MetaSoft Ltd: Cloud Migration, Security Controls, and BCP Changes

Verified

Added on  2023/06/03

|25
|7627
|167
Report
AI Summary
This report provides a comprehensive analysis of MetaSoft Ltd.'s strategic move to a hybrid cloud environment, focusing on the migration from their Melbourne data center to the Sydney data center and the adoption of a microservices model. It proposes an architecture based on Amazon Web Services (AWS), highlighting the benefits of complete control, integration, security, and accessibility. The report also identifies potential risks associated with hybrid cloud and microservices, including IT architecture design, data management, privacy, unauthorized access, API security, data synchronization, and data staleness, and suggests mitigation strategies. Furthermore, it outlines proposed information security controls, recommendations for MetaSoft, business continuity plan (BCP) changes, hybrid cloud administration and SLA management, and SharePoint migration planning. The report concludes by addressing critical points and issues related to the cloud implementation, providing a detailed roadmap for MetaSoft's successful cloud transition.
Document Page
Running head: CLOUD COMPUTING
CLOUD COMPUTING
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
CLOUD COMPUTING
Table of Contents
Introduction......................................................................................................................................3
Proposed Architectures for a Hybrid Cloud....................................................................................4
Risk report for Hybrid Cloud and Micro services...........................................................................6
Proposed Information Security controls..........................................................................................9
Recommendation for Metasoft..................................................................................................12
BCP Changes.................................................................................................................................13
Hybrid Cloud Administration and SLA Management...................................................................15
SharePoint Migration Planning......................................................................................................17
Critical point and issues.............................................................................................................18
Conclusion.....................................................................................................................................20
References......................................................................................................................................21
Document Page
3
CLOUD COMPUTING
Introduction
The concept of cloud computing is one of the domain of the technology which is playing
an important role. The technology is directly impacting the overall sector of operation which is
relate to the working of different kind of organisation. In majority of the cases it can be seen that
the organisation tries to indulge into the concept of the clod computing due to the different forms
of advantage which is gained from the it. The main sector of the advantage is that the concept
takes control over the vital aspect of the working of the organisation so that the organisation can
concentrate of different vital internal activity. In recent times it can be stated that above from the
different advantage sector there are different forms of risk factor associated within the working.
The main sector of the disadvantage mainly come in different forms which can be easily be
indulged into and mitigation plan can be easily be implemented within the technology which
would be making the technology more adoptable (Hilbrich, Petrlic & Becker,2015). There are
different sorts of implementation details which should be focused and within the working of the
technology there are different infrastructure which are available, it should be the role of the
organisation to take into consideration different aspect and role which they want the concept of
the cloud computing to be playing within the organisation. Physical and dynamic aspect of the
working of the concept of the cloud computing can be one of the implementation sector details
for an organisation trying to adopt to the cloud computing scenario is also one of the focus point
of the report.
The main focus point of the report is to indulge into the different working which is
related to the concept of cloud computing. Metasoft is one of the organisation which is planning
to move to the concept of cloud computing, in the report the main implementation details which
is related to the sector of adaptation of the concept for the organisation is taken into focus. In the
Document Page
4
CLOUD COMPUTING
stages of implementation there can be different types of risk factor which are discussed in te
report and the mitigation plan which can be adopted by the organisation are also taken into
consideration which would be involving a proper adaptation process involving les security risk
involved in it.
Proposed Architectures for a Hybrid Cloud
The proposed architecture for the MetaSoft ltd which deals with the sector of software
development would be the Amazon web service. The concept of the hybrid cloud can be directly
related to the aspect of the allocation of the on premise resources with the resources of the cloud.
