DTGOV's Cloud Transformation: A Case Study of Hybrid Cloud Strategy
VerifiedAdded on 2023/03/23
|30
|6239
|95
Case Study
AI Summary
This report provides a comprehensive analysis of DTGOV's strategic proposal to implement a hybrid cloud structure, focusing on resource pooling and cloud bursting architectures. It explores the benefits of this implementation, such as improved collaboration, cost flexibility, and enhanced scalability, while also addressing potential issues like downtime and security risks. The report delves into the risks associated with hybrid cloud and microservice strategies, including lack of encryption, inadequate risk assessment, poor compliance, and data redundancy, offering mitigation plans for each. Furthermore, it outlines information security steps and controls, including authentication, authorization, and incident management, and provides recommendations for disaster recovery and business continuity. The analysis concludes with a checklist for ensuring a smooth transition and highlights the overall advantages of adopting a well-planned cloud strategy for DTGOV.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CLOUD COMPUTING
Cloud Computing
Name of the Student
Name of the University
Author Note
Cloud Computing
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1CLOUD COMPUTING
Executive Summary
The report discusses the case summary of DTGOV and their proposal of implementing
hybrid cloud structure into their system. The architectures of hybrid cloud computing is
discussed in this report are resource pooling architecture and cloud bursting architecture.
Each of the models has potential advantages in promoting performance and productivity.
Thus, implementation of hybrid cloud into the system will enhance business growth for the
company.
Executive Summary
The report discusses the case summary of DTGOV and their proposal of implementing
hybrid cloud structure into their system. The architectures of hybrid cloud computing is
discussed in this report are resource pooling architecture and cloud bursting architecture.
Each of the models has potential advantages in promoting performance and productivity.
Thus, implementation of hybrid cloud into the system will enhance business growth for the
company.

2CLOUD COMPUTING
Table of Contents
Introduction................................................................................................................................4
Response 1.................................................................................................................................5
Implementation of Architecture.............................................................................................5
Resource Pooling Architecture..............................................................................................5
Cloud Bursting Architecture..................................................................................................6
Benefits of the cloud architecture..........................................................................................8
Issues of the cloud computing architecture..........................................................................10
Response 2...............................................................................................................................11
Risk associated with the Hybrid Cloud and Microservice Strategy.....................................11
Response 3...............................................................................................................................16
Information security steps and control.................................................................................16
Steps and Controls................................................................................................................16
Recommendations................................................................................................................18
Response 4...............................................................................................................................18
Inclusion of the recommendation.........................................................................................18
Disaster Recovery............................................................................................................19
Response 5...............................................................................................................................22
Table of Contents
Introduction................................................................................................................................4
Response 1.................................................................................................................................5
Implementation of Architecture.............................................................................................5
Resource Pooling Architecture..............................................................................................5
Cloud Bursting Architecture..................................................................................................6
Benefits of the cloud architecture..........................................................................................8
Issues of the cloud computing architecture..........................................................................10
Response 2...............................................................................................................................11
Risk associated with the Hybrid Cloud and Microservice Strategy.....................................11
Response 3...............................................................................................................................16
Information security steps and control.................................................................................16
Steps and Controls................................................................................................................16
Recommendations................................................................................................................18
Response 4...............................................................................................................................18
Inclusion of the recommendation.........................................................................................18
Disaster Recovery............................................................................................................19
Response 5...............................................................................................................................22

3CLOUD COMPUTING
Checklist of Morad and Dalbhanjan....................................................................................22
Conclusion................................................................................................................................23
References................................................................................................................................25
Checklist of Morad and Dalbhanjan....................................................................................22
Conclusion................................................................................................................................23
References................................................................................................................................25
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4CLOUD COMPUTING
Introduction
The reports focus on the detailed deliberation of the security issues, risks and the
methods present in the implementation of cloud computing. The reason for standardizing the
service portfolio of DTGOV is to attain operational optimization and effective cost measures.
DTGOV has planned out several strategic proposals to achieve effectiveness and
optimization. DTGOV have three data centers out of which they want to conserve one solely
for the storage of data. The step to conserve the data centre would require the updating of
DTGOV’s Active Directory as well as the data storage infrastructure. The entire
infrastructure has to be moved into the cloud. The initial plan of DTGOV is to move the Web
Services to the cloud. This will increase HA (High Availability) level and provide an
enhanced degree of flexibility for supplying the data to the employees and consumers
(Marinescu, 2017). DTGOV can only draw advantages of scalability and the flexibility when
they change the existing wed software architecture. This can be done by moving the service
to the Microservices model. Services like Azure Functions or AWS Lambda, data services,
containers and lastly cloud edge monitoring and capability. DTGOV has propositions to
migrate their Line of Business (LOB) applications to the Public cloud. This will prove to
increase their availability and flexibility.
The strategy is used to enhance the responsiveness and flexibility of the company.
The scheme will provide the company with effective cost reduction methods and savings in
maintaining the ICT infrastructure. This will be done by shutting down the other two data
centers. The strategy will help them to manage the new Cloud infrastructure.
Introduction
The reports focus on the detailed deliberation of the security issues, risks and the
methods present in the implementation of cloud computing. The reason for standardizing the
service portfolio of DTGOV is to attain operational optimization and effective cost measures.
DTGOV has planned out several strategic proposals to achieve effectiveness and
optimization. DTGOV have three data centers out of which they want to conserve one solely
for the storage of data. The step to conserve the data centre would require the updating of
DTGOV’s Active Directory as well as the data storage infrastructure. The entire
infrastructure has to be moved into the cloud. The initial plan of DTGOV is to move the Web
Services to the cloud. This will increase HA (High Availability) level and provide an
enhanced degree of flexibility for supplying the data to the employees and consumers
(Marinescu, 2017). DTGOV can only draw advantages of scalability and the flexibility when
they change the existing wed software architecture. This can be done by moving the service
to the Microservices model. Services like Azure Functions or AWS Lambda, data services,
containers and lastly cloud edge monitoring and capability. DTGOV has propositions to
migrate their Line of Business (LOB) applications to the Public cloud. This will prove to
increase their availability and flexibility.
The strategy is used to enhance the responsiveness and flexibility of the company.
The scheme will provide the company with effective cost reduction methods and savings in
maintaining the ICT infrastructure. This will be done by shutting down the other two data
centers. The strategy will help them to manage the new Cloud infrastructure.

