Security Management and Migration Report: Hybrid Cloud Implementation

Verified

Added on  2021/06/17

|26
|7023
|91
Report
AI Summary
Document Page
Running head: SECURITY MANAGEMENT AND MIGRATION
SECURITY MANAGEMENT AND MIGRATION
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2SECURITY MANAGEMENT AND MIGRATION
Table of Contents
Introduction................................................................................................................................3
Part 1..........................................................................................................................................4
Part 1.1...................................................................................................................................5
Part 1.2...................................................................................................................................7
Part 2........................................................................................................................................10
Part 3........................................................................................................................................12
Part 4........................................................................................................................................13
Part 5........................................................................................................................................16
Part 6........................................................................................................................................17
Part 6.1.................................................................................................................................17
Part 6.2.................................................................................................................................19
Conclusion................................................................................................................................20
References................................................................................................................................22
Document Page
3SECURITY MANAGEMENT AND MIGRATION
Introduction
Technology in recent times can be considered one of the criticalsectors which are
playing a role in the life of the ordinary people. In the area of the industry also technology is
dominating and helping them to advance in a more innovative and technological oriented
approach. Most of the technology is very much different in their way of assisting different
sectors toexcel in the field of the implementation. In recent times it can be stated that the
concept of cloud computing is very much in demand. This is due to the factor that it not only
helps in the sector of advancement of the organisation but also alters the internal as well as
the external working of the organisation (Chang, Kuo& Ramachandran, 2016). The field of
benefit which can be achieved from the concept due to lie in one sector but are full spreader
into different areas. This technology also helps in the industry of the less human intervention
which would be beneficial in the way ofminimising the error in the operation of the working
of the organisation. Most of technology in recent times are aimed at modifying an
organizations internal as well as external working and most of the time the organization tend
to achieve different kind of benefits which are related to the concept.
The primaryfocal point of the report is to focus on the organisation Regional Garden
Ltd. The organisation is a large display garden which opens for public inspection some days
in a year. The main aim of the organisation is to increase its responsiveness and flexibility.
On the other hand, the board of the organisation is expecting to save significant money
relating to the maintenance of the ICT infrastructure using closing the existing data centre.
The motive of the activity is to move to the concept of the cloud which according to the
organisation would be beneficial.
Document Page
4SECURITY MANAGEMENT AND MIGRATION
Part 1
The cloud architecture which would be employed to assist the Regional garden
directly is the Hybrid cloud architecture. The main reason for the selection of the hybrid
cloud is due to the factor that it is a combination of both private and public cloud. Taking into
consideration the definition of the hybrid cloud which is stated by the National Institute of
standard and Technology (NIST), “Hybrid cloud is a combination of public and private
cloudsbound together by either standardised or proprietary technology that enables data and
application portability.”The aspect which is related to the concept of the hybrid cloud can be
implemented in different forms, for example, it can be included as a private cloud which
would be inside the organisation. The aspect can comprise more than one providers of public
cloud or a hosted private cloud on the third party premises with more than one providers of
the public cloud.
According to a recent survey which was made by Trend Micro, an organisation who is
working in the concept of the security of the cloud stated that the service which is related to
the public cloud eventually fails to meet the demand of the IT and the requirement of the
business relating to few of the organisation. On the other hand, they concluded that the
concept of the hybrid cloud would be very much beneficial for the purpose. It can be stated
here that the idea of the hybrid cloud can be a stage which is intermediate as an enterprise
prepare themselves to move their overall working which may include the internal as well as
external operation into the concept of the public cloud. Some of the critical issues which can
be considered in the idea of the hybrid cloud that is beneficial for the organisation would be
increasing in the sector of the flexibility of the organisation. One of the other benefits which
can beachieved from the concept is that since the overall working of the organisation is
placed in the idea of the cloud, the organisation can focus more on job’s which are more
critical for them(Chang, Kuo& Ramachandran, 2016). The cloud storage concept which is
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5SECURITY MANAGEMENT AND MIGRATION
related to the data can also be beneficial in a way that the essential data of the organisation
can be saved in the idea which wouldkeep in a secured manner without any third party getting
access to the data. On the other hand, it can be stated that the data can be retrievedor access
from anywhere and at any time. This fact mainly means that the data which is stored in the
concept of the cloud computing is very much available whenever the organisation wants to
access the data. In most the cases the resources which are required by the organisation to
process their functionality are not available, but in the concept of the cloud computing can be
stated that the funds are readilyavailable and are provided by the cloud providers upon the
factor of the requesting(Almorsy, Grundy & Müller, 2016). Taking into consideration another
traditional system it can be a very much cost-oriented factor but in the concept of the cloud
computing the charges are applied according to the usage and the need of the different
services which would be used by the organisation. These are factors can be very much
beneficial for the Regional Garden Ltd,and they can achieve the advantage form the service
straightforwardly and cost-effectively. The organisation by means of moving the complete
infrastructure of the concept of the cloud they would be focusing on more of the important
tasks which are related to the internal or external working. Most of the aspects which are
related to the concept of the cloud computing would be very much beneficial in altering the
working of the organisation and helping to achieve a greater standard of working of the
organisation.
