Tuesday, December 10, 2019

Topic-Cloud Computing Software as a Service Samples for Students

Question: What are the most likely problems that SoftArc Engineering will encounter with the model that you recommend? How would you advise SoftArc Engineering to deal with these issues? Answer: Introduction The paper focuses on SoftArc Engineering Company which mainly operates their business in various countries of the world which include New Guinea, Australia and Indonesia. The company has its own Web based infrastructure for managing various functions as well as operations of the organization. However, SoftArc Engineering Company wants to expand its business and for that, Web infrastructure is not appropriate. Therefore, the organization wants to shift their web based system architecture to cloud based architecture. This also helps the organization in gaining appropriate amount of competitive advantage. The decision that the SoftArc Engineering Company has taken not only helps in enhancing competitive advantage but also helps in increasing availability as well as flexibility of both data as well as information within the system architecture. This paper mainly illustrates various advantages as well as challenges that SoftArc Engineering Company will achieve by moving this web-based infrastructure to cloud. The paper also helps in providing number of recommendations that are very much helpful in resolving various types of issues of the Web-based architecture. In addition to this, Cloud based architecture also have some security issues which are discussed within this paper for resolving them appropriately. Discussion on the cloud architecture that is deployed with the company of SoftArc Description of the cloud architecture and proper reason behind its deployment It is analyzed that SaaS (Software as a Service) is one of the cloud-based architecture that is found to be appropriate for the SoftArc Engineering Company. This cloud-based architecture is generally selected as it helps in resolving various types of issues as well as challenges that are faced by SoftArc Engineering Company (Dinh et al., 2013). The software distribution model is generally offered with the help of third party suppliers to both the clients as well as users as per their requirements. This architecture helps in reducing the effort of the company while operating on the cloud-based infrastructure. This application is very much helpful in both storing as well as transferring appropriate data within appropriate data centers. SaaS model is generally selected for SoftArc as this architecture helps in providing proper operations of data that are generally stored within the server of the organization. It also helps in offering appropriate data update as per the needs as well as requirements of user (Rittinghouse Ransome, 2016). The model helps in offering very much flexible operations to both the users as well as to the developers in order to manage various applications within SoftArc Engineering Company. The model or architecture of SaaS is generally installed with the help of a third party and therefore the architecture can be easily accessed by the users irrespective of the time. Benefits as well as challenges of the selected cloud architecture The various benefits of SaaS include: Flexibility of data: SaaS architecture helps in providing proper facility of data flexibility as well as accessibility within the SoftArc Engineering (Fernando, Loke Rahayu, 2013). Additionally the organization can easily transfer data as per the demands as well as requirements of the user. Autonomous updates: The architecture of SaaS helps in providing proper as well as effective autonomous updates as per the various users data as well as storing pattern, which are generally involved within the structure of SoftArc Engineering Company (Li et al., 2013). The software as a service helps in providing appropriate support for managing various updates of data sets. Accessibility of data: The data that is stored within the cloud can be easily accessed by the users as per the different needs as well as requirements of the users. The risks that are associated with SaaS include: Dependency: The infrastructure of cloud is entirely dependent on internet, which is considered as an important challenge (Arora, Parashar Transforming, 2013). Security Issue: It is identified that one of the most important concern for the SoftArc Engineering is security issues. Description of the risk as well as control measures that are related with Hybrid Cloud Architecture It is analyzed that there are numerous risks as well as control measures which are associated with Hybrid Cloud Architecture. Data Issues: It is identified that both sensitive data as well as information creates major issue or problem within the cloud-computing infrastructure of the organization. The data that are stored within the cloud can be easily accessed by the users. The data that are accessed by the users can be private, public or common data. The data can be accessed by anyone at any time, which hampers the privacy of important data as well as information (Whaiduzzaman et al., 2014). This data that are stored on the cloud can be stole which assists in creating number of issues for the organization. It is analyzed that both the service providers as well as unauthorized users can access data as well as information that are stored within the architecture of cloud. If the service provider suddenly shuts down the service due to any type of technical issue, there is a chance of data loss, which is also considered as one of the significant issue. Solution: The data access procedure must be monitored properly in order to provide proper security as well as privacy to the cloud-based infrastructure. The various types of data issues can be resolved properly by utilizing proper monitoring approach in context cloud based service providers. The action of monitoring can be categorized into two different segments that include user end monitoring as well as provider end monitoring (Wei et al., 2014). These monitoring measures are ery much helpful in resolving various types of issues as well as functional problems that are related with various types of security issues within the cloud-based infrastructure. Secrecy Issues: It is analyzed that the system applications of cloud-based architecture face another important set of problems that include Secrecy issues. If