5CLOUD COMPUTING
Response 1
Implementation of Architecture
The company should implement numerous concepts to build scalable cloud
applications. Architectures that will be implemented are as follows:
(a) Resource Pooling Architecture and (b) Cloud Bursting Architecture
The architecture concept is critical as there is a need to measure expanding datasets,
quicker response time and unpredictable traffic flow (Caulfield et al., 2016).
Resource Pooling Architecture
The root of the resource pooling architecture lies in the pooling of similar resources
(IT) into groups. Virtual resources and physical resources are the two types in a pool. The
similar resources are grouped automatically to maintain and ensure synchronization. Physical
server pools comprise a network server which has operating systems and it can be readily
used. Storage pool comprises block storage containers and files (Fuchs et al., 2018) The CPU
pool allocates CPU resources to the virtual servers. There are pre-configured devices in the
network pool like virtual firewalls and load balancing to name a few. The significant purpose
for the deployment of this architecture is to ensure system synchronization of the IT resources
which are pooled (Samimi, Teimouri & Mukhtar, 2016).
The resources are organized in the hierarchical order to chart out the parent, sibling
and the nested pools. This is done to reduce the complexity of the process. Once the pools are
defined, each pool is taken to create in-memory pool of the IT resources which are live and
can be pulled out anytime on demand to use. Another advantage of the resource pooling
Response 1
Implementation of Architecture
The company should implement numerous concepts to build scalable cloud
applications. Architectures that will be implemented are as follows:
(a) Resource Pooling Architecture and (b) Cloud Bursting Architecture
The architecture concept is critical as there is a need to measure expanding datasets,
quicker response time and unpredictable traffic flow (Caulfield et al., 2016).
Resource Pooling Architecture
The root of the resource pooling architecture lies in the pooling of similar resources
(IT) into groups. Virtual resources and physical resources are the two types in a pool. The
similar resources are grouped automatically to maintain and ensure synchronization. Physical
server pools comprise a network server which has operating systems and it can be readily
used. Storage pool comprises block storage containers and files (Fuchs et al., 2018) The CPU
pool allocates CPU resources to the virtual servers. There are pre-configured devices in the
network pool like virtual firewalls and load balancing to name a few. The significant purpose
for the deployment of this architecture is to ensure system synchronization of the IT resources
which are pooled (Samimi, Teimouri & Mukhtar, 2016).
The resources are organized in the hierarchical order to chart out the parent, sibling
and the nested pools. This is done to reduce the complexity of the process. Once the pools are
defined, each pool is taken to create in-memory pool of the IT resources which are live and
can be pulled out anytime on demand to use. Another advantage of the resource pooling

6CLOUD COMPUTING
architecture is resource pooling can be used both vertically or horizontally scale system (Xie
et al., 2017). The scaling depends on the organization of the pool.
Figure 1. Resource Pooling Architecture
Source: (Created By Author)
Cloud Bursting Architecture
The cloud bursting framework works in the hybrid cloud environment to deal with the
demand peaks in IT. In this architecture there occurs no interruption in the services as when
there is an overflow of traffic. The traffic is directed to the public cloud if there is a 100
percent resource utilization in the private cloud (Cao et al., 2017). The reason behind the
architecture is resource pooling can be used both vertically or horizontally scale system (Xie
et al., 2017). The scaling depends on the organization of the pool.
Figure 1. Resource Pooling Architecture
Source: (Created By Author)
Cloud Bursting Architecture
The cloud bursting framework works in the hybrid cloud environment to deal with the
demand peaks in IT. In this architecture there occurs no interruption in the services as when
there is an overflow of traffic. The traffic is directed to the public cloud if there is a 100
percent resource utilization in the private cloud (Cao et al., 2017). The reason behind the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CLOUD COMPUTING
deployment of cloud bursting architecture in the organization is that it is highly flexible and
provides self-service functionality. The major advantage of cloud bursting architecture is the
framework is highly flexible and economical. The cost lies in the additional resources if there
is a high demand for the resources, hence there is no additional cost on the extra capacity or
in the prediction of fluctuations and demand peaks. Additional advantage of Cloud burst
architecture is to meet peak demand; the application can be initially applied to private cloud
later bursting it into public cloud (Clemente-Castelló et al., 2018). When the requirement is
met, the architecture “bursts in” back to the on-premise environment The application can be
used to minimize processing burdens by removing the applications from the private cloud and
feeding it into the public cloud. This method frees up the local resources for additional
business critical applications. The very base of the architecture works on the principle of
resource replication mechanisms and automated scaling listener. The resource replication
maintains the synchronization of the IT resources (cloud based) and the on premise resource.
Automated scaling listener redirects request to the IT resources (cloud based).
deployment of cloud bursting architecture in the organization is that it is highly flexible and
provides self-service functionality. The major advantage of cloud bursting architecture is the
framework is highly flexible and economical. The cost lies in the additional resources if there
is a high demand for the resources, hence there is no additional cost on the extra capacity or
in the prediction of fluctuations and demand peaks. Additional advantage of Cloud burst
architecture is to meet peak demand; the application can be initially applied to private cloud
later bursting it into public cloud (Clemente-Castelló et al., 2018). When the requirement is
met, the architecture “bursts in” back to the on-premise environment The application can be
used to minimize processing burdens by removing the applications from the private cloud and
feeding it into the public cloud. This method frees up the local resources for additional
business critical applications. The very base of the architecture works on the principle of
resource replication mechanisms and automated scaling listener. The resource replication
maintains the synchronization of the IT resources (cloud based) and the on premise resource.
Automated scaling listener redirects request to the IT resources (cloud based).

8CLOUD COMPUTING
Figure 2: Cloud Bursting Architecture
Source: (Created By Author)
Benefits of the cloud architecture
The benefits of the above mentioned cloud computing architecture are as follows:
Development of Collaboration: The mentioned cloud computing architecture creates
improvement in employee collaboration to virtually interact and share information
effortlessly (Botta et.al, 2016).
Flexible cost: The cost required for the deployment of the cloud computing architecture
is low compared to other conventional methods. The services are completely exempted
Figure 2: Cloud Bursting Architecture
Source: (Created By Author)
Benefits of the cloud architecture
The benefits of the above mentioned cloud computing architecture are as follows:
Development of Collaboration: The mentioned cloud computing architecture creates
improvement in employee collaboration to virtually interact and share information
effortlessly (Botta et.al, 2016).
Flexible cost: The cost required for the deployment of the cloud computing architecture
is low compared to other conventional methods. The services are completely exempted