Organisations who adopt the concept of the on premise technology directly invest in the sector of
the hybrid cloud which is a primary requirement relating to the cloud adaptation. The concept
relating to the migration of the legacy can be stated to be involving some form of time concept
involved into the approach (Fang & Zhang, 2016). One of the important point which should be
considered is the selection of the cloud providers who would be helping the organisation to
utilize different resources which are available within the concept of the hybrid cloud. The
important consideration which can be focused in the sector of the implementation of the hybrid
cloud without the need relating to the cost investment in the sector of the on premise software
and hardware (Hilbrich, Petrlic & Becker,2015). The AWS can be very much beneficial in the
sector of the closely working with the need of the organisation. some of the benefit which can be
seen in the sector of the implementation of the propose architecture are stated below:
ï‚· Complete control: The organisation would be having the overall control of the different
features of the concept of the cloud computing. The organisation can directly root the
access to each one of them and the interaction with the system would be done. The
feature which is related to the concept can be stopped while directly retaining the data
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
CLOUD COMPUTING
which would be residing in the boot partition. Then the same sequence can be started
again by the same instance using the web service APIs. The instances can be directly
rebooted using the web service APIs.
ï‚· Integrated: The concept of the AWS can easily get nitrated with the different working of
the organisation which can be related to the overall sector of implementation (Fang &
Zhang, 2016). Some of the aspects which can be directly be linked to the aspect can be in
the sector of the amazon simple storage service, amazon virtual private network, amazon
relational database service which directly provides a secure solution of computing,
processing f query and the cloud storage across an application which has a wide range of
service.
ï‚· Security: The data which would be stored in the concept of the AWS would be very
much secured. In the organisation which focused which is the MetaSoft, the
implementation of the AWS would be removing the burden which is related to the
protection mechanism which should be implemented within the data. The security of the
data of the organisation which would be saved in the concept would be provided from the
end of the service providers and the organisation can directly deal with different other
important factors.
ï‚· Access: The data which would be stored within the concept of the AWS can be directly
be accessed at any time. This mainly means the with regards to the security the data can
be available to the organisation when they would be needing the data (Hilbrich, Petrlic &
Becker,2015). This can be stated as one of the major advantage which is related to the
implementation of the AWS. It can be stated that if the data is not accessed and retrieved
during the need of the organisation it can be a major problem which is mainly taken into
Document Page
6
CLOUD COMPUTING
focus by the AWS so that the retrival of the data within the concept would be not
involving time constraint. On the other hand, the quality of the data which would be
retrieved from the AWS would be maintained so that there are no problem relating to the
distribution of the data.
Risk report for Hybrid Cloud and Micro services
There can be different types of risk factor which can be included into the concept of the
working of the hybrid and the micro services. The main aim of the sector is to disrupt the normal
functionality which is related to the concept. The risk factors which are related to the concept can
be discussed with the help of a tabular form which would be affectively discussing all the sectors
of risk which is related to the concept. The table given below describes all the risk factor which
is involved into the concept which can be affecting the sector of operation which is related to the
concept.
Hybrid cloud Micro service strategy
Cloud security Security
Loss of overall control of the data Synchronization of the data.
Discovery Compliance
Management of the data Testing
Latency and bandwidth Monitoring
Failure and disaster recovery Data staleness
Architecture design of the IT Logging and debugging
Document Page
7
CLOUD COMPUTING
The different risk factor which is associated with the concept of hybrid cloud are majorly
discussed below:
Design of thee IT architecture: the concept of the hybrid cloud can be considered to be
a very complex due to the factor that the concept is a mixture of different sector of the working
which is related to the concept. It can be considered to be a mixture which is related to the
private cloud, public cloud and the on premise cloud (Singh et al.,2015). In order to manage the
overall service, it can be stated that there are many operational details which is linked to the
concept which play a major risk factor in the sector of the working of the concept.
Data management: The concept of the data management can be stated as one of the
factor which can be termed as one of the major risk factor which is related to the concept. This is
due to the factor that there are different types of crucial data which is stored in the concept which
should be taken care of and the security implications which are provided from the end of the
cloud providers are not proper (Fang & Zhang, 2016). In the concept it can be stated that there
are no predefined rules which directly define the sector of the security which would be directly
be implemented within the working of the organisation with the data which is stored within the
concept. These data are crucial for the organisation and if there are any form of intruder activity
it be directly impacting the overall operation which is related to the working of the organisation.