the users are not able to provide proper security measures then the chances of security issues arises (Tao et al., 2014). One of the important tasks of the service provider is to ensure accurately that the users are protected properly when they are utilizing services from other service providers. Additionally, it is identified that there are number of servers, which are considered eternal, and as a result, they can be easily accessed with the help of any user. Due to this reason, the privacy of the users is hampered as their data is accessed with the help of third party. Solutions: The secrecy issues within cloud-based applications can be solved by utilizing control of consumer access to various devices. Different types of applications as well as gadgets are generally utilized within the infrastructure of cloud where various types of malicious codes are injected within the network (Toosi, Calheiros Buyya, 2014). It causes deployment of different types of hacking issues that further helps in diminishing both the flexibility as well as capability o network in context to various needs as well as requirements of the users. Infected Applications: It is identified that more than one application are generally combined with the help of cloud computing server and therefore numerous chances of occurring various types of malicious codes within different application assists in harming both the devices as well as functional operations within the network architecture (Moreno-Vozmediano, Montero Llorente, 2013). If the users are not capable of controlling as well as monitoring various applications then it will create number of problems. The users of cloud service architecture faces number of challenges due to the introduction of unauthorized users within the network architecture of the organization. Therefore it is very much important for the providers to serve the customers properly by utilizing appropriate choices of security measures in context to various malicious attacks within various cloud based applications as well as services. Solutions: The various types of infected applications are generally injected with the help of various unauthorized users as well as clients that assists in harming the entire infrastructure of cloud-based system (Jain Paul, 2013). Therefore, it is very much important to have proper as well as appropriate verified access that helps in restricting unauthorized the access of the users by managing as well as maintain the security related infrastructure of the cloud-based services appropriately. In contrast with this fact, it is very much important for the provider to check the verification of the users appropriately before the data as well as information are modified within cloud based network architecture (Khan et al., 2013). It is analyzed that verification of access control is very much helpful in managing various types of unwanted access to different cloud based information of data. Security Issues: It is identified that security related challenges are divided into two significant level of operations, which are provider level, as well as user level. The various types of external threats are generally attacked with the help of the server that causes the attacks within the infrastructure of cloud network (LD Krishna, 2013). Sometimes, the service providers of cloud helps in offering secured cloud service. However, there are numerous chances of network infection from the users end as they are not concerned about the security as well as privacy of cloud-based infrastructure. Solutions: The security issues or challenges that mainly occur within the organization can be resolved easily by utilizing security check events. This not only helps in resolving the issues that are associated with cloud architecture but also helps in resolving problems that are occurring due to cyber attacks (Gai, Tao Zhu, 2015). Therefore, by utilizing various security check events, malicious codes as well as users are detected in context to various cloud security measures that generally involved within the various network infrastructures that generally resulted into the adoption as well as development of cloud based system architecture within the SoftArc Engineering Company. Description of the general information security steps for securing hybrid cloud The general security step that helps in securing the hybrid cloud includes: Risk Identification: The risks must be identified appropriately by the various service providers as well as clients. This strategic step is found to be very much advantageous for both the users as well as service providers as it makes them much more aware about different types of security issues as well as other types of functional backlogs (Lukyanchikoy et al., 2015). The assessment of risks is beneficial as it helps in making the comparison of data as well as malicious code quite easy in context to various consequences, which are included by both the significant as well as unauthorized users within proper cloud environment. It is identified that there are generally three segments that helps in controlling the assessed risks that include risk acceptance, risk mitigation as well as risk avoidance. Standard and Compliances: It is analyzed that both compliances as well as standards are quite important for handling the security infrastructure of the cloud architecture in context to various demands as well as needs of both clients as well as users of the cloud service provider (Maurer, Brandic Sakellariou, 2013). It is identified that both ISO as well as COBIT are considered as significant standards, which must be managed within the providences of cloud service. Assessment of security Risks: It is identified that assessment of security risks is another important aspect, which must be managed in context to various security risks measures that are involved with the system architecture of various cloud-based applications. Appropriate security risks measures like data encryption as well as data redundancy within various data centers helps in managing as well as handling security for different cloud based architecture (Menzel, Schonherr Tai, 2013). The various service providers as well as organization that are generally associated with cloud-based services must be aware of different security measures. Improved data redundancy: Data redundancy is defined as an approach that suggests that various information as well as data