9CLOUD COMPUTING
from additional capital expenditure. There is no cost in implementing of hardware. The
payment is done on the basis of the service required and no spillover costs are required.
Innovative Software: The clouds are updated to provide new opportunities, services,
flexibility, features and functionality to the numerous customers and clients.
Availability: The major benefit of the cloud computing is that the services are available
all through the day offering reliable services and certain functions even work off-line
(Martinez & Pulier, 2015).
Capacity flexibility: The cloud provides flexible services to its users and can be
controlled according to the circumstance of the user. The cloud architecture can be
adjusted to feed in data and the capacity can be shrunk to minimize cost. Cloud bursting
technology provides a failsafe mean for the enterprise to not get hamstrung by sever
crashes and overflow (Chang & Pathak, 2017).
Scalability: The introduction of the architecture into the system will enhance the
scalability of the environment it is deployed in (Li et al., 2018).
Mobility: The above mentioned cloud computing architectures will increase mobility and
availability of data easy for the employees.
Carbon Footprint: The architecture reduces carbon footprint for the organization. It
allows the utilization of the necessary quantity of the resources and aids in avoiding over
provisioning. Prevents wastage of energy and resources.
Easy management of IT resources: Implementation of the architectures eases out the
process of IT resource management and maintenance.
Strategic edge: The deployment of the cloud computing architecture provides a strategic
edge without excess upfront cost and nominal provision time.
from additional capital expenditure. There is no cost in implementing of hardware. The
payment is done on the basis of the service required and no spillover costs are required.
Innovative Software: The clouds are updated to provide new opportunities, services,
flexibility, features and functionality to the numerous customers and clients.
Availability: The major benefit of the cloud computing is that the services are available
all through the day offering reliable services and certain functions even work off-line
(Martinez & Pulier, 2015).
Capacity flexibility: The cloud provides flexible services to its users and can be
controlled according to the circumstance of the user. The cloud architecture can be
adjusted to feed in data and the capacity can be shrunk to minimize cost. Cloud bursting
technology provides a failsafe mean for the enterprise to not get hamstrung by sever
crashes and overflow (Chang & Pathak, 2017).
Scalability: The introduction of the architecture into the system will enhance the
scalability of the environment it is deployed in (Li et al., 2018).
Mobility: The above mentioned cloud computing architectures will increase mobility and
availability of data easy for the employees.
Carbon Footprint: The architecture reduces carbon footprint for the organization. It
allows the utilization of the necessary quantity of the resources and aids in avoiding over
provisioning. Prevents wastage of energy and resources.
Easy management of IT resources: Implementation of the architectures eases out the
process of IT resource management and maintenance.
Strategic edge: The deployment of the cloud computing architecture provides a strategic
edge without excess upfront cost and nominal provision time.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10CLOUD COMPUTING
Issues of the cloud computing architecture
There are several concerns in using cloud computing. The most prominent disadvantage of
cloud computing is confidentiality of data. Maintaining integrity and security of data is a
major threat (Di, Polvi & Welliver, 2016). The issues associated with the mentioned cloud
computing architecture are as follows:
Downtime: The chief disadvantage of cloud architecture implementation is downtime.
The cloud computing services are completely dependent on the internet for its working.
The cloud has new entrants each day and gets overwhelmed leading to technical outages.
Overwhelming leads to the suspension of business procedures (Almorsy, Grundy &
Müller, 2016).
Security Issues: Security issues increases when business uses cloud service to run their
business. There is an increased threat when cloud is implemented in the business model.
The service provider gets the access to confidential company data. As there are multiple
users hosted on the cloud, it increases vulnerability of the cloud and chances of data theft
(Ali, Khan & Vasilakos, 2015).
Vendor lock-in: Changing service provider becomes a complicated process and it results
in vendor lock in. Switching the services involves complication (Sen, 2015).
Issues of the cloud computing architecture
There are several concerns in using cloud computing. The most prominent disadvantage of
cloud computing is confidentiality of data. Maintaining integrity and security of data is a
major threat (Di, Polvi & Welliver, 2016). The issues associated with the mentioned cloud
computing architecture are as follows:
Downtime: The chief disadvantage of cloud architecture implementation is downtime.
The cloud computing services are completely dependent on the internet for its working.
The cloud has new entrants each day and gets overwhelmed leading to technical outages.
Overwhelming leads to the suspension of business procedures (Almorsy, Grundy &
Müller, 2016).
Security Issues: Security issues increases when business uses cloud service to run their
business. There is an increased threat when cloud is implemented in the business model.
The service provider gets the access to confidential company data. As there are multiple
users hosted on the cloud, it increases vulnerability of the cloud and chances of data theft
(Ali, Khan & Vasilakos, 2015).
Vendor lock-in: Changing service provider becomes a complicated process and it results
in vendor lock in. Switching the services involves complication (Sen, 2015).

11CLOUD COMPUTING
Response 2
Risk associated with the Hybrid Cloud and Microservice Strategy
Hybrid cloud merges two cloud technologies, the public and the private cloud into one
application and allows sharing of applications and data between them. When there is a
fluctuation in processing demand, hybrid cloud provides the business the capability to scale
the infrastructure up in the public cloud and seamlessly handles the overflow if there is any
(Chang et al., 2015). The third party does not get the access to the entirety of the data. The
sensitive business details and the critical applications are safe behind the firewall while the
gaining the computing and flexibility of public cloud for non-sensitive and basic computing
tasks.
Hybrid cloud comes with its alluring advantages and as well as numerous
disadvantages. Organizations are increasingly using Hybrid cloud and others are planning to
implement the model into their infrastructure (Ghosh et al., 2017). There are several risk
factors involved in implementing and using the Hybrid cloud computing model. The hybrid
cloud system is sometime dismissed is disruptive (Gopinath & Vasudevan, 2015).
The table below scales out the potential risks associated with Hybrid cloud computing
and the prospective mitigation schemes (Puthal et al., 2015).
Risks Risk Description Mitigation plan
Lack of encryption The network systems are highly Cryptographic protocols need
Response 2
Risk associated with the Hybrid Cloud and Microservice Strategy
Hybrid cloud merges two cloud technologies, the public and the private cloud into one
application and allows sharing of applications and data between them. When there is a
fluctuation in processing demand, hybrid cloud provides the business the capability to scale
the infrastructure up in the public cloud and seamlessly handles the overflow if there is any
(Chang et al., 2015). The third party does not get the access to the entirety of the data. The
sensitive business details and the critical applications are safe behind the firewall while the
gaining the computing and flexibility of public cloud for non-sensitive and basic computing
tasks.
Hybrid cloud comes with its alluring advantages and as well as numerous
disadvantages. Organizations are increasingly using Hybrid cloud and others are planning to
implement the model into their infrastructure (Ghosh et al., 2017). There are several risk
factors involved in implementing and using the Hybrid cloud computing model. The hybrid
cloud system is sometime dismissed is disruptive (Gopinath & Vasudevan, 2015).
The table below scales out the potential risks associated with Hybrid cloud computing
and the prospective mitigation schemes (Puthal et al., 2015).
Risks Risk Description Mitigation plan
Lack of encryption The network systems are highly Cryptographic protocols need

