New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now

ITECH 2201 Cloud Computing

Published : 13-Sep,2021  |  Views : 10

Question:

1) Describe which Cloud architectures you would employ to assist SoftArc Engineering meet the Board strategy a)Describe each of the architectures that you would use, along with your reasons for deploying it.
b)Describe the benefits and issues that would be the result of your deployment of these architectures. 
2)Describe the risks that you see associated with this new Hybrid Cloud strategy. You should name and describe each risk that you identify, and then describe a possible control for the risk. This may be presented in a tabular form.
3)Describe the general Information Security steps and controls that you would recommend to the Board to secure the Hybrid Cloud. You will need to explain to the Board your reasons for recommending these particular security steps.

4)Discuss briefly what you would recommend should be included in SoftArc Engineering BCP as a result of their adoption of a Hybrid Cloud approach. You will need to consider, as a minimum, the issues of application resilience, backup and disaster recovery in a Hybrid Cloud environment. This section should be no more than 2 pages. 
5)Discuss the requirements that SoftArc Engineering will need to consider in order to conduct remote server administration, resource management and SLA management for it proposed IaaS and PaaS instances.(it may be useful to consider Morad and operational checklists for this section). This section should be no more than two to three pages in length. 
6)The SoftArc Engineering board has decided, as an initial step, to move their SharePoint instance and their SQL Server 2012 Database servers to the AWS cloud in order to begin the migration process, and test their strategy.
a)Describe the steps that you would include in the plan to migrate these services. 
b)What are the critical points and issues that you see occurring at each of these steps Explain why you see these points or issues as critical. 

Answer:

This report discusses the benefits, issues, and risks of incorporating the cloud computing in SoftArc Engineering, an architectural firm. The incorporation of hybrid cloud technology offers a well organized malleability standard for enhancing the corporation’s business continutity procedures. Furthermore, signification reduction in cost and value can be achieved by the organization board through preservation of the information technology scheme by engaging the hybrid cloud technique. Furthermore, this analysis report also describes the impression of hybrid cloud method in the SoftArc’s BCP and their redemption possibilities of failures.

  1. Integration of Cloud Computing Model in SoftArc Engineering:

The productive malleability can be attained by the SoftArc organization through the integration of the hybrid cloud system with IaaS cloud representaion.

2.1. Intuitions in integrating IaaS Architecture:

There exists an efficient framework called IaaS cloud for the acquisition, management, and investigation of the architectures on workstations positioned at some other places and networking facilities i.e. firewalls. Cloud end users can apply IaaS hybrid model based on the application category for instance, electricity billing (Krishnan, 2010).

While moving or transitioning the firm’s services to some other category of cloud model PaaS and SaaS models, cloud end users making use of IaaS model are consistent to control executable application and Operating Softwares. The IaaS model propounds subsidiary solutions together with database execution, quality analysis, and appropriation of communciation streams. AWS (Amazon Web Services), Azure, Joyent, Cisco Metapod, and Google Compute engine are some instances of IaaS cloud business representations (Sotomayor, Keahey & Foster, 2006). A research was orchestrated by Microsoft Azure in the year 2013, and according to the research, the profit margins of the corporate, after intuiting the IaaS prototype are augmented from 15.6 billion dollars to 35.4 billion dollars.

2.2. Advantages and Issues after Integrating IaaS Hybrid Cloud Model:

Advantages:

  • IaaS is a kind of cloud foundation services. In IaaS cloud model, the organization allows the payment of services to be made only on the amount of usage. It results in a price effective solution for both the cloud service contributors and end users.
  • Some of the company confronts and pitfalls are solved by diminishing the extra responsiveness of functional disbursements.
  • The business continuity plan can be expanded for attaining significant-value and obtaining retrieval choices when achieving improved certainty and business plan execution.
  • A highly pacified cloud services can be achieved the end users.

Problems After Integration:

The magnified flexibility can be obtained after Iaas Hybrid cloud solution deployment but some restrictions are encountered. The IaaS cloud model results in the non-existence of security aspects since the end users have to use certain hardware components instead of various software layers, for appending subsidiary obscurity and problems.

  • The insignificance of departure and non-existence of reliability decreases the performance.
  • The security will be lured because the contribution of many administration remote servers in various perfection perspectives such as performance, evolution, and monitoring. To these evolution circumstances, detaching, preserving, and hitching every component is complicated due to the existence of calamities in primary cloud component that results in unlawful admittance for illegitimate acession through masked keys(Foster, 1999).
  1. Uncertainties and Resolutions:

Uncertainties

Resolutions for Certainties

Business users can undergo various security amenabilities

The security queries of the corporate can be answered without any effort by means of rigorous safety requirements in their certainty policies

The unreliability is concerned with architectures employing multiple users and the hardware administration acquired by workers of the corporate

The enhanced level of security can be attained by means of  privacy solutions, committed hardware and software services, and Security Level Agreements

Unreliability evaluation takes more time than complexity of other tasks

The corporate must reaffirm that the procedures through which the individuality is provided and employed does not craft any effects in information security and privacy internal to corporate’s cloud implementation

The changes in an individual software application can formulate  incorporation and amenable problems with other software, leading to the primary complexities associated with the critical software system

The corporate like SoftArc will choose an application like productivity applications such as Spreadsheets, Electronic Mail, word processor, etc.

