and the possibility of
the business. Cost is much of the time the fundamental reason (Sanaei et al. 2014). For Small and
Medium Businesses (SMBs) with an obliged capital spending design, IaaS moves the capital
need to an operational cost that tracks with the improvement of the business. To be sure, even
among colossal undertakings, establishment costs are a primary purpose for contemplating IaaS.
IaaS' other key focal points consolidate upgraded wage, accommodation of for the most part
wrong course of action masterminding, and remarkable straightforwardness being used and
costs. Traditionally, Organizations met their creating IT needs by placing assets into more capital
apparatus.
invigorate, keep up, and pay for applications and the establishment on which they run. (Wei et al.
2014). IaaS gives fundamental provisioning of planning, amassing, frameworks, and other
essential enlisting resources over a framework. With IaaS, IT organizations can be passed on as
an enrollment advantage, taking out ahead of time costs and driving down constant help costs
(enabling Organizations to make a key move from a CAPEX to OPEX based plan of activity.
So also as with regulated encouraging, IaaS providers limit costs by pooling resources
and giving customers access to a shared office. Regardless, a significant difference is that IaaS
resources are adaptable and available on a self-service, on-ask for start (Di Spaltro et al. 2016).
While IaaS providers every now and again fluctuate in their specific commitments, key features
of all IaaS models include instant association, Ability to rapidly scale, Lower TCO and
Predictable uptime. Structure as-a-Service (IaaS) addresses another usage appears for its use
resources. An IaaS provider offers customers’ transmission limits, storing and figure control on
an adaptable, on-ask for commence, over the Internet. Organizations' motivations behind picking
an IaaS area differentiate, dependent upon the measure of the Organization and the possibility of
the business. Cost is much of the time the fundamental reason (Sanaei et al. 2014). For Small and
Medium Businesses (SMBs) with an obliged capital spending design, IaaS moves the capital
need to an operational cost that tracks with the improvement of the business. To be sure, even
among colossal undertakings, establishment costs are a primary purpose for contemplating IaaS.
IaaS' other key focal points consolidate upgraded wage, accommodation of for the most part
wrong course of action masterminding, and remarkable straightforwardness being used and
costs. Traditionally, Organizations met their creating IT needs by placing assets into more capital
apparatus.

CLOUD COMPUTING
Cloud computing is one of the major practices in Regional Gardens where network of
remote server can be hosted. It can be achieved over internet. In addition, it assists in storing,
managing as well as processing data. Regional Gardens Ltd is one of the organizations in
Australia. It is considering several proposals regarding strategy needed to analyze. Determination
of model of cloud deployments for data is considered as important for the organization. The
important step is giving definition of appropriate data. Implementation of cloud infrastructure is
important for the organization as the options for implementation on premises and hosted private
clouds (Chen et al. 2016). The hosted private cloud as well as public cloud along with the
combination of all procedure is included in it. The requirement of every link in the elements is
required to consider. The elements are spanning several cloud services. Hence, it can be ensured
that virtualization of network usage is considered as available.
6. B. The critical points and issues occurring at each step
Clouds are considered as large pools of easily usable as well as accessible virtualized
resources. The resources are reconfigured dynamically in order to adjust variable load. It also
allows optimum use of resources. Software, platform as well as infrastructure are considered as
major service delivery models for cloud computing. The models can be accessible as one of the
services over internet. It is known as pay-per-use model in service level agreements. It also
offers ensuring that the infrastructure management is important for the organizations (Chen
2015). Cloud computing can incorporate virtualization and implementation based on demand.
Hence, from a perspective, it is important to use cloud computing as it utilizes approaches and
concepts that is considered as the best practices for the organization. It helps to develop,
implement, scale as well as update and maintain applications. Cloud computing is considered a
Cloud computing is one of the major practices in Regional Gardens where network of
remote server can be hosted. It can be achieved over internet. In addition, it assists in storing,
managing as well as processing data. Regional Gardens Ltd is one of the organizations in
Australia. It is considering several proposals regarding strategy needed to analyze. Determination
of model of cloud deployments for data is considered as important for the organization. The
important step is giving definition of appropriate data. Implementation of cloud infrastructure is
important for the organization as the options for implementation on premises and hosted private
clouds (Chen et al. 2016). The hosted private cloud as well as public cloud along with the
combination of all procedure is included in it. The requirement of every link in the elements is
required to consider. The elements are spanning several cloud services. Hence, it can be ensured
that virtualization of network usage is considered as available.