12CLOUD COMPUTING
vulnerable to spoofing, (MitM)
Man-in-the-Middle attack and
data theft. The attackers
circumvent authentication by
the means of impersonating the
endpoints.
to be implemented to shield
unauthorized entry and
indiscriminate attacks.
Reliable VPN can be employed
Use of proxy server
Inadequate assessment of
Security Risk
Failing to perform adequate risk
analysis of the organizational
IT infrastructure increases the
chances of network breaches in
the network system.
Rigorous and periodic risk
assessment and prevention
procedures must be
implemented.
Periodic scan by IDS/IPS
system to track malicious
traffic.
Holistic approach in handling
the network security by using
reliable SIEM system.
Poor Compliance The public and the private
cloud which sums up the hybrid
cloud should stay within the
compliance parameters.
Regulating and maintaining the
compliance is difficult as there
Compliance of both the private
and the pubic cloud needs to be
ensured along with compliance
demonstration for the cloud is
essential
vulnerable to spoofing, (MitM)
Man-in-the-Middle attack and
data theft. The attackers
circumvent authentication by
the means of impersonating the
endpoints.
to be implemented to shield
unauthorized entry and
indiscriminate attacks.
Reliable VPN can be employed
Use of proxy server
Inadequate assessment of
Security Risk
Failing to perform adequate risk
analysis of the organizational
IT infrastructure increases the
chances of network breaches in
the network system.
Rigorous and periodic risk
assessment and prevention
procedures must be
implemented.
Periodic scan by IDS/IPS
system to track malicious
traffic.
Holistic approach in handling
the network security by using
reliable SIEM system.
Poor Compliance The public and the private
cloud which sums up the hybrid
cloud should stay within the
compliance parameters.
Regulating and maintaining the
compliance is difficult as there
Compliance of both the private
and the pubic cloud needs to be
ensured along with compliance
demonstration for the cloud is
essential
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13CLOUD COMPUTING
is constant to and fro movement
of data.
Poor Security Management Complex situations in an
enterprise arise when the
management fails to
commission authentication,
authorization and identity
management procedures for
public and the private cloud.
The control system needs to be
replicated for the public as well
as for private cloud.
Synchronization of data with
the system should be employed.
Data Redundancy Redundancy of data puts the
hybrid cloud and the enterprise
at risk. The risk generally arises
due to the non existence of
redundant data copies.
Multiple data centers can be
utilized from the cloud
providers.
Identification and
authentication failure
When the cyber security
protocols are not shared among
the clouds and the employees,
cyber issues arises.
The best way to mitigate this
particular risk is to diligently
monitor and verify the access
permission and data security
synchronization.
Unprotected APIs Unprotected APIs open up
endpoint vulnerabilities,
exposing the sensitive and
The handling method for API
keys must be the same as code
is constant to and fro movement
of data.
Poor Security Management Complex situations in an
enterprise arise when the
management fails to
commission authentication,
authorization and identity
management procedures for
public and the private cloud.
The control system needs to be
replicated for the public as well
as for private cloud.
Synchronization of data with
the system should be employed.
Data Redundancy Redundancy of data puts the
hybrid cloud and the enterprise
at risk. The risk generally arises
due to the non existence of
redundant data copies.
Multiple data centers can be
utilized from the cloud
providers.
Identification and
authentication failure
When the cyber security
protocols are not shared among
the clouds and the employees,
cyber issues arises.
The best way to mitigate this
particular risk is to diligently
monitor and verify the access
permission and data security
synchronization.
Unprotected APIs Unprotected APIs open up
endpoint vulnerabilities,
exposing the sensitive and
The handling method for API
keys must be the same as code

14CLOUD COMPUTING
confidential data to cyber
attackers. The attacks exploits
the authentication token to
manipulate the data and other
personal information
signing tokens and encryption.
The third party developers need
to be verified before the release
of the API tokens to avoid any
kind of security breach.
DoS (Denial-of-Service)
Attacks
Attackers access the cloud by
launching DoS attacks. The
entire network system is
disrupted due a prevailing
weakness in the shared
resources like RAM, network
bandwidth or CPU.
Implementing flow analytics to
fend off the attack by
redirecting the traffic to one of
the mitigation device.
DDoS (Distributed Denial of
Service) attacks
The attack renders the websites
are helpless and the network
traffic falls in a gridlock.
DDoS mitigation plans and
devices to used to process the
incoming and outgoing traffic
low.
Inferior IP Protection Vulnerabilities in IP make it
easier for the attacks to gain
access inside the network
system and collect important
data and alter them.
The source of the threat need to
be identified and a detailed
threat mitigating model must be
developed and followed.
confidential data to cyber
attackers. The attacks exploits
the authentication token to
manipulate the data and other
personal information
signing tokens and encryption.
The third party developers need
to be verified before the release
of the API tokens to avoid any
kind of security breach.
DoS (Denial-of-Service)
Attacks
Attackers access the cloud by
launching DoS attacks. The
entire network system is
disrupted due a prevailing
weakness in the shared
resources like RAM, network
bandwidth or CPU.
Implementing flow analytics to
fend off the attack by
redirecting the traffic to one of
the mitigation device.
DDoS (Distributed Denial of
Service) attacks
The attack renders the websites
are helpless and the network
traffic falls in a gridlock.
DDoS mitigation plans and
devices to used to process the
incoming and outgoing traffic
low.
Inferior IP Protection Vulnerabilities in IP make it
easier for the attacks to gain
access inside the network
system and collect important
data and alter them.
The source of the threat need to
be identified and a detailed
threat mitigating model must be
developed and followed.

15CLOUD COMPUTING
Creation of permission matrix
Third party audits need to be
extensively done.
Improperly defined SLAs
(Service Level Agreement)
Using cloud services by
customers rob of the ability to
control their own data and they
rely on the service provides for
the security of the data in a
public cloud.
The security protocols,
expectation of service details
and permissions must be well
defined in SLA.
Leakage of Data Lack of security protocol on the
cloud leads to the development
of several vulnerabilities in the
cloud through which data can
be compromised or corrupted.
There should be regular
security updates and software
patches on the system to control
the flow of data. The security
measures must be taken to
counter the malfunctions in the
system and other security
breaches.
Creation of permission matrix
Third party audits need to be
extensively done.
Improperly defined SLAs
(Service Level Agreement)
Using cloud services by
customers rob of the ability to
control their own data and they
rely on the service provides for
the security of the data in a
public cloud.
The security protocols,
expectation of service details
and permissions must be well
defined in SLA.
Leakage of Data Lack of security protocol on the
cloud leads to the development
of several vulnerabilities in the
cloud through which data can
be compromised or corrupted.
There should be regular
security updates and software
patches on the system to control
the flow of data. The security
measures must be taken to
counter the malfunctions in the
system and other security
breaches.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16CLOUD COMPUTING
Poor management strategies When the employees have lack
in the understanding of the
usage of hybrid cloud, it causes
several issues within the
organizational environment.
Stringent management policies
must be implemented for the
seamless running of the cloud.
Poor construction of cross-
platform tools
Hybrid clouds are not the usual
cloud and the administrators
face problems while multi
tasking. Poor execution of cross
platform tool in the hybrid
ambience leads to major
pitfalls.
Cloud migration tools for
interoperability and for the
movement of apps between the
public and private cloud.
Presence of security protocols
for VM movement and dynamic
cloud provisioning.
Table 1
Source: (Created by Author)
Response 3
Information security steps and control
In the hybrid cloud system, the common threat that prevails is data breach. In the
recent years the number of cyber attacks and data breaches has gained significant momentum.
This is of chief concern for the organizations using cloud services as the data stored is
vulnerable to attacks and theft. The concern is also for the organizations that plan to
Poor management strategies When the employees have lack
in the understanding of the
usage of hybrid cloud, it causes
several issues within the
organizational environment.
Stringent management policies
must be implemented for the
seamless running of the cloud.
Poor construction of cross-
platform tools
Hybrid clouds are not the usual
cloud and the administrators
face problems while multi
tasking. Poor execution of cross
platform tool in the hybrid
ambience leads to major
pitfalls.
Cloud migration tools for
interoperability and for the
movement of apps between the
public and private cloud.
Presence of security protocols
for VM movement and dynamic
cloud provisioning.
Table 1
Source: (Created by Author)
Response 3
Information security steps and control
In the hybrid cloud system, the common threat that prevails is data breach. In the
recent years the number of cyber attacks and data breaches has gained significant momentum.
This is of chief concern for the organizations using cloud services as the data stored is
vulnerable to attacks and theft. The concern is also for the organizations that plan to