Privacy: The privacy of the data which is stored in the concept can be stated to be one of
the major factor which is related to the concept. There are different aspect of privacy dwelling
within the concept which makes the leakage of the data of the organisation (Hilbrich, Petrlic &
Becker,2015). These activities are usually done from the end of the hacker who use the concept
in order to gain their own profit from the sake of the data which is retrieved from the system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
CLOUD COMPUTING
Unauthorised access: The sector of the unauthorised access of the data which is stored
in the concept can be a factor of concern (Tebaa, Zkik & El Hajji, 2015). There can be different
sectors of activity which can be linked to the concept which means that there can be alteration of
the data, modification of the data and deletion of the data which would be directly hammering
the overall functionality of the organisation.
The different types of risk factor which is associated with the micro service are stated
below:
Security: the security of the API can be stated as one of the concern areas which can be
related to the concept. The security of the API can be very much important in the sector of the
working of the data which would be present in the system (Moro, Cortez & Rita, 2015). There
are different implications which can be seen in the sector relating to the concept which can be the
implementation of Kong which is one of the most popular source which can be used in the sector
of the removing the barrier which is related to the security aspect.
Data Synchronization: The concept which is related to the aspect of the data
synchronization can be stated to be one of the concern area which is related to the concept which
would be directly beneficial in the sector of the implementation of the technology (Singh et
al.,2015). In most of the cases it can be stated that the sector of the async messaging system is
one of the major areas of concern which is related to the concept.
Data stainless: The database which is related to the concept should be ideally be
engaging into the different updating and modification so that they are always kept updates. It can
be stated to be a major problem if the data which is stored in the sector of the database is not
updated which can directly impact the operation which is related to the organisation. There is
Document Page
9
CLOUD COMPUTING
different implication which can be seen in the sector to directly mitigate the different problem
which is related to the stainless of the data.
Debugging: the concept which is related to the domain of the micro service can be a
indicated as an complex sector due to the involvement of different functionality which is related
to the concept (Fang & Zhang, 2016). Due to this factor it can be stated that when there are any
types of risk factor associated with the concept of risk issue seen the mitigation aspect control
can be one of the concern areas which is related to the concept. Sometimes it can be seen that the
risk factor directly gets included into the internal working of the organisation which can directly
disruptor the normal functionality which is related to the concept (Tebaa, Zkik & El Hajji, 2015).
It should be taken into consideration that risk identification should be one of the primary factor
which can be related to the concept so that there are no problem relating to the risk identification
and the concept of the implementation of a mitigation plan which would be directly resolving the
risk factor.
Proposed Information Security controls
In the concept of the hybrid cloud there can be different types if security risk which is
involved into the information which is stored in the concept. One of the factor which can be
stated here is that most of the organisation save their important and crucial data in the concept of
the cloud and if these data goes into the hand of another person or intruder it can hamper the
overall working of the organisation (Gangwar, Date & Ramaswamy, 2015). It can be stated here
that the AWS and its different partner directly offer different types of features and tools which
would be helping the security of the data and the controlling aspect of the data which would be
stored in the concept. These security control measures can be directly being placed upon the on
premise architecture which can be used in the sector of the deployment environment. Some of
Document Page
10
CLOUD COMPUTING
the areas which are covered in the concept can be in the range of the access control, network
security, management of configuration and the data security (Hilbrich, Petrlic & Becker,2015).