Document Page
6SECURITY MANAGEMENT AND MIGRATION
Figure 1: (HYBRID CLOUD)
(SOURCE: Manvi&Shyam, 2014)
Part 1.1
Mainly in the process of the deployment, the use of two architecture would be done
which are public cloud and private cloud.
Public cloud
A public cloud can be primarilybe considered as an internet. The provider of the
service uses the concept of the internet to make the resources for example storage and
application which would be directly available to the organisation. Some of the cases which is
related to the public cloud is IBM’s Blue Cloud; Amazon Elastic compute cloud, Google
Apennine and sun cloud (to name a few).
Document Page
7SECURITY MANAGEMENT AND MIGRATION
For the organisation, these type of clouds will be very much economical and can be
considered to be very much inexpensive in the sector of the implementation due to the factor
that the aspects which are related to the application, hardware and bandwidth are covered by
from the side of the providers. It can be considered as a model which is built on the aspect of
the pay per usage model,and the cost would be directly be related to the capacity of the usage
of the service(Chang, Kuo& Ramachandran, 2016).
It can be stated here that the concept of the public cloud can be very much
advantageous due to the factor of the concept being accessible from any location and by
anyone. Any user or customer or organization can directly utilize the concept and make
benefit from the aspect. On other hand one of the issues which can be stated relating to the
public cloud is that it does not involve much of the security which is related to the data of the
organization or the user. security can be one of the biggest issue in most of the aspects which
are related to the concept of the cloud computing.
Private Cloud
A private cloud can be considered as the architecture of data centre which is owned
by most of the organisation. The main advantage which can beachieved from the concept is
that it provides provisioning, scalability, monitoring and automation. The central aspect
which is related to the working of the private cloud is not to give the overall access to the
data centre of the darkness and keep some of the control to within the operation of the
organisation.
The private cloud concept can be expensive with the aspect of the typical modest
economic scale. This option of the cloud service cannot be implemented by most of the
small-scaleorganisations and is majorly performed by large enterprise groups. The private
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8SECURITY MANAGEMENT AND MIGRATION
cloud concept is driven by the presence of the compliance and security and keeping the assets
within the idea of the firewall.
Private cloud are basically used by organization who have a vast range of data which
are majorly sensitive data of the organization. These type of data can be very much crucial
for the organization and if the data goes into the hand of another person it would be a great
loss for the organization (Almorsy, Grundy & Müller, 2016).
Comparing the concept of the private and public cloud it can be stated that there are
different variety of functionality of each of the approach and which can be implemented
according to the need of the organization. In most of the times organizations prefer the use of
private cloud due to the aspect of the security which is involved into the concept and how the
people can easily store their sensitive data into the concept without and concern factors such
as loss of data or data theft affecting the data. On the other hand the private data of the
organization can be sometimes so much critical for their working is that it cannot be placed
into the concept of the public cloud were anyone can directly access the data. It can be stated
here that the critical data should not be saved in the context of the public cloud being
vulnerable to the attack by any third party and it can be accessed by anyone.