6. B. The critical points and issues occurring at each step
Clouds are considered as large pools of easily usable as well as accessible virtualized
resources. The resources are reconfigured dynamically in order to adjust variable load. It also
allows optimum use of resources. Software, platform as well as infrastructure are considered as
major service delivery models for cloud computing. The models can be accessible as one of the
services over internet. It is known as pay-per-use model in service level agreements. It also
offers ensuring that the infrastructure management is important for the organizations (Chen
2015). Cloud computing can incorporate virtualization and implementation based on demand.
Hence, from a perspective, it is important to use cloud computing as it utilizes approaches and
concepts that is considered as the best practices for the organization. It helps to develop,
implement, scale as well as update and maintain applications. Cloud computing is considered a
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CLOUD COMPUTING
technology for using internet as well as various applications running on it. Hence, it is important
to determine the steps occurring in it.
Checking the proper table has several entries about route for KMS access as well as the
metadata is achieved.
The regulations for security group of KMS access and metadata can be achieved.
The specific version regarding the driver needs to be achieved (Gai et al. 2016)
It is important to check the registry key for real times universal key
While using several distinctive NICSs and default settings of the gateways are
deployed properly.
The mini dump file and bug checking of the codes is important to be done.
The cloud computing is considered as major objective for Regional Garden. Awareness
for security has been reluctant for transferring data as well as workload in cloud. The primary
innovation behind cloud administrators as well as model for cloud computing is considered as
selection of solid footing in business.
Today, centered weights keep around requesting changes in nature of organization paying
little respect to creating amounts of customers and applications. Meanwhile, the testing monetary
condition has extended weight on IT workplaces to limit costs (Botta et al. 2014). The
converging of those examples, with various advances of the latest a significant drawn-out period,
has made it possible to take structure outsourcing to another level. Developing the foundation of
administered organizations, for instance, collocation, encouraging, and virtualization
organizations, Infrastructure-as-a-Service (IaaS) has created as an easily sent organization that
technology for using internet as well as various applications running on it. Hence, it is important
to determine the steps occurring in it.
Checking the proper table has several entries about route for KMS access as well as the
metadata is achieved.
The regulations for security group of KMS access and metadata can be achieved.
The specific version regarding the driver needs to be achieved (Gai et al. 2016)
It is important to check the registry key for real times universal key
While using several distinctive NICSs and default settings of the gateways are
deployed properly.
The mini dump file and bug checking of the codes is important to be done.
The cloud computing is considered as major objective for Regional Garden. Awareness
for security has been reluctant for transferring data as well as workload in cloud. The primary
innovation behind cloud administrators as well as model for cloud computing is considered as
selection of solid footing in business.
Today, centered weights keep around requesting changes in nature of organization paying
little respect to creating amounts of customers and applications. Meanwhile, the testing monetary
condition has extended weight on IT workplaces to limit costs (Botta et al. 2014). The
converging of those examples, with various advances of the latest a significant drawn-out period,
has made it possible to take structure outsourcing to another level. Developing the foundation of
administered organizations, for instance, collocation, encouraging, and virtualization
organizations, Infrastructure-as-a-Service (IaaS) has created as an easily sent organization that

CLOUD COMPUTING
enables Organizations to adaptable and cost-reasonably imagine and progress with their
customers' rapidly changing business necessities.
Each provider serves a specific limit, giving customers essentially control over their
cloud dependent upon the sort. While picking a cloud provider, it is basic to balance the
necessities with the cloud organizations open (Whaiduzzaman et al. 2014). Various people
assume that appropriated processing is server virtualization (Chen 2015), anyway conveyed
figuring is extensively something other than server virtualization. Virtualization expect a
monstrous part in disseminated registering, and it cannot have the cloud (in any occasion not
securely and cost feasibly) without virtualization, yet rather it can have virtualization without the
cloud. Dispersed registering is a transport and usage illustrates, however virtualization is an
advancement that enables that model. These three sorts differentiate in the measure of control
that it have over it r information, and then again, the sum it can envision that it r provider will
enhance the circumstance it.