On the other hand, the concept also provides an enhanced feature relating to the logging and the
mentoring of the tools which can directly provide full visibility into what is happening and being
executing into the environment. Some of the information security aspect which can be seen in the
concept can be discussed taking into consideration some of the crucial areas of the
implementation which are explained below:
Network security
There are different types of aspect which can be directly be related to the aspect of the
security capability and services which would be enhancing the aspect of the control access of the
network and the aspect of the increasing of the privacy of the system. One of the important
feature which can be stated here is the build in firewall, this directly allows the organisation to
create a private network within the concept of the AWS and control access features which is
related to the subnets and the instances (Singh et al.,2015). Encryption it can be stated to be
another aspect which is included into the concept which would be transited with the concept of
the TLS across the different services which are provided. Relating to the connectivity aspect it
directly enables the concept of the private and connections which are dedicated for the on
premise and office environment. The implementation of the technique of the DDoS can be
considered to be a part of the auto scaling process or the strategy relating to the content delivery.
Data encryption
The concept of thee data encryption can be considered as a technique which can be used
in the sector of the encrypting of the data so that it cannot be accessed by anyone apart from the
authorised user (Laudon & Laudon, 2016). Some of the data encryption technique which are
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
CLOUD COMPUTING
implemented within the concept can be stated in the sector of the data base services and the
AWS storages such as thee S3, Glacier, EBS, oracle RDS, Redshift and SQL server RDS. In this
concept it can be stated that the implementation of a flexible key management option is very
crucial which directly allow the organisation to choose whether to have an AWS to manage the
encryption key or to maintain the complete control over the different keys within the
organisation. hardware based key relating to the cryptography option of storage gives the option
to the customer to get themselves satisfied with the compliance requirement (Tebaa, Zkik & El
Hajji, 2015). In addition to this the AWS also provides a API which would be helpful in the
sector of the data protection and the integrated encryption with any of the different services to
engage and deploy the AWS environment.
Configuration and management of inventory
The AWS directly provides a range of tools which directly allow fast and reliable access
of the different features which is related to the concept of the access control and configuration
control which would be directly beneficial for the organisation who would be implementing the
sector (Gangwar, Date & Ramaswamy, 2015). It directly gives the provision of tools of
deployment which would be beneficial in the sector of creation and decommissioning the sector
of the resources which are available in the AWS according to the need of the organisation, the
configuration and the inventory management tools can be implemented in the sector of the AWS
resources which can be managed and tracked according to the changes to the different resources
which are available in the sector. In this sector the template design and the management tools can
be implemented in the sector of the creation of a standard which is predefined and hardened with
the virtual machine for the concept of the EC2 instances.
Monitoring
Document Page
12
CLOUD COMPUTING
The aspect of monitoring can be stated to be one of the important features which can be
related to the concept of the control mechanism which is related to the data and the information
which is saved in the concept (Laudon & Laudon, 2016). There is different sector of
implementation which can be seen in the sector that any form of risk factor which is associated
within the concept can be mitigated before it actually gets indulged into the concept of the
working of the organisation (Schlagwein, Thorogood & Willcocks, 2014). Hence risk evaluation
matrix can be implemented in the sector which would be helping in the sector of the detection of
the problem and planning a risk mitigation aspect so that the security of the data would be
directly prevailing in the system. The main consideration which is taken into focus is that from
were any to were the data is being accessed and delivered so that any form of intruder activity
cannot get indulged into the overall access of the data. Hence it can be stated that monitoring of
the risk can be helpful in the sector of the implementation of the concept so that there is different
sector of working which is related to the concept (Singh et al.,2015). The concept of alert
notification can also be very much helpful in the sector of the working so that whenever there are
nay from of intruder activity detected within the system, the system would be directly notifying
about the circumstances and immediately a plan should be implemented which would be directly
affecting the overall working satiation and providing a control measure which is related to the
concept.
Recommendation for Metasoft
Recommendation 1: The system which is recommended for the organisation should be
very much maintained and understood. This mainly deals with the sector of the implementation
of proper standard of working which is related to the concept so that there are no errors of
problem relating to the adaptation of the concept (Gangwar, Date & Ramaswamy, 2015). The
Document Page
13
CLOUD COMPUTING
system maintenance can be stated as one of the concern areas which would be helping the
organisation to adopt to the different sector of operation which is estimated from the system. The
installation of recent patches of the software should be done so that enhanced security
mechanism can be included into the working.