Part 1.2
The concept of the hybrid cloud can be considered to be offering the aspect which is
related to the scale and benefits which are related to the public cloud and the feature of
security and control which is associated with the concept of private cloud (Hashem et al.,
2015). The concept of the hybrid cloud focus on the aspect of the security and they majorly
deal with the securing aspect of the data of the organization so that it is not into the hand of
any third party or any unauthorized user. The following points give a direct overview of the
Document Page
9SECURITY MANAGEMENT AND MIGRATION
benefits which are related to the aspect of the hybrid cloud relating to the implementation of
it in the Regional garden Ltd.
Cost saving
The concept directly reduces the capital expense due to the factor that the organisation
infrastructure wouldbe outsourced to the idea of the providers of the public cloud
It helps in the concept of the optimisation of thesupport which is spentduring the
different stages relating to the application lifecycle. The idea of the public cloud can
be used for the infrastructure development and the design if the private cloud can be
used for the aspect of production. It can be stated here that the concept is very much
cost effective when relating to the on-premises infrastructure.
It improves the sector of the allocation of the resources at a cost which is vastly
reduced due to the use of the concept of the public cloud removes the need which is
related to the investment in the aspect of the carrying out different projects (Oliveira,
Thomas &Espadanal, 2014).
Comparing with traditional system it can be stated that most of the service which is
related to the cloud computing are based on two tier system. The first tier basically
consist of fixed amount of service which given to the customer and they pay for the
service and the second tier mainly consist of the facility which is related to the aspect
of usage per pay. This mainly means that the customer or the organization has to pay
according to the resources they actually use and how much they use, there are no
fixed amount involved into the concept.
Agility of business
The deployment sector can be well managed within the aspect of the private cloud
along with the issue of the scaling which is related to the public cloud.
Document Page
10SECURITY MANAGEMENT AND MIGRATION
It directly provides improvement drastically in the sector of the organisational agility
due to the factor that is related to the ability to directly leverage the public cloud
concept. This helps in the idea of the increase in the opportunity which
wasunavailablein the sector of the traditional infrastructure or pure cloud which are
private (Almorsy, Grundy & Müller, 2016).
The concept of the cloud bursting is also supported in the context which helps in the
aspect of the tapping of the public cloud for a need which is unexpected relating to
different computing resources.
Security consideration
It can be stated here that since the concept of the hybrid cloud extends into the IT
perimeter outside the boundaries of the organisation, it directly opens up the large
surface area which is related to the attack with the hybrid infrastructure of the cloud
under the control of the providers of the service (Hashem et al., 2015).
When an organisation manage the complex hybrid environment of the cloud using the
tool either as a section of the cloud platform which is in the cloud platform or the
aspect of the third party tool, the organisations should take into consideration the
element which is related to the security implication of using of each of the devices. It
can be stated here that the tools of management.
Security can be considered one of the most vital aspect in the concept of the cloud
computing due to the factor that most of the critical data are saved in the concept of
the cloud. It can be stated here that if the data of the user gets into the hand of any
third party it would be directly affecting the overall functionality of the organization.
In most of the cases organization thin twice before they actually mitigate their data
into the concept of the cloud. This is due to the factor that they are not sure about the
security aspects which are involved into the concept. On the other hand it can also be
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11SECURITY MANAGEMENT AND MIGRATION
stated that most of the service providers do not give a clear idea about the type of
security which would be included into the data.
Part 2
Risk factor Justification Control
IT architecture Design The design concept of the
hybrid cloud is complicated
which requires the involvement
of highly professional IT staff
The control measure can be to
appoint a highly professional
IT expert who would be in
control of the overall system
Data Management Most of the organisation tend
to move towards an automation
process which would involve
more security risk which is
related to the data.
The encryption of the data has
to be done majorly in each of
the data. This would be
beneficial in the aspect of
securing the data in the concept
of the cloud.
Disaster Recovery There can be different types of
the disaster which can be
facedwith the concept of the
cloud which can directly lead
to disruption in the normal
working as well as the security
of the data.
There should always be a
recovery plan which would be
related to the data. The concept
would be beneficial in a way
which helps in the platform of
securing the private
information of the user or the
organisation (Chang, Kuo&
Ramachandran, 2016).