Understanding the interfaces between the parts is running on private cloud
administrations. It also consists of open cloud administrations as well as on-premises.
Appropriate as well as steady measures for security can be applied on it. Assessing the position
of the datasets within the hybrid cloud arrangement can be achieved. Ensure for the use of
encryption as well as controls are helpful for the process. Hence, relocating application segments
between the particular environments, privacy controls can be checked. The hybrid cloud
condition in the cloud can run due to several reasons (Botta et al. 2016). On the other hand, using
the cloud has started with the process of backing up data. However, use of cloud is required to
restart, continue as well as reconstitute the process on-premises in order to recover disasters. As
enables Organizations to adaptable and cost-reasonably imagine and progress with their
customers' rapidly changing business necessities.
Each provider serves a specific limit, giving customers essentially control over their
cloud dependent upon the sort. While picking a cloud provider, it is basic to balance the
necessities with the cloud organizations open (Whaiduzzaman et al. 2014). Various people
assume that appropriated processing is server virtualization (Chen 2015), anyway conveyed
figuring is extensively something other than server virtualization. Virtualization expect a
monstrous part in disseminated registering, and it cannot have the cloud (in any occasion not
securely and cost feasibly) without virtualization, yet rather it can have virtualization without the
cloud. Dispersed registering is a transport and usage illustrates, however virtualization is an
advancement that enables that model. These three sorts differentiate in the measure of control
that it have over it r information, and then again, the sum it can envision that it r provider will
enhance the circumstance it.
Understanding the interfaces between the parts is running on private cloud
administrations. It also consists of open cloud administrations as well as on-premises.
Appropriate as well as steady measures for security can be applied on it. Assessing the position
of the datasets within the hybrid cloud arrangement can be achieved. Ensure for the use of
encryption as well as controls are helpful for the process. Hence, relocating application segments
between the particular environments, privacy controls can be checked. The hybrid cloud
condition in the cloud can run due to several reasons (Botta et al. 2016). On the other hand, using
the cloud has started with the process of backing up data. However, use of cloud is required to
restart, continue as well as reconstitute the process on-premises in order to recover disasters. As

CLOUD COMPUTING
environment deals with perfect scenario, specific process of dynamic and flexible condition is
intended.
The cloud computing is considered as the major process for taking decision in Regional
Gardens Ltd. However, greatly security-awareness is reluctant in order to transfer information as
well as workloads in cloud. The innovation behind cloud administrations and model for cloud
computing is selecting solid footing in business. The hybrid cloud is successful project for
Regional Gardens Ltd that has a tight focus over privacy as well as specific for the used. There
are also limited hazard in hybrid cloud framework as well as permitting access from open cloud
that has remote capability to be uncertain (Almorsy et al. 2016). It is used as the information is
properly collected. However, it is valid for open system and enables organizations to be used
according to the abilities of open cloud storage suppliers. It provides adaptability in figuring out
assignments as well as keeps that as imperative parts inside the firewall of Regional Gardens Ltd.
environment deals with perfect scenario, specific process of dynamic and flexible condition is
intended.
The cloud computing is considered as the major process for taking decision in Regional
Gardens Ltd. However, greatly security-awareness is reluctant in order to transfer information as
well as workloads in cloud. The innovation behind cloud administrations and model for cloud
computing is selecting solid footing in business. The hybrid cloud is successful project for
Regional Gardens Ltd that has a tight focus over privacy as well as specific for the used. There
are also limited hazard in hybrid cloud framework as well as permitting access from open cloud
that has remote capability to be uncertain (Almorsy et al. 2016). It is used as the information is
properly collected. However, it is valid for open system and enables organizations to be used
according to the abilities of open cloud storage suppliers. It provides adaptability in figuring out
assignments as well as keeps that as imperative parts inside the firewall of Regional Gardens Ltd.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

CLOUD COMPUTING
References
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, pp.684-700.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2014, August. On the integration of cloud
computing and internet of things. Wang, B., Zheng, Y., Lou, W. and Hou, Y.T., 2015. DDoS
attack protection in the era of cloud computing and software-defined networking. Computer
Networks, 81, pp.308-319.23-30). IEEE.