17CLOUD COMPUTING
implement and use cloud services (Rodriguez & Guillemin, 2017). The section below
provides the control steps to prevent and avoid security breaches.
Steps and Controls
The control steps required for the prevention of security breaches and data thefts are as
follows:
Secure Login services: User authentication should be extremely strong to prevent any
kind of external attacks and unauthorized access. The organization must implement
stringent methods to prevent users from gaining access to confident information (Xia,
2016).
Reliable services: The security of database need to be ensured. Reliable identity services
must be installed in the system as it is the fundamental method of identity (Rankothge et
al., 2015).
Encryption: The users of the company extensively use desktops to deliver services. To
ensure the prevention of unauthorized access into the system and data theft from the
system, the system must be highly encrypted (Li et al., 2015). Encryption will prevent
unauthorized interception into the system (Hussein & Khalid, 2016).
Efficient key management: The common key which is used in the encryption process in
securing virtual drives on the system should be tightly secured.
Physical security: The data centers or the storage house of the data where applications
are executed needs extra protection from unethical access and additional external threats.
Reasons behind the selection of the control steps (Rittinghouse & Ransome, 2016).
The control steps mentioned above will help in preventing unauthorized access and
entry of external agent in cloud. The user access will be limited on the IT resources
implement and use cloud services (Rodriguez & Guillemin, 2017). The section below
provides the control steps to prevent and avoid security breaches.
Steps and Controls
The control steps required for the prevention of security breaches and data thefts are as
follows:
Secure Login services: User authentication should be extremely strong to prevent any
kind of external attacks and unauthorized access. The organization must implement
stringent methods to prevent users from gaining access to confident information (Xia,
2016).
Reliable services: The security of database need to be ensured. Reliable identity services
must be installed in the system as it is the fundamental method of identity (Rankothge et
al., 2015).
Encryption: The users of the company extensively use desktops to deliver services. To
ensure the prevention of unauthorized access into the system and data theft from the
system, the system must be highly encrypted (Li et al., 2015). Encryption will prevent
unauthorized interception into the system (Hussein & Khalid, 2016).
Efficient key management: The common key which is used in the encryption process in
securing virtual drives on the system should be tightly secured.
Physical security: The data centers or the storage house of the data where applications
are executed needs extra protection from unethical access and additional external threats.
Reasons behind the selection of the control steps (Rittinghouse & Ransome, 2016).
The control steps mentioned above will help in preventing unauthorized access and
entry of external agent in cloud. The user access will be limited on the IT resources

18CLOUD COMPUTING
available. The steps will ensure ethical working culture and prevent the entry of threats
and data loss. Encryption will secure the data flow in the cloud structure and protect it
from damage and leakage (Sabin et al., 2016). Policies should be implemented and
followed ardently by the employees of the organization. User permission will enable
secure management of the resources.
Recommendations
The board is recommended the following:
Implementation of stringent security policy that will help to prevent any kind of
unauthorized access in cloud environment.
The policies applied should be unique employee credential to access the resources of the
cloud.
Firewalls in the cloud server should be implemented to avoid unauthorized access of IT
resources.
The employees should be allowed to use stipulated amount of resources and permission
is needed to access additional sensitive data.
Response 4
Inclusion of the recommendation
Companies achieve their aims and objective by implementing hybrid cloud in the
workspace. The major advantages of hybrid cloud are disaster retrieval, business
reinforcement and resilience. The reason behind the allowance of the mentioned benefits is
the agreement of the spanning through local and isolated storages. The alternatives are
enabled by using the storage facility of hybrid cloud (Saraswathi, Kalaashri & Padmavathi,
available. The steps will ensure ethical working culture and prevent the entry of threats
and data loss. Encryption will secure the data flow in the cloud structure and protect it
from damage and leakage (Sabin et al., 2016). Policies should be implemented and
followed ardently by the employees of the organization. User permission will enable
secure management of the resources.
Recommendations
The board is recommended the following:
Implementation of stringent security policy that will help to prevent any kind of
unauthorized access in cloud environment.
The policies applied should be unique employee credential to access the resources of the
cloud.
Firewalls in the cloud server should be implemented to avoid unauthorized access of IT
resources.
The employees should be allowed to use stipulated amount of resources and permission
is needed to access additional sensitive data.
Response 4
Inclusion of the recommendation
Companies achieve their aims and objective by implementing hybrid cloud in the
workspace. The major advantages of hybrid cloud are disaster retrieval, business
reinforcement and resilience. The reason behind the allowance of the mentioned benefits is
the agreement of the spanning through local and isolated storages. The alternatives are
enabled by using the storage facility of hybrid cloud (Saraswathi, Kalaashri & Padmavathi,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19CLOUD COMPUTING
2015). The usage of the unprotected cloud for intensive utilization of the backup is the major
cause. The applications retain specific requirement and characteristic of HA or High
Availability. AWS dispenses numerous infrastructural blocs to help the organization meet its
requirements and the process is highly cost effective (Amazon, 2015).
The recommendation required in business BCP in accordance to Morad and Dalbhanjan’s
checklists are as under:
Amazon cloud watch metrics
Elastic load balancing balances the said load among various zones of availability
(Farokhi et al., 2018)
Instinctive scaling- scaling or spontaneous instances recovery
Amazon RDS utilization among numerous availability zones of the database (Nawaz et
al., 2016).
Flexible IP addressing that can be easily remapped within occurrences
Utilization of AWS elastic beanstalk for management of different situations.
Amazon SimpleDB or Amazon DynamoDB to load key value
EBS snapshot
Disaster Recovery
The applications which are hosted on the organization’s cloud, there is a requirement
for disaster management and recovery of the cloud services. The cloud’s geographical
location, recovery time and recovery points are connected with requirements for the
purpose of recovery in the cloud. DR type is an effective strategy for disaster recovery
which needs inclusion to confirm the application restoration. It also includes regional
duplication, the administration of comprehensive traffic which is popularly well known
2015). The usage of the unprotected cloud for intensive utilization of the backup is the major
cause. The applications retain specific requirement and characteristic of HA or High
Availability. AWS dispenses numerous infrastructural blocs to help the organization meet its
requirements and the process is highly cost effective (Amazon, 2015).
The recommendation required in business BCP in accordance to Morad and Dalbhanjan’s
checklists are as under:
Amazon cloud watch metrics
Elastic load balancing balances the said load among various zones of availability
(Farokhi et al., 2018)
Instinctive scaling- scaling or spontaneous instances recovery
Amazon RDS utilization among numerous availability zones of the database (Nawaz et
al., 2016).
Flexible IP addressing that can be easily remapped within occurrences
Utilization of AWS elastic beanstalk for management of different situations.
Amazon SimpleDB or Amazon DynamoDB to load key value
EBS snapshot
Disaster Recovery
The applications which are hosted on the organization’s cloud, there is a requirement
for disaster management and recovery of the cloud services. The cloud’s geographical
location, recovery time and recovery points are connected with requirements for the
purpose of recovery in the cloud. DR type is an effective strategy for disaster recovery
which needs inclusion to confirm the application restoration. It also includes regional
duplication, the administration of comprehensive traffic which is popularly well known