Document Page
12SECURITY MANAGEMENT AND MIGRATION
Access control The access to the concept of
the cloud can be done with the
help of private network or over
the idea of the cloud. This
mainly means that the entrance
to the data over the streamline
of the data would be a risk-
based approach which would
be delivering the aspect of the
concept (Hashem et al., 2015).
The access aspect which is
over the concept of the internet
can be very much
advantageous due to the factor
that it would be directly
securing the access and no
other person apart from the
authorised person.
Switch between Vendor In most of the cases, the aspect
of the switching between
vendors can be a big problem
which directly involved cost
aspect involved in it. The
organisation have to pay a
considerable amount to
mitigate from one service
provider to another.
In most of the cases, it can be
seen that the data of the user
are not safe in the hand of one
vendor. In such a situation it
can be seen that the allocation
of the resources should be done
in a proper manner taking into
consideration different aspects
which are related to the
working within the concept of
the cloud.
Part 3
The steps which are required for the concept control related to the hybrid cloud are stated
below:
Document Page
13SECURITY MANAGEMENT AND MIGRATION
Be wise about where the data goes: The concept of the hybrid cloud directly allow
the organisation to save the critical data directly in the in-houseidea. On the other
hand for the less critical data, it can be kept in the view of the cloud which is very
easy relating to the storage of the data. This aspect is provided by the public cloud
providers. Before the element of the securing of the data is taken into consideration, it
must be taken into account that not all data are equally created. Some of the data may
be considered as a regulated and another form of data can be supposed to be
proprietary information. To get the maximum amount of security relating to the data,
it should be ensured that the adaptation of the concept is done which is highly
encrypted and also the idea of the resource isolation which provide that the data of the
organisationare not saved in the concept of the other organisation(Oliveira, Thomas
&Espadanal, 2014).
Start with the concept of the compliance and the supplement with the smart
policy: The agreement which is related to the regulatory can be considered one of the
most appropriate point of starting which is similar to the securing of the concept of
the hybrid cloud. Taking into consideration the layer of the security it can be stated
that the organisation can implement more layers of protection and different goals of
the organisation and also can implement the aspect of the goals of the IT and business
bodies. It should be made sure that the backups, redundancies and another point
which are related to the vulnerability are kept at the sameend of same levels of the
protocols of the security that can be considered as personal data.
Redundancy builds: There are two types of hardware, one being the hardware which
is failed and on the other hand a device which would eventually collapseshortly. Both
the sectorof the private and the public solution of the cloud must directly include the
data redundancies and the equipment so that when the devicefails, there would not be
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14SECURITY MANAGEMENT AND MIGRATION
any data loss. It can be stated here that the concept of the redundancy can be achieved
from the idea of the backups. It should be marked sure that the redundancyexist in the
idea of the data and there are no single failure points.
The transparent partnership of public cloud:One of the most important aspects
which are related to the cloud computing is the collaboration between a service
provider which can be directly be trusted,and the service which is generated from the
end of the service provider is genuine.
Part 4
Recommendation 1
Application resilience
There can be different types of problem which can be facedwith the concept of the
cloud,and the implication of the question can be on the system. In most of the cases, the
average working of the organisation can be altered if there is any problem faced by the
organisation. It can be stated here that the standard functionality of the organisationdepends
upon the application and if there isan error in the aspect, the concept will not work
accordingly to the requirement. The primary recommendation in the idea is that it should be
taken into consideration that the application should work correctly even if there is some
problem in the system. It should be taken into account that the toachieve the standard
functionality of the system a backup plan should always beimplemented which would be
helping to secure the network(Almorsy, Grundy & Müller, 2016).
Recommendation 2
Backup
Document Page
15SECURITY MANAGEMENT AND MIGRATION
There can be different types of event which can hamper the normal working within
the concept of the hybrid cloud. The game can sometimes alter the overall operation which is
expected from the idea of the cloud. In most cases, the organisation tend to save data which
are highly relevant and critical. The loss of the data can be a big problem for the organisation.