Chen, X., 2015. Decentralized computation offloading game for mobile cloud computing. IEEE
Transactions on Parallel and Distributed Systems, 26(4), pp.974-983.
Chen, X., Jiao, L., Li, W. and Fu, X., 2016. Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, 24(5), pp.2795-2808.
Di Spaltro, D., Polvi, A. and Welliver, L., RACKSPACE US Inc, 2016. Methods and systems for
cloud computing management. U.S. Patent 9,501,329.
Gai, K., Qiu, M., Zhao, H., Tao, L. and Zong, Z., 2016. Dynamic energy-aware cloudlet-based
mobile cloud computing model for green computing. Journal of Network and Computer
Applications, 59, pp.46-54.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise
of “big data” on cloud computing: Review and open research issues. Information Systems, 47,
pp.98-115.
References
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, pp.684-700.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2014, August. On the integration of cloud
computing and internet of things. Wang, B., Zheng, Y., Lou, W. and Hou, Y.T., 2015. DDoS
attack protection in the era of cloud computing and software-defined networking. Computer
Networks, 81, pp.308-319.23-30). IEEE.
Chen, X., 2015. Decentralized computation offloading game for mobile cloud computing. IEEE
Transactions on Parallel and Distributed Systems, 26(4), pp.974-983.
Chen, X., Jiao, L., Li, W. and Fu, X., 2016. Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, 24(5), pp.2795-2808.
Di Spaltro, D., Polvi, A. and Welliver, L., RACKSPACE US Inc, 2016. Methods and systems for
cloud computing management. U.S. Patent 9,501,329.
Gai, K., Qiu, M., Zhao, H., Tao, L. and Zong, Z., 2016. Dynamic energy-aware cloudlet-based
mobile cloud computing model for green computing. Journal of Network and Computer
Applications, 59, pp.46-54.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise
of “big data” on cloud computing: Review and open research issues. Information Systems, 47,
pp.98-115.

CLOUD COMPUTING
Oliveira, T., Thomas, M. and Espadanal, M., 2014. Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information &
Management, 51(5), pp.497-510.
Pulier, E., Martinez, F. and Hill, D.C., ServiceMesh Inc, 2015. System and method for a cloud
computing abstraction layer. U.S. Patent 8,931,038.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features,
issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015
International Conference on (pp. 116-123). IEEE.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features,
issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015
International Conference on (pp. 116-123). IEEE.
Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R., 2014. Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1),
pp.369-392.
Sen, J., 2015. Security and privacy issues in cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L. and Li, B.H., 2014. CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions on
Industrial Informatics, 10(2), pp.1435-1442.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.
Oliveira, T., Thomas, M. and Espadanal, M., 2014. Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information &
Management, 51(5), pp.497-510.
Pulier, E., Martinez, F. and Hill, D.C., ServiceMesh Inc, 2015. System and method for a cloud
computing abstraction layer. U.S. Patent 8,931,038.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features,
issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015
International Conference on (pp. 116-123). IEEE.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features,
issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015
International Conference on (pp. 116-123). IEEE.
Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R., 2014. Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1),
pp.369-392.
Sen, J., 2015. Security and privacy issues in cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L. and Li, B.H., 2014. CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions on
Industrial Informatics, 10(2), pp.1435-1442.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.

CLOUD COMPUTING
Whaiduzzaman, M., Sookhak, M., Gani, A. and Buyya, R., 2014. A survey on vehicular cloud
computing. Journal of Network and Computer Applications, 40, pp.325-344.
Yan, Q., Yu, F.R., Gong, Q. and Li, J., 2016. Software-defined networking (SDN) and
distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some
research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), pp.602-622.
Whaiduzzaman, M., Sookhak, M., Gani, A. and Buyya, R., 2014. A survey on vehicular cloud
computing. Journal of Network and Computer Applications, 40, pp.325-344.
Yan, Q., Yu, F.R., Gong, Q. and Li, J., 2016. Software-defined networking (SDN) and
distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some
research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), pp.602-622.
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.