Recommendation 2: security management can be another important recommendation
which can be given in the domain of the implementation of the technology (Schlagwein,
Thorogood & Willcocks, 2014). It should be taken into consideration that security is prevailing
into the working of the system due to the factor that there can be different types of crucial data
which are seen in the sector of the working and if there are no security implications implemented
it can be a huge problem for the organisation and would be affecting the internal and the external
working of the organisation.
Recommendation 3: Backup of the data can be stated to be one of the factors which
should be taken into consideration. This implementation is very much important due to the factor
that if there are any sort of intruder activity it can directly result in the loss of the data. On the
other hand, if the data is saved with the concept of another server it can be beneficial in the
sector of not getting the data loss in the sector (Cleary & Quinn, 2016). Back up can be stated as
one of the most important implementation which should be done in the areas were dealing with
crucial information.
Recommendation 4: Authorised access to the data should not be given to the employee
who does not need the access of the data (Tebaa, Zkik & El Hajji, 2015). It can be stated as one
of the areas were the data integrity aspect can be removed from the concept. In most of the cases
it can be stated that if there are any form of unauthorised access it can directly impact the quality
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14
CLOUD COMPUTING
of the data which would be present in the concept. The restriction should be done at the entry
point of the data so that there is no possibility of unauthorised access (Laudon & Laudon, 2016).
BCP Changes
The concept which is related to the business continuity plan can be considered as a
technique which can be very much crucial for the working of the organisation. In the plan it can
see that alteration of the business processes is done which is going to directly impact the sector
of operation which is related to the organisation (Moro, Cortez & Rita, 2015). There are different
sorts of basics which is related to the aspect of the BCP which can be implemented within the
organisation. The following changes which would be directly impacting the sector of the
operation of the organisation relating to the BCP are stated below:
ï‚· Personal changes: It can be considered to be a good move to plan the changes within the
working of the organisation. These changes are directly impacted within the sector of the
operation which directly impact the sector of the operation of the business as well as alter
the overall benefit which is seen from the point of view of the employee who is engaged
in the working. In the concept of the plan change it should be considered that the plan is
well informed to the different employee who are engaged into the working of the
concept. Training can be also given to the employee so that they can easily adopt the
changes and make the implementation in the working of the different parts of projects in
the concerned areas.
ï‚· Software and hardware changes: In the domain of the moving to the concept of the
cloud it can be seen that there are different types of hardware and software changes
which can be implemented within the sector in a manner of the adaptation of the concept
of the cloud (Schlagwein, Thorogood & Willcocks, 2014). The main motive behind the
Document Page
15
CLOUD COMPUTING
changes is the implementation stages of the cloud computing so that the different
resources which are present within the concept of the cloud can be adopted and utilised.
ï‚· Hot site infrastructure: the concept which is related to the aspect of the hot site is that it
would be taking direct control of all the resources which are placed within the working of
the organisation. In the sector of the implementation it should be taken into consideration
that the system would be able to adopt to the different changes which are seen in the
sector of the implementation of the technology. The concept not only takes control of the
various aspects which are related to the working but also helps in the sector of the
monitoring so that everything within the concept is running properly or not. On the other
hand, it also takes into consideration the aspect which is related to the budget
prioritization which can be helpful in controlling of the overall budget which is seen in
the sector of the operation.
ï‚· Back up procedure change: In the concept of the working it can be stated that there can
be different types of risk factor associated with the concept so the concept of the backup
can be stated to be very much important due to the factor that if there are no type of data
lose it can directly impact the overall functionality which is related to the concept. One of
the recommendation which can be given in the sector of the backup is the tape to disk to
disk which would be helping in the sector of the backing up of the data and the control
mechanism of the data if there are any type of intruder activity seen within the working of
the organisation (Schlagwein, Thorogood & Willcocks, 2014). It should be taken into
consideration that the key up areas should be restructured to the accessed and security of
the data which would be prevailing in the concept should be secured from any type of
intruder activity. This concept would be changing the overall functionality which is
Document Page
16
CLOUD COMPUTING
related to the concept of the operation and the storing of the data within the concept of
the cloud.
Hybrid Cloud Administration and SLA Management
In the sector of the SLA management it can be stated that for the organisation there can
be a recommendation which is related to the implementation of an application which is named as
the ManageEngine application manager (Cleary & Quinn, 2016). This application can be very
much beneficial in the sector of the SLA monitoring which is related to the monitoring and the
performance of the critical mission application which is related to the business which would be
directly ensuring high performance of the different criteria which is related to the concept. The
concept which is related to the aspect can be stated to be out of the box support which is related
to the monitoring of the infrastructure which is heterogeneous which can directly empower the
organisation to focus on the different functionality which is related to the core business operation
which is related to the concept (Oliveira, Thomas & Espadanal, 2014). On the other hand, it can
be stated that the implementation would also be beneficial in the sector of providing valuable
insight into the IT infrastructure which is related to the end user of the mission critical
application.
The concept can be beneficial in different sector for example the monitoring of the
database, application, website, mail server, web application and the other services which is
related to the IT sector. In order to ensure that there is high availability relating to the mission
application which is critical business organisation try to embrace upon-n the different
functionality with the information technology infrastructure library(ITIL) processes. Some of the
main advantage which can be seen in the sector of the SLA management are stated below:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
17
CLOUD COMPUTING
ï‚· In the concept the business application which is involved into the concept would be
having a holistic view point.
ï‚· It gives direct support to the concept of the industry best practice.
ï‚· The SLA management gives directly access to better visibility on whether the
organisation is meeting the requirement of the organisation and the need of the customer.
In this sector it can be stated that the need of the customer is one of the most important
things which can be stated here.
ï‚· The concept gives standardized approach which is related to the concept of the managing
of the IT resources.
ï‚· High ROI and low TCO.
ï‚· The concept gives agent less monitoring which would be beneficial in the sector of the
decreasing the cost which is related to the concept.
SharePoint Migration Planning
The Metasoft organisation has planned to initially to set up a share point instance and the
movement of the SWL server 2012 database server to another kind of the cloud service provider
which is the AWS (Oliveira, Thomas & Espadanal, 2014). The main aspect which can be stated
here is the concept of the migration along with the testing which would be included into the
strategy. In the sector of the migration it can be stated that there are certain steps which can be
followed which would be very much beneficial in the sector of the SharePoint migration which
are stated below:
Triage: The concept can be directly related to the planning which is done prior to the
step of the migration which would be included into the concept. This step can be considered to
be very much useful in the sector of the implementation of the different condition which is
Document Page
18
CLOUD COMPUTING
related to the working which is seen in the sector. The framing of the concept in the sector is
very much important due to the factor that the overall implementation of the concept would be
dependent on this step.
Site inventory: This concept can be directly related to the aspect of the control which is
related to preserving the older system. This approach can be stated to be very much beneficial
due to the factor that there are different types of need of the customers which can be directly be
gained from the concept (Moro, Cortez & Rita, 2015). The site inventory can be beneficial in the
sector that it would be dealing with the need of the customer and how the overall working of the
concept can be controlled. The framing up of the different sectors of the business can be dealt in
the sector which would be helping in the sector of the initial planning of the organisation.
Migration test: The test which is related to the migration can be stated to be very much
important due to the factor of checking the overall transition of the system. In this concept the
working of the system can be seen and it can be also indicating whether the overall working of
the business needs is matching with the migration. In most of the cases there are different sectors
of implementation which should be checked. One of the sector which is very much important in
the sector is the security which would be prevailing into the system after the migration has to
launched and initiated. It takes into consideration that the different steps which are related to the
migration aspect is working properly so that there is no problem seen in the sector of the working
of the organisation. The rate which is related to the success factor can also be important in the
sector due to the factor all the crucial working of the Metasoft organisation would be involved
into the concept and if there are any form of problem or issue seen in the sector it would be
directly affecting the overall business aspects of the organisation.