The event can sometimes be-be considered as inevitable. To protect the data from such issue,
the primary recommendation in the concept is the backup of the data. The data in such
situation would be very much safe and would not affect the working if the data is lost due to
some event.
Recommendation 3
Disaster recovery
Disaster in the concept of the cloud computing can be considered to be very much an
event which can be regarded as one of the most significantdisadvantages in the sector of
working with the cloud. The primary recommendation which can be stated in this context is
that there should always be a backup plan in place which would be implemented when there
is any disaster in the concept of the cloud environment. On the other hand, it can be stated
that the disaster recovery action should be implemented as soon as the event occurs, due to
the factor that it would not be altering any of the functionality and would not possess any
threat to the organisation. Disaster can come anytime and it can be stated here that since the
data of the user is stored in the concept of the cloud it can be a problem if the data are lost.
Sometimes due to disaster the organization do not get the access to the data which could be
very much crucial in the way which would be altering the initial working of the organization.
Recommendation 4
Initial set up
Document Page
16SECURITY MANAGEMENT AND MIGRATION
The initial concept of the cloud framework which should be taken into consideration
should be planned according to the requirement of the organisation. This phase can be
considered very much crucial due to the factor that the overall working of the organisation
depends on the setup process and the implementation of the perspective of the cloud
technology. The initial set up should be done in a manner focusing on the goal of the project
and the requirement of the organization in the part of the technology should be considered in
this manner. The technology can sometimes be very much crucial in the concept of the
organisation due to the factor that if any of the aspects which is related to the adaptation fails
it would be directly affecting the overall process of working which is associated with the
external as well as internal working (Oliveira, Thomas &Espadanal, 2014).
Recommendation 5
Outcome
The outcome of the process should be taken into consideration at the start of the
process. This is due to the factor that there should be an initial goal of the organisation which
would be focused. In most of the cases, it can be stated that there should be an orientation
target which would be directly focused on the aspect. It can be considered one of the most
crucial sector or recommendation which would be focused on the element of the working of
the organisation as well as the internal and external working of the organisation. The main
goal should be set up in the phase of the initialization due to the factor that so that in the later
face everyone one is involved into the organization can activity work towards a common goal
which can be easy to approach if proper process is taken into consideration. Experts should
always be involved into the concept of the decision whether the overall process and the
aspect of the mitigation is done properly and it can be stated that if the final outcome is not
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
17SECURITY MANAGEMENT AND MIGRATION
reached properly then it would be directly mean that the planning phase was not properly
(Almorsy, Grundy & Müller, 2016).
Part 5
Remote server Administration: The remote server administration can be considered
as one of the most important aspects which is related to the working within the concept of the
cloud infrastructure. Any type of problem in the idea of the remote server can be very much
critical for the can later the normal functionally of the organisation. In these type of situation
to take care of the case, a professional expert has to be appointed which would be taking care
of the overall system(Rittinghouse&Ransome, 2016). One of the criticalaspects in this
scenario is that whenever there is any problem in the remote server, the question has to be
resolved in that particular instance only. The main reason for the aspect is that it should not
possess any threat to the system (Almorsy, Grundy & Müller, 2016).
Management of resource: The management of resources in any technology can be
considered very much necessary. This is due to the factor that it would be directly affecting
the overall budget in any scenario. The resource section can be directly be related to the
aspect of the functionality which is related to the budget constraint. If proper utilisation of the
resource is done, it would be straight affecting the budget of the organisation,and it would
impact the standard functionality of the organisation as well (Manvi&Shyam, 2014).
Sometimes it can be stated that an experienced person should be involved into the activity so
that the resources allocation are done properly and there is no wastage of the resources.
SLA management:The service level agreement can be considered one of the vital aspects
which is related to the functionality which is related to the concept of the cloud computing. It
gives a direct overview of the concept which are involved into the concept and how the
overall working in the concept of the cloud would be managed. The central aspect which is
Document Page
18SECURITY MANAGEMENT AND MIGRATION
related to the SLA management is that there should not be any unforced error which would be
directly affecting the system which is similar to the Service level agreement. Some of the
parts which are related to the SLA are stated below:
Benchmark performance and actual performance can be directly be compared.