The distinction between contemporary application and surviving task will become complex when the corporate is modified to employ hybrid cloud

By enhancing the loads of tasks according to the privacy requirements, loads of various tasks are conveyed to many controlling systems to check the amenability of the certain task loads with the safety policies when these tasks are executed external to the security system i.e. firewall

Table 1: Cloud Model Incorporation Uncertainties and Resolutions s

  1. Security Steps and Controls for securing Hybrid Cloud:

The analysis for the provocations of several security drawbacks for integrating proposed hybrid cloud strategy is not only because of the proposed solution, but also due to the existence of various unfavourable aspects like ineffective execution of network resources, security protocols with unskilled services, and improper administration of corporate. The main hindrances for proposed model are associated with ineffective safety agreements, absence of correct encoding techniques, Immatureness of uncertainty acquisition methods, Inefficient Information dismissal, inference on data detriment, and so on. (Sotomayor, 2009).

Some security resolutions and administrations are integrated in the corporate to elude the proposed security hazards given below:

  1. Suitable encoding techniques are not employed
  2. Scarcity of Uncertainty Identification Techniques
  3. Untrained security administration
  4. Improper Data Adjournment techniques
  5. Imperfections in validation methods
  6. Employment of individual API
  7. Unguarded IP
  8. Nonexistence of conveyance with cloud contributors
  9. Unavailability of accurately entitled Service Level Agreements (SLA)
  10. Data Displacement
  11. Venomous Staff
  12. Denial-of-Service dangers

Security steps for solving the precedent security threats were provided below:

  • Steps to manage suitable Encoding Methodologies:

  1. Make sure to avoid unguarded data conveyance by integrating cryptic protocols to ensure confirmation at communication endpoints.
  2. An unacknowledged private cloud should not be employed in the proposed implementation.
  • Security steps for insufficient acquisition of security pliability:

  1. Efficient strategy for avoiding failures should be offered subsequently.
  2. The software should be updated regularly and triggering of log is completed through security specialists.
  3. The sensitive corporate information can be secured by further implementing an effective resilient technique.
  • Security Steps for Ineffective Amiability:

  1. The end users should not permit dual clouds that are amiability with each other to function together.
  2. The proposed cloud strategy for the organization must pursue the corporate security policies when managing the sensitive data.
  • Security Steps for Improper Corporate Administration:

  • Transparency should be maintained in the data management section of incorporated proposed solution.
  • The on premise data storage is employed to store the confidential data alone.
  • Security Steps for Data Dismissal Issues:
  • The cloud service contributors used by the firm should use multiple information centres and the interaction between the contributors and users should be made easier.
  1. Application Mould ability and Negligence Recovery Method:

  • Mathew Lodge, VMWare’s vice president quoted that the hybrid cloud model endows improved extra advantages for business procedure and healing of system negligence. It also affords inexpensive negligence revitalization while boosting handiness and reliability at the same time in negligence procurement of data on extrinsic storage equipments and productivity applications.
  • Hence, preparing for negligence procurement on operating system for e.g RedHat Linux permits the end user to take a list of malfunctions instantly. Therefore, the end users should have to integrate a technique that matches with application downtime indulgence.
  • The cloud service contributor such as Microsoft Azure offers purely distinguished cloud networks. The offered cloud environment in turn provides services for assisting to achieve improved malleability and many negligence renewal inspections (Sotomayor, 2009). The Azure contains application flexibility and negligence renewal aspects incorporated in several cloud platforms. Thus, by integrating cloud contributors like Azure, an effective business continuity can be attained in the corporate.
  • Inter-dependent aspects such as improved malleability, negligence avoidance, and bestowment of reliability are employed in the complete BCP cloud strategy. The committed cloud platform should administer the entire negligence renewal, components evaluation, and corporate development.
  1. Remote Server Management Methods and Components Supervision:

The Software Legal Agreement system offer integrated APIs and is isolated conventional applications software or integrated into multiple cloud solutions.

The remote administration unit imparts construction corporate implementations for conducting operations on cloud-based mechanisms in IT.

The remote management unit can also design an entrance for assessing behaviours related to several cloud solutions including management of included mechanisms, administration of invoicing proces, and SLA managers (Rochwerger, 2008).

6.1. Management of Virtual Machine Instances from Remote Location using Google Cloud Suite

  1. In Google Developer main console window, click Create Projectoption for generating new instances group.
  2. Following to that click on Compute Enginefor constructing, supervising, and accomplishing virtual machines as depicted in the diagram shown below.
  3. Go for Instance Groupsin Compute Engineportion to direct virtual machine objects.

6.2. Dispension of office 365 tool:

Through office 365, the documents are confined, directed, and returned in cloud computing background.

The documents and billing methods are managed by reinstating files in office 365 as given in the shown below:

Tasks that are performed by the cloud users through remote management system include Quality of Service scrutiny, legal rapport