Document Page
19
CLOUD COMPUTING
Critical point and issues
The final step which is related to the migration can be stated to be the critical point. It
majorly takes into consideration weather all the needs of the Metasoft organisation are taken into
consideration which would be very much beneficial in the sector of the working of the
organisation. One of the most important step which should be a concern area is the data which is
related to the concept (Cleary & Quinn, 2016). The SharePoint content database is directly
detached with the aspect of the SQL server in the given section of the sharepoint. In most of the
cases there are different functionality which can be considered as the retrieval of the data from
the concept and the access of the data which is seen in the sector. It should be a care area that the
data which is stored in the concept can be easily be retrieved by the organisation at the time of
need without any form of time lagging concept involved into it.
One of the issue which can be seen in the aspect can be the integrity of the data and the
security of the data which would be prevailing into the system. It can be considered that the
organisation wold be dealing with crucial data which form the backbone of the operations if
there are any form of error or intruder activity involved into the aspect it can be big a problem
for the organisation. The mitigation plan which can be stated here is the restriction of the entry
point of the data which is seen in the domain (Oliveira, Thomas & Espadanal, 2014). The data
which would be dealt in the system should be secured so that the integrity and the confidently of
the data would be directly prevailing into the concept. Hence indulgence of the aspect of security
can be stated to be one of the prime sector which can be seen in the sector which should be
adopted as a primary importance area. The range of control mechanism from the sector of the
initial planning of the movement to the sector of the working of the concept and the complete
migration are very much important so that there is no problem seen in the sector of the working
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
20
CLOUD COMPUTING
of the organisation after the implementation stages are being conformed and the working of the
process is started (Moro, Cortez & Rita, 2015). The aspect which is related to the flexibility of
the data can be another area of issue due to the factor that there can be different sector of
movement of the data within the Working of the organisation and moreover the security of the
data in the section of the movement can be considered to be a primary factor due to the factor
that that the data are crucial and it should be involving any approach which would be affecting
the overall integrity and the quality of the data within the sector of the movement of the data
(Cleary & Quinn, 2016). The cost factor which is related to the implementation can be one of the
issue factor which play a vital role in the sector of the movement of the overall working of the
organisation into the concept of the cloud. Sometimes it can be stated that after the
implementation or the adaptation of the concept it can be a very difficult job to discounting from
the sector of the operation which is related to the concept of the cloud computing.
Conclusion
The concept of the cloud computing and the relating to it the aspect of the AWS can be
stated to be one of the areas of implementation which is done by most of the organisation. In the
sector of the report for the Metasoft the AWS is recommended due to the factor that there are
different types of advantage which can be gained from the end of the organisation after the
implementation is done. It can be concluded on a note that risk factor within the working of any
technology can be stated to be one of the common factor but it should be taken into consideration
that the risk factor does not impact the overall working which is related to the organisation. The
concept of the cloud computing and the AWS are in the verge of research and it can be stated
that in the near future the concept would be playing a more dominating role. If the risk factor
Document Page
21
CLOUD COMPUTING
which are involved within the concept are focused and mitigation plan is implemented in each of
the sector more organisation would be trying to adopt to the concept of the AWS.
Document Page
22
CLOUD COMPUTING
References
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Cleary, P., & Quinn, M. (2016). Intellectual capital and business performance: An exploratory
study of the impact of cloud-based accounting and finance infrastructure. Journal of
Intellectual Capital, 17(2), 255-278.
Clemente-Castelló, F. J., Nicolae, B., Rafique, M. M., Mayo, R., & Fernández, J. C. (2017,
May). Evaluation of data locality strategies for hybrid cloud bursting of iterative
Mapreduce. In Cluster, Cloud and Grid Computing (CCGRID), 2017 17th IEEE/ACM
International Symposium on (pp. 181-185). IEEE.
Dobre, D., Viotti, P., & Vukolić, M. (2014, November). Hybris: Robust hybrid cloud storage.
In Proceedings of the ACM Symposium on Cloud Computing (pp. 1-14). ACM.
Fang, B., & Zhang, P. (2016). Big data in finance. In Big data concepts, theories, and
applications (pp. 391-412). Springer, Cham.
Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise
Information Management, 28(1), 107-130.
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical
review. International Journal of Computer Network and Information Security, 6(3), 20.
Hilbrich, M., Petrlic, R., & Becker, S. (2015). Towards a secure cloud usage for financial
IT. Open Identity Summit 2015.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
23
CLOUD COMPUTING
Huang, X., & Du, X. (2014, April). Achieving big data privacy via hybrid cloud.
In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE
Conference on (pp. 512-517). IEEE.
Kuijs, H., Reich, C., Knahl, M., & Clarke, N. (2015). Towards privacy for ambient assisted
living in a hybrid cloud environment. BW-CAR| SINCOM, 41.
Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education
India.
Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure
authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5),
1206-1216.
Lu, P., Sun, Q., Wu, K., & Zhu, Z. (2015). Distributed online hybrid cloud management for
profit-driven multimedia cloud computing. IEEE Transactions on Multimedia, 17(8),
1297-1308.
Luna, J., Taha, A., Trapero, R., & Suri, N. (2017). Quantitative reasoning about cloud security
using service level agreements. IEEE Transactions on Cloud Computing, 5(3), 457-471.
Mason, S., Fletcher, J. K., Haynes, J. M., Franklin, C., Protat, A., & Jakob, C. (2015). A
hybrid cloud regime methodology used to evaluate Southern Ocean cloud and
shortwave radiation errors in ACCESS. Journal of Climate, 28(15), 6001-6018.
Moro, S., Cortez, P., & Rita, P. (2015). Business intelligence in banking: A literature analysis
from 2002 to 2013 using text mining and latent Dirichlet allocation. Expert Systems with
Applications, 42(3), 1314-1324.
Document Page
24
CLOUD COMPUTING
Niu, Y., Luo, B., Liu, F., Liu, J., & Li, B. (2015, April). When hybrid cloud meets flash
crowd: Towards cost-effective service provisioning. In Computer Communications
(INFOCOM), 2015 IEEE Conference on (pp. 1044-1052). IEEE.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), 497-510.
Pluzhnik, E., Nikulchev, E., & Payain, S. (2014, June). Optimal control of applications for
hybrid cloud services. In Services (SERVICES), 2014 IEEE World Congress on (pp. 458-
461). IEEE.
Schlagwein, D., Thorogood, A., & Willcocks, L. P. (2014). How Commonwealth Bank of
Australia Gained Benefits Using a Standards-Based, Multi-Provider Cloud Model. MIS
Quarterly Executive, 13(4).
Singh, A., Mishra, N., Ali, S. I., Shukla, N., & Shankar, R. (2015). Cloud computing technology:
Reducing carbon footprint in beef supply chain. International Journal of Production
Economics, 164, 462-471.
Tebaa, M., Zkik, K., & El Hajji, S. (2015). Hybrid homomorphic encryption method for
protecting the privacy of banking data in the cloud. vol, 9, 61-70.
Wilson, B. M. R., Khazaei, B., & Hirsch, L. (2015, November). Enablers and barriers of cloud
adoption among Small and Medium Enterprises in Tamil Nadu. In 2015 IEEE
International Conference on Cloud Computing in Emerging Markets (CCEM) (pp. 140-
145). IEEE.
Document Page
25
CLOUD COMPUTING
Zhang, H., Jiang, G., Yoshihira, K., & Chen, H. (2014). Proactive workload management in
hybrid cloud computing. IEEE Transactions on Network and Service Management, 11(1),
90-100.
Zkik, K., Tebaa, M., & El Hajji, S. (2016). A new secure framework in mcc using homomorphic
signature: application in banking data. In Transactions on Engineering Technologies(pp.
413-427). Springer, Singapore.
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]