20CLOUD COMPUTING
as the load balancing, region wise recovery and lastly maintenance (Kotas, Naughton &
Imam, 2018). Techniques to be implemented in the business BCP for the effective
implementation of DR strategy:
Amazon glacier utilization to archive essential data
Use of Amazon Machine image to execute instances or to archive data
Amazon Route utilization for regional fail case- DNS based.
Database utilization of log for influencing the technologies of asynchronous data
redundancy
EBS snapshot and Amazon Machine Image (AMI)
Recommendation to be considered:
(a) Microsoft SQL server 2008 R2,
(b) Fault tolerant in cloud
Benefits of AWS cloud services are numerous and it should be exercised to benefit the
organization. The benefits of AWS cloud services are as under:
The storage system of the cloud is highly simplified to increase ease of user access.
The applications and data can be archived and supports inline backup. The cloud is
recommended as the service is cheaper, superior speed and lastly highly scalable.
The AWS service comes with a cloud drive. Cloud drive has major benefits as it
allows users the complete utilization of multiple devices connected through the web
to access, upload and download files from the cloud. The cloud drive also provides
with an added feature- music can be streamed using cloud drive (Newcombe et al.,
2015).
AWS comes with CloudSearch which is generally used to integrate searching
capabilities which are customized. The service is also scalable.
as the load balancing, region wise recovery and lastly maintenance (Kotas, Naughton &
Imam, 2018). Techniques to be implemented in the business BCP for the effective
implementation of DR strategy:
Amazon glacier utilization to archive essential data
Use of Amazon Machine image to execute instances or to archive data
Amazon Route utilization for regional fail case- DNS based.
Database utilization of log for influencing the technologies of asynchronous data
redundancy
EBS snapshot and Amazon Machine Image (AMI)
Recommendation to be considered:
(a) Microsoft SQL server 2008 R2,
(b) Fault tolerant in cloud
Benefits of AWS cloud services are numerous and it should be exercised to benefit the
organization. The benefits of AWS cloud services are as under:
The storage system of the cloud is highly simplified to increase ease of user access.
The applications and data can be archived and supports inline backup. The cloud is
recommended as the service is cheaper, superior speed and lastly highly scalable.
The AWS service comes with a cloud drive. Cloud drive has major benefits as it
allows users the complete utilization of multiple devices connected through the web
to access, upload and download files from the cloud. The cloud drive also provides
with an added feature- music can be streamed using cloud drive (Newcombe et al.,
2015).
AWS comes with CloudSearch which is generally used to integrate searching
capabilities which are customized. The service is also scalable.

21CLOUD COMPUTING
RedShift is designed and devised to analyse workloads connected to business
intelligence tools and SQL based standard clients. RedShift is a data warehouse
service that handles data of petabyte scale.
Mechanical Turk allows developers the integration of human intelligence in remote
procedure calls. An API that utilizes human networks to execute tasks which a
computer system might not have the capability to perform.
Dynamo database is noSQL DB (database), controlled fully and highly popular for
the features it comes with which is scalability and also low invisibilities.
Issues associated with AWS are as follows:
The platform sets the service limit of AWS. The reason behind setting the limitation
is to ensure cloud storage security and data or files stored inside the database of the
cloud.
AWS comes with certain technological limitations. As the demand increases,
customers require upgradation of the services provided by the cloud. The cloud
storage of AWS cannot perform at the expectation of the users.
There is always the presence of security issues in the cloud storage system. Cloud
stores massive quality of sensitive and confidential data which when leaked can
cause severe damage to the organization. Though the cloud services are well
protected to prevent data leakage or loss yet there are vulnerabilities which can lead
to data theft and other cyber attacks.
Users when access cloud services, mostly face problems of low bandwidth. This
happens as multiple users might try to access the cloud at a given moment.
When cloud services work remotely, organizations face troubles in completely
controlling the cloud from elsewhere. Their control over the software and the
RedShift is designed and devised to analyse workloads connected to business
intelligence tools and SQL based standard clients. RedShift is a data warehouse
service that handles data of petabyte scale.
Mechanical Turk allows developers the integration of human intelligence in remote
procedure calls. An API that utilizes human networks to execute tasks which a
computer system might not have the capability to perform.
Dynamo database is noSQL DB (database), controlled fully and highly popular for
the features it comes with which is scalability and also low invisibilities.
Issues associated with AWS are as follows:
The platform sets the service limit of AWS. The reason behind setting the limitation
is to ensure cloud storage security and data or files stored inside the database of the
cloud.
AWS comes with certain technological limitations. As the demand increases,
customers require upgradation of the services provided by the cloud. The cloud
storage of AWS cannot perform at the expectation of the users.
There is always the presence of security issues in the cloud storage system. Cloud
stores massive quality of sensitive and confidential data which when leaked can
cause severe damage to the organization. Though the cloud services are well
protected to prevent data leakage or loss yet there are vulnerabilities which can lead
to data theft and other cyber attacks.
Users when access cloud services, mostly face problems of low bandwidth. This
happens as multiple users might try to access the cloud at a given moment.
When cloud services work remotely, organizations face troubles in completely
controlling the cloud from elsewhere. Their control over the software and the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22CLOUD COMPUTING
hardware loosens. There are visible fluctuations in the performance consistency of
the cloud service.
There are added issues of compatibility since the whole infrastructure is virtualized.
Compatibility issues raise grave concerns, obstacles and challenges for the smooth
functioning in the organization.
Response 5
Checklist of Morad and Dalbhanjan
Comprehension of the particular Amazon EBS that is supported versus instances
which are store-back and the right type of storage is purposely chosen to get a
complete understanding of data records and results, data determination, backup and
recovery.
AWS’s Dynamic IP addressing is understood to ensure the operation of the
application when all the components present are restarted.
The failures have been tested within the given components and how it affects
application applicability.
Deployment of all the acute components across several zones of availability, which
are duplicating data in the zones.
Complete understanding of the failure case of the application components that are
deployed in multiple locations as they use elastic IP addressing and load balancing
where it is necessary and suitable.
Suitable and necessary utilization of credentials is conducted to access user account
and to make sure that the users are no where involved in private key, key pairing of
AWS instance.
CNAME records utilized to map DNS name of elastic load balancing.
hardware loosens. There are visible fluctuations in the performance consistency of
the cloud service.
There are added issues of compatibility since the whole infrastructure is virtualized.
Compatibility issues raise grave concerns, obstacles and challenges for the smooth
functioning in the organization.
Response 5
Checklist of Morad and Dalbhanjan
Comprehension of the particular Amazon EBS that is supported versus instances
which are store-back and the right type of storage is purposely chosen to get a
complete understanding of data records and results, data determination, backup and
recovery.
AWS’s Dynamic IP addressing is understood to ensure the operation of the
application when all the components present are restarted.
The failures have been tested within the given components and how it affects
application applicability.
Deployment of all the acute components across several zones of availability, which
are duplicating data in the zones.
Complete understanding of the failure case of the application components that are
deployed in multiple locations as they use elastic IP addressing and load balancing
where it is necessary and suitable.
Suitable and necessary utilization of credentials is conducted to access user account
and to make sure that the users are no where involved in private key, key pairing of
AWS instance.
CNAME records utilized to map DNS name of elastic load balancing.