Allocation relatedto the response time.
Usage statistic which would be very much provided.
The schedule notification in the sector of the network that may directly affect the user
(Oliveira, Thomas &Espadanal, 2014).
These all aspects mainly include the sector of the service level agreement which should
be taken into consideration which would be affecting the overall working of the organisation.
Part 6
Part 6.1
Figure 2: (MIGRATION TO THE AWS CLOUD)
(SOURCE: Manvi&Shyam, 2014)
Phase 1: Business planning and migration preparation
Document Page
19SECURITY MANAGEMENT AND MIGRATION
In this phase, the primary object is taken into consideration which would be involving
an idea of different types of benefit which can be achieved from the concept. The main
starting point relating to the process can be some of the fundamental experience and the
development of the preliminary business case for the idea of the migration. These majorly
takes the sector of the architecture of the present system and the constraints (Almorsy,
Grundy & Müller, 2016).
Planning can be considered one of the primary objectives which are related to the
organization and this planning aspect should be always goal oriented. The goal should be
very much common for everyone and the working should be done accordingly (Almorsy,
Grundy & Müller, 2016).
Phase 2: Portfolio planning and Discovery
The next step which is taken into consideration is the concept of the IT portfolio, the
direct dependences between the applications and the beginning of the aspect which is related
to the migration strategy. With the portfolio discovery and the approach of the migration, the
basic concept of the movementis taken into consideration,and the functionality of the
organisation should be taken into account(Manvi&Shyam, 2014).
Phase 3 and 4: Migration, designing, migration and application validation
In this phase, the focus moves from the aspect of the portfolio level to the application
level which is related to the individual. Each of the application is designed, validated and
migrated according to one of the six standard strategies of the form (“The 6R’s”). After this,
there would be a fundamental approach which is related to the working of the migration
process.
Phase 5: Operate
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
20SECURITY MANAGEMENT AND MIGRATION
This can be considered as a phase where the application is migrated to another
platform,and the dependent on the aspect is taken into consideration. It can be viewed as a
time where the old system is switchedoff,and the new system is in full power of the
organisation (Rittinghouse&Ransome, 2016).
Part 6.2
The issue in the migration phase are stated below
Phase 1: Business planning and migration preparation
The main issue which is faced in this phase is that if the planning of the process is not
donecorrectly, it can create different types of problem. In some of the cases it is seen that the
problem is not faced primarily,but in some situation, it can be stated that later on the issueare
identified which directly affects the overall working of the organisation(Almorsy, Grundy &
Müller, 2016)..
Phase 2: Portfolio planning and Discovery
This phase can also be considered as one of the vital steps in the process or the life
cycle of the mitigation. It can be stated that it directly involves a post-stage related to the
planning where portfolio planning is mainly taken into consideration (Manvi&Shyam, 2014).
The concept of the migration is taken into account which if not taken into account properly
can directly impact the internal as well as the external working of the organisation(Almorsy,
Grundy & Müller, 2016).
Phase 3 and 4: Migration, designing, migration and application validation
In this step, the significant migration step is done. In this phase, it can be stated that
the system planning is taken into consideration and the implementation of the system is done
which directly impact the sector of the working of the organisation. Application validation
Document Page
21SECURITY MANAGEMENT AND MIGRATION
process can be considered very much vital due to the factor that there can be different types
of a loophole in the system which would be affecting the overall approach.
Phase 5: Operate
In this phase, it is seenwhether the implementation of the system is donecorrectly or
not. This step can be considered one of the most vital area because there can be a different
issue which can alter the functionality of the organisation(Almorsy, Grundy & Müller, 2016).
Some of the sector which are taken into consideration security of the data which is involvedin
the concept. It can be considered as a step where the old system turned off,and the new
system would be taking control of the overall system. Some of the issue which can be noticed
in this scenario is that whether the system is performing the intended task, it was expected to
play (Rittinghouse&Ransome, 2016).