must be kept separate with respect to different functionalities as well as emergence. The cloud based infrastructure helps in providing this feature properly to various users as well as clients (Oliveira, Thomas Espadanal, 2014). In order to ensure that the data, which is stored within the infrastructure of cloud, it is quite important to make it much more redundant in context to various demands as well as requirements of the users. The feature of data redundancy is considered compatible with the utilization as well as functionalities, which are very much necessary for proper operation of the cloud based infrastructure. Data Encryption: The data that is stored within the infrastructure of cloud can also be secured with the help of an approach that is known as data encryption (Pluzhnik Nikulchev, 2014). The cloud-based application must keep their important data as well as information secured from malicious attacks.. Data Encryption helps in protecting data as well as information by obstructing the injection of malicious attack. Control over data: It is considered as one of the important aspect that helps in providing appropriate security to the hybrid cloud architecture in context to different functional aspects, which are generally involved with the cloud, based architecture (Sanaei et al., 2014). Additionally the infrastructure of cloud must be managed as well as monitored appropriately in order to secure the data that is transferred over the web as well as on various types of sharing channels. Recommendation that must be included in SoftArc engineerings BCP The various types of recommendations that are provided for adopting the hybrid cloud within the SoftArc Engineering organization include: Backup Capability: Backup capability is one of the important features that are provided by the hybrid cloud architecture (Serrano, Gallardo Hernantes, 2015). It is identified that this feature this feature is not provided by the Web infrastructure as it not capable of providing appropriate storage capability whereas the cloud architecture are very much capable of storing appropriate data as well as information for future use. Application of residences: It is analyzed that the organization SoftArc is using web-based infrastructure, which is not capable of offering application resilience features. This appropriate feature assists in offering the condition where the entire system can perform properly even if the system detects erroneous condition during the execution time (Skoldstrom et al., 2014). For avoiding errors and for offering appropriate performance, hybrid cloud helps in offering proper operational excellence. Improvisation in network efficiency: The efficiency of the network architecture can be improved with the help of the cloud-based architecture. This is due to the fact that they mainly assists in imposing different types of features as well as characteristics within the network that further helps in making the network architecture much more suitable as well as available for various types of information as well as data. High scalability: The hybrid cloud architecture is considered scalable in context to different critical aspects as well as functionalities that are associated with the organizations network architecture. They are dependent on the system architecture as well as on the cloud based applications. Disaster Recovery: Disaster recovery is considered as one of the important option that helps in making the cloud infrastructure much more reliable in context to the compatibility of hybrid cloud (Sousa et al., 2015). The architecture of cloud is very much capable of offering the information that are stored long back with the help of a feature that is known as data redundancy. Discussion on important requirement of SoftArc The requirements for implementing hybrid cloud architecture include: Remote Server Administration: Remote server administration is defined as the procedure that helps in accessing various types of information from anywhere. This functionality helps in providing appropriate user capability for accessing various files as well as data that is generally stored within the server by logging appropriately within the sever. SLA management: It is identified that SLA or Service Level Agreement is considered as one of the important approach where the users have to agree while purchasing different types of solutions from various service providers. The service level agreement generally comprises of various roles as well as responsibilities of customers who are mainly involved in the utilization of cloud (Sultan, 2014). The commitments are mainly provided within the agreement by both the clients as well the customers. It is analyzed that this agreements generally helps in elaborating all the IT investments as well as other fundamental aspects. Resource Management: Resource management is considered as one of the significant fact that is associated with IaaS as well as PaaS implementation in an organization. The various types of requirements within cloud service implementation need flexibility, reliability as well as availability of important data as well as information within the network. In addition to this, the networks must be able to manage various types of functionalities that are generally associated within the infrastructure of cloud in order handle various operational excellence that are related with the network architecture (Tao et al., 2014). Therefore, it is very much important for SoftArc to manage their various data centers that can run properly within the server, which can be modified appropriately by implementation of one server for transforming important information directly to the cloud. Migration to SharePoint Instance to AWS Discussion on the steps that is included in the plan for moving the services Migrating measures plan: Migration is considered one of the complex procedures that needs proper as well as effective plan before it is transform to the current existing system architecture. SoftArc planning helps in transforming the network to AWS from SharePoint instance (Tomas Tordsson, 2013). Therefore, this needs effective as well as proper planning that requires to be implemented within the organization. Architectural plan creation: The architecture for migration must be designed properly therefore, that hybrid cloud infrastructure must be managed appropriately within the organization (Toosi, Calheiros