23CLOUD COMPUTING
Production account signing of AWS for organization or any kind of business support-
performed and also the incorporation of honest advisor for ongoing reviews.
Amazon RDS simplifies the operations and workings within the cloud and also to scale the
RDB or relational database for application utilization. Amazon RDS features are as follows:
Read replicas allows numerous use case such as scaling out of workloads which are
read-heavy.
Multi-AZ (Availability Zone) allows automatic maintenance and provision of
synchronous physical or logical standby that highly depends on the database engine of
various AZ (Kotas, Naughton & Imam, 2018).
Performance metrics and monitoring metrics for Amazon RDS which is available on
the management console of the AWS or the API of Amazon cloudwatch. Amazon
provides a possible feature of enhanced monitoring that offers metrics set that are
expanded for the MySQL (Kotas, Naughton & Imam, 2018).
RDS is highly cost effective. The instances of Amazon RDS are similarly priced to
the Amazon EC2. The benefits of RDS are hourly charged and it is available in two
packages, such as instances of on-demand DB and the instances of Reserved DB. The
users are indicted for the storage amount that is provisioned, the transfer of data and
the input and output operations that are performed (Wittig & Wittig, 2015).
Conclusion
The proposal of migrating to the Hybrid Cloud model will prove to be beneficial as it
creates multiple business opportunities for the company to explore and expand. The cloud
architectures that need implementation are Cloud bursting architecture and Resource
Production account signing of AWS for organization or any kind of business support-
performed and also the incorporation of honest advisor for ongoing reviews.
Amazon RDS simplifies the operations and workings within the cloud and also to scale the
RDB or relational database for application utilization. Amazon RDS features are as follows:
Read replicas allows numerous use case such as scaling out of workloads which are
read-heavy.
Multi-AZ (Availability Zone) allows automatic maintenance and provision of
synchronous physical or logical standby that highly depends on the database engine of
various AZ (Kotas, Naughton & Imam, 2018).
Performance metrics and monitoring metrics for Amazon RDS which is available on
the management console of the AWS or the API of Amazon cloudwatch. Amazon
provides a possible feature of enhanced monitoring that offers metrics set that are
expanded for the MySQL (Kotas, Naughton & Imam, 2018).
RDS is highly cost effective. The instances of Amazon RDS are similarly priced to
the Amazon EC2. The benefits of RDS are hourly charged and it is available in two
packages, such as instances of on-demand DB and the instances of Reserved DB. The
users are indicted for the storage amount that is provisioned, the transfer of data and
the input and output operations that are performed (Wittig & Wittig, 2015).
Conclusion
The proposal of migrating to the Hybrid Cloud model will prove to be beneficial as it
creates multiple business opportunities for the company to explore and expand. The cloud
architectures that need implementation are Cloud bursting architecture and Resource

24CLOUD COMPUTING
pooling architecture. There are numerous benefits to the mentioned architecture such as
flexibility, effective cost, mobility, availability and lastly scalability. The required
security control steps are effective identity, data encryption, administrative control, API
protection, proper management of the cloud services, optimized utilization for security of
data and deployment control. The vulnerabilities of the system should be carefully
scrutinized and the governance of the cloud should be centralized. The model is highly
advantageous for business expansion and growth.
pooling architecture. There are numerous benefits to the mentioned architecture such as
flexibility, effective cost, mobility, availability and lastly scalability. The required
security control steps are effective identity, data encryption, administrative control, API
protection, proper management of the cloud services, optimized utilization for security of
data and deployment control. The vulnerabilities of the system should be carefully
scrutinized and the governance of the cloud should be centralized. The model is highly
advantageous for business expansion and growth.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

25CLOUD COMPUTING
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Amazon, E. C. (2015). Amazon web services. Available in: http://aws. amazon.
com/es/ec2/(November 2012).
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future generation computer systems, 56, 684-700.
Cao, Y., Lu, L., Yu, J., Qian, S., Zhu, Y., Li, M., ... & Xue, G. (2017, October). Online cost-
aware service requests scheduling in hybrid clouds for cloud bursting. In International
Conference on Web Information Systems Engineering (pp. 259-274). Springer, Cham.
Caulfield, A. M., Chung, E. S., Putnam, A., Angepat, H., Fowers, J., Haselman, M., ... & Lo,
D. (2016, October). A cloud-scale acceleration architecture. In The 49th Annual
IEEE/ACM International Symposium on Microarchitecture (p. 7). IEEE Press.
Chang, D. W., & Pathak, R. M. (2017). U.S. Patent Application No. 14/876,092.
Chang, D. W., Patra, A., Bagepalli, N. A., & Mestery, K. (2015). U.S. Patent No. 9,203,784.
Washington, DC: U.S. Patent and Trademark Office.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Amazon, E. C. (2015). Amazon web services. Available in: http://aws. amazon.
com/es/ec2/(November 2012).
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future generation computer systems, 56, 684-700.
Cao, Y., Lu, L., Yu, J., Qian, S., Zhu, Y., Li, M., ... & Xue, G. (2017, October). Online cost-
aware service requests scheduling in hybrid clouds for cloud bursting. In International
Conference on Web Information Systems Engineering (pp. 259-274). Springer, Cham.
Caulfield, A. M., Chung, E. S., Putnam, A., Angepat, H., Fowers, J., Haselman, M., ... & Lo,
D. (2016, October). A cloud-scale acceleration architecture. In The 49th Annual
IEEE/ACM International Symposium on Microarchitecture (p. 7). IEEE Press.
Chang, D. W., & Pathak, R. M. (2017). U.S. Patent Application No. 14/876,092.
Chang, D. W., Patra, A., Bagepalli, N. A., & Mestery, K. (2015). U.S. Patent No. 9,203,784.
Washington, DC: U.S. Patent and Trademark Office.

26CLOUD COMPUTING
Clemente-Castelló, F. J., Nicolae, B., Mayo, R., & Fernández, J. C. (2018). Performance
model of mapreduce iterative applications for hybrid cloud bursting. IEEE
Transactions on Parallel and Distributed Systems, 29(8), 1794-1807.
Di Spaltro, D., Polvi, A., & Welliver, L. (2016). U.S. Patent No. 9,501,329. Washington, DC:
U.S. Patent and Trademark Office.
Farokhi, S., Jamshidi, P., Lakew, E. B., Brandic, I., & Elmroth, E. (2016). A hybrid cloud
controller for vertical memory elasticity: A control-theoretic approach. Future
Generation Computer Systems, 65, 57-72.
Fuchs, C. M., Murillo, N. M., Plaat, A., van der Kouwe, E., & Stefanov, T. P. (2018, August).
Dynamic fault tolerance through resource pooling. In 2018 NASA/ESA Conference on
Adaptive Hardware and Systems (AHS) (pp. 9-16). IEEE.
Ghosh, R., Paramkusham, G. V., Quirk, A. J., & Sharma, U. (2017). U.S. Patent No.
9,606,828. Washington, DC: U.S. Patent and Trademark Office.
Gopinath, P. G., & Vasudevan, S. K. (2015). An in-depth analysis and study of Load
balancing techniques in the cloud computing environment. Procedia Computer
Science, 50, 427-432.
Hussein, N. H., & Khalid, A. (2016). A survey of cloud computing security challenges and
solutions. International Journal of Computer Science and Information Security, 14(1),
52.
Clemente-Castelló, F. J., Nicolae, B., Mayo, R., & Fernández, J. C. (2018). Performance
model of mapreduce iterative applications for hybrid cloud bursting. IEEE
Transactions on Parallel and Distributed Systems, 29(8), 1794-1807.
Di Spaltro, D., Polvi, A., & Welliver, L. (2016). U.S. Patent No. 9,501,329. Washington, DC:
U.S. Patent and Trademark Office.
Farokhi, S., Jamshidi, P., Lakew, E. B., Brandic, I., & Elmroth, E. (2016). A hybrid cloud
controller for vertical memory elasticity: A control-theoretic approach. Future
Generation Computer Systems, 65, 57-72.
Fuchs, C. M., Murillo, N. M., Plaat, A., van der Kouwe, E., & Stefanov, T. P. (2018, August).
Dynamic fault tolerance through resource pooling. In 2018 NASA/ESA Conference on
Adaptive Hardware and Systems (AHS) (pp. 9-16). IEEE.
Ghosh, R., Paramkusham, G. V., Quirk, A. J., & Sharma, U. (2017). U.S. Patent No.
9,606,828. Washington, DC: U.S. Patent and Trademark Office.
Gopinath, P. G., & Vasudevan, S. K. (2015). An in-depth analysis and study of Load
balancing techniques in the cloud computing environment. Procedia Computer
Science, 50, 427-432.
Hussein, N. H., & Khalid, A. (2016). A survey of cloud computing security challenges and
solutions. International Journal of Computer Science and Information Security, 14(1),
52.