Conclusion
The report can be concluded on a note that the concept of the cloud can be very much
beneficial for the Regional Garden. The primary sector of the functionality is in the industry
of the flexibility and operation. In any technology, there are few disadvantages associated
with the process, in this case even the concept of the hybrid cloud which is proposed on the
implementation also has some issue which is majorly stated in the report. The migration
aspect should be the most critical sector which should be given more focus due to the overall
implementation would be responsible for the entire working of the organisation. The concept
of the security of the data can be one of the sector or areas which should also be taken care of
due to the factor that if there isan unethical issue in the aspect, it can lead to different kind of
risk factors within the organisation. In the recent future, it can be stated that the concept of
cloud computing would be playing a dominating role and more and more organisation would
be focusing on the aspect and would be trying to gain advantage from the concept. The
Document Page
22SECURITY MANAGEMENT AND MIGRATION
concept can sometimes be complicated for the ordinary people to understand so in that case a
professional expert should be consulted so that there is no problem which is related to the
operation and the working of the concept.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
23SECURITY MANAGEMENT AND MIGRATION
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., &Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework:
A security framework for business clouds. Future Generation Computer Systems, 57,
24-41.
Chen, M., Zhang, Y., Li, Y., Mao, S., & Leung, V. C. (2015). EMC: Emotion-aware mobile
cloud computing in 5G. IEEE Network, 29(2), 32-38.
Chen, X. (2015). Decentralized computation offloading game for mobile cloud computing.
IEEE Transactions on Parallel and Distributed Systems, 26(4), 974-983.
Gai, K., Qiu, M., Zhao, H., Tao, L., &Zong, Z. (2016). Dynamic energy-aware cloudlet-based
mobile cloud computing model for green computing. Journal of Network and
Computer Applications, 59, 46-54.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced
revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Document Page
24SECURITY MANAGEMENT AND MIGRATION
Lian, J. W., Yen, D. C., & Wang, Y. T. (2014). An exploratory study to understand the
critical factors affecting the decision to adopt cloud computing in Taiwan hospital.
International Journal of Information Management, 34(1), 28-36.
Manvi, S. S., &Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of Network and Computer Applications,
41, 424-440.
Marinescu, D. C. (2017). Cloud computing: theory and practice. Morgan Kaufmann.
Oliveira, T., Thomas, M., &Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors.
Information & Management, 51(5), 497-510.
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing
features, issues, and challenges: a big picture. In Computational Intelligence and
Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., &Venkatasubramanian, N. (2014).
Mobile cloud computing: A survey, state of art and future directions. Mobile
Networks and Applications, 19(2), 133-143.
Rittinghouse, J. W., &Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions
on Industrial Informatics, 10(2), 1435-1442.
Document Page
25SECURITY MANAGEMENT AND MIGRATION
Wang, B., Zheng, Y., Lou, W., &Hou, Y. T. (2015). DDoS attack protection in the era of
cloud computing and software-defined networking. Computer Networks, 81, 308-319.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., &Vasilakos, A. V. (2014). Security
and privacy for storage and computation in cloud computing. Information Sciences,
258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., &Buyya, R. (2014). A survey on vehicular cloud
computing. Journal of Network and Computer Applications, 40, 325-344.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., &Ren, K. (2016). A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), 2594-2608.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and
distributed denial of service (DDoS) attacks in cloud computing environments: A
survey, some research issues, and challenges. IEEE Communications Surveys &
Tutorials, 18(1), 602-622.
Zhan, Z. H., Liu, X. F., Gong, Y. J., Zhang, J., Chung, H. S. H., & Li, Y. (2015). Cloud
computing resource scheduling and a survey of its evolutionary approaches. ACM
Computing Surveys (CSUR), 47(4), 63.
Zhang, H., Jiang, H., Li, B., Liu, F., Vasilakos, A. V., & Liu, J. (2016). A framework for
truthful online auctions in cloud computing with heterogeneous user demands. IEEE
Transactions on Computers, 65(3), 805-818.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
26SECURITY MANAGEMENT AND MIGRATION
Appendix
MEMBERS
1. 11622389 V.BHARATH REDDY
2. 11621782 A.PRAKASH REDDY
3. 11620516 G. PRADEEP YADAV
4. 11645693 B. CHANDAN KUMAR
chevron_up_icon
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]