Buyya, 2014). Additionally, plan customization is found to be another important aspect that requires to be managed appropriately in context o various functional context that is mainly involved with the organizations network architecture. System integration: Migration helps in combining both the network architecture that is very much helpful in managing various architectures of work (Fernando, Loke, Rahayu, 2013). Therefore, it is quite important for SoftArc to be very careful about the integration as well as behavior of the system that generally helps in resulting into effective as well as proper migration act within the SoftArc. Testing plan for migration: The plan is very much important for handling various deployment that are related with cloud infrastructure within the SoftArc Engineering company as the plan is related with various effective migration act within the organization. Discussion on the various critical points as well as issues with proper explanation There are numerous critical points, which must be discussed in context to various objectives of SoftArc Engineering. The critical points include: Plan development for migration: The plan that is needed for moving the SharePoint to AWS require efficient implementation that will help in deploying the development of hybrid cloud architecture. Up gradation of approaches use for migration: In order to deploy the migration system, it is very much significant to upgrade both structures as well as methods (Li et al., 2013). The problems that generally occur during the implementation of AWS within the organization can be solved by utilizing new structures as well as methods. Proper verification of migration procedure: It is very much significant to upgrade both the processes as well as plan of migration during the procedure of migration from AWS to SharePoint (Wei et al., 2014). This can cause loss of both data as well as information if the procedure of verification is not conducted in an appropriate manner with respect to various plans. Content Migration: It is identified that migration of content is considered one of the important aspect during the deployment of AWS within the SoftArc Company for achieving various goals as well as objectives. Conclusion It can be concluded from the entire assignment that moving web based architecture to cloud architecture is very much beneficial as well as advantageous for the SoftArc Engineering Company. Migration from Web based infrastructure to cloud based infrastructure helps SoftArc in replacing their system architecture. It is identified that cloud based architecture helps in enchancing data flexibility, autonomous data as well as data availability. The use of cloud-based architecture also helps the organization in gaining appropriate amount of competitive advantage. The decision that the SoftArc Engineering Company has taken not only helps in enhancing competitive advantage but also helps in increasing availability as well as flexibility of both data as well as information within the system architecture. It is identified that there are number of issues, which are related with the cloud-based infrastructure. The issues must be handled appropriately in order to mitigate or resolve them properly . The issues that are associated with cloud architecture include dependency of cloud as well as various security related issues. References Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Gai, K., Qiu, M., Tao, L., Zhu, Y. (2015). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G.Security and Communication Networks,10. Jain, R., Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey.IEEE Communications Magazine,51(11), 24-31. Khan, A. N., Kiah, M. M., Khan, S. U., Madani, S. A. (2013). Towards secure mobile cloud computing: A survey.Future Generation Computer Systems,29(5), 1278-1299. LD, D. B., Krishna, P. V. (2013). Honey bee behavior inspired load balancing of tasks in cloud computing environments.Applied Soft Computing,13(5), 2292-2303. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Lukyanchikov, O., Pluzhnik, E., Payain, S., Nikulchev, E. (2015). Using object-relational mapping to create the distributed databases in a hybrid cloud infrastructure.arXiv preprint arXiv:1501.00666. Maurer, M., Brandic, I., Sakellariou, R. (2013). Adaptive resource configuration for Cloud infrastructure management.Future Generation Computer Systems,29(2), 472-487. Menzel, M., Schnherr, M., Tai, S. (2013). (MC2) 2: criteria, requirements and a software prototype for Cloud infrastructure decisions.Software: Practice and experience,43(11), 1283-1297. Moreno-Vozmediano, R., Montero, R. S., Llorente, I. M. (2013). Key challenges in cloud computing: Enabling the future internet of services.IEEE Internet Computing,17(4), 18-25. Oliveira, T., Thomas, M., Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information Management, 51(5), 497-510. Pluzhnik, E., Nikulchev, E. (2014, June). Virtual laboratories in cloud infrastructure of educational institutions. InEmission Electronics (ICEE), 2014 2nd International Conference on(pp. 1-3). IEEE. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys Tutorials, 16(1), 369-392. Serrano, N., Gallardo, G., Hernantes, J. (2015). Infrastructure as a service and cloud technologies.IEEE Software,32(2), 30-36. Skldstrm, P., Sonkoly, B., Gulys, A., Nmeth, F., Kind, M., Westphal, F. J., ... Elek, J. (2014, September). Towards unified programmability of cloud and carrier infrastructure. InSoftware Defined Networks (EWSDN), 2014 Third European Workshop on(pp. 55-60). IEEE. Sousa, E., Lins, F., Tavares, E., Cunha, P., Maciel, P. (2015). A modeling approach for cloud infrastructure planning considering dependability and cost requirements.IEEE Transactions on Systems, Man, and Cybernetics: Systems,45(4), 549-558. Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management, 34(2), 177-184. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), 1435-1442. Toms, L., Tordsson, J. (2013, August). Improving cloud infrastructure utilization through overbooking. InProceedings of the 2013 ACM Cloud and Autonomic Computing conference(p. 5). ACM. Toosi, A. N., Calheiros, R. N., Buyya, R. (2014). Interconnected cloud computing environments: Challenges, taxonomy, and survey.ACM Computing Surveys (CSUR),47(1), 7. Toosi, A. N., Calheiros, R. N., Buyya, R. (2014). Interconnected cl Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.