27CLOUD COMPUTING
Kotas, C., Naughton, T., & Imam, N. (2018, January). A comparison of Amazon Web
Services and Microsoft Azure cloud platforms for high performance computing.
In 2018 IEEE International Conference on Consumer Electronics (ICCE)(pp. 1-4).
IEEE.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced
revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Li, P., Li, J., Huang, Z., Gao, C. Z., Chen, W. B., & Chen, K. (2018). Privacy-preserving
outsourced classification in cloud computing. Cluster Computing, 21(1), 277-286.
Marinescu, D. C. (2017). Cloud computing: theory and practice. Morgan Kaufmann.
Martinez, F. R., & Pulier, E. (2015). U.S. Patent No. 9,069,599. Washington, DC: U.S. Patent
and Trademark Office.
Nawaz, H., Juve, G., Da Silva, R. F., & Deelman, E. (2016, May). Performance analysis of an
i/o-intensive workflow executing on google cloud and amazon web services. In 2016
IEEE International Parallel and Distributed Processing Symposium Workshops
(IPDPSW) (pp. 535-544). IEEE.
Newcombe, C., Rath, T., Zhang, F., Munteanu, B., Brooker, M., & Deardeuff, M. (2015).
How Amazon web services uses formal methods. Communications of the ACM, 58(4),
66-73.
Kotas, C., Naughton, T., & Imam, N. (2018, January). A comparison of Amazon Web
Services and Microsoft Azure cloud platforms for high performance computing.
In 2018 IEEE International Conference on Consumer Electronics (ICCE)(pp. 1-4).
IEEE.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced
revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Li, P., Li, J., Huang, Z., Gao, C. Z., Chen, W. B., & Chen, K. (2018). Privacy-preserving
outsourced classification in cloud computing. Cluster Computing, 21(1), 277-286.
Marinescu, D. C. (2017). Cloud computing: theory and practice. Morgan Kaufmann.
Martinez, F. R., & Pulier, E. (2015). U.S. Patent No. 9,069,599. Washington, DC: U.S. Patent
and Trademark Office.
Nawaz, H., Juve, G., Da Silva, R. F., & Deelman, E. (2016, May). Performance analysis of an
i/o-intensive workflow executing on google cloud and amazon web services. In 2016
IEEE International Parallel and Distributed Processing Symposium Workshops
(IPDPSW) (pp. 535-544). IEEE.
Newcombe, C., Rath, T., Zhang, F., Munteanu, B., Brooker, M., & Deardeuff, M. (2015).
How Amazon web services uses formal methods. Communications of the ACM, 58(4),
66-73.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

28CLOUD COMPUTING
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing
features, issues, and challenges: a big picture. In 2015 International Conference on
Computational Intelligence and Networks (pp. 116-123). IEEE.
Rankothge, W., Ma, J., Le, F., Russo, A., & Lobo, J. (2015, May). Towards making network
function virtualization a cloud computing service. In 2015 IFIP/IEEE International
Symposium on Integrated Network Management (IM) (pp. 89-97). IEEE.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Rodriguez, V. Q., & Guillemin, F. (2017, June). Towards the deployment of a fully
centralized cloud-ran architecture. In 2017 13th International Wireless
Communications and Mobile Computing Conference (IWCMC) (pp. 1055-1060).
IEEE.
Sabin, J. A., Carter, S. R., Jorgensen, M. J., Kranendonk, N. B., Larsen, K. A., & Brown, J.
R. (2016). U.S. Patent No. 9,454,406. Washington, DC: U.S. Patent and Trademark
Office.
Samimi, P., Teimouri, Y., & Mukhtar, M. (2016). A combinatorial double auction resource
allocation model in cloud computing. Information Sciences, 357, 201-216.
Saraswathi, A. T., Kalaashri, Y. R., & Padmavathi, S. (2015). Dynamic resource allocation
scheme in cloud computing. Procedia Computer Science, 47, 30-36.
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing
features, issues, and challenges: a big picture. In 2015 International Conference on
Computational Intelligence and Networks (pp. 116-123). IEEE.
Rankothge, W., Ma, J., Le, F., Russo, A., & Lobo, J. (2015, May). Towards making network
function virtualization a cloud computing service. In 2015 IFIP/IEEE International
Symposium on Integrated Network Management (IM) (pp. 89-97). IEEE.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Rodriguez, V. Q., & Guillemin, F. (2017, June). Towards the deployment of a fully
centralized cloud-ran architecture. In 2017 13th International Wireless
Communications and Mobile Computing Conference (IWCMC) (pp. 1055-1060).
IEEE.
Sabin, J. A., Carter, S. R., Jorgensen, M. J., Kranendonk, N. B., Larsen, K. A., & Brown, J.
R. (2016). U.S. Patent No. 9,454,406. Washington, DC: U.S. Patent and Trademark
Office.
Samimi, P., Teimouri, Y., & Mukhtar, M. (2016). A combinatorial double auction resource
allocation model in cloud computing. Information Sciences, 357, 201-216.
Saraswathi, A. T., Kalaashri, Y. R., & Padmavathi, S. (2015). Dynamic resource allocation
scheme in cloud computing. Procedia Computer Science, 47, 30-36.

29CLOUD COMPUTING
Sen, J. (2015). Security and privacy issues in cloud computing. In Cloud Technology:
Concepts, Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Wittig, A., & Wittig, M. (2015). Amazon web services in action. Manning Publications Co..
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
Xie, C., Bi, J., Yu, H., Li, C., Sun, C., Liu, Q., ... & Liu, S. (2017). ARPIM: IP Address
Resource Pooling and Intelligent Management System for Broadband IP
Networks. IEEE Communications Magazine, 55(6), 55-61.
Sen, J. (2015). Security and privacy issues in cloud computing. In Cloud Technology:
Concepts, Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Wittig, A., & Wittig, M. (2015). Amazon web services in action. Manning Publications Co..
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
Xie, C., Bi, J., Yu, H., Li, C., Sun, C., Liu, Q., ... & Liu, S. (2017). ARPIM: IP Address
Resource Pooling and Intelligent Management System for Broadband IP
Networks. IEEE Communications Magazine, 55(6), 55-61.
1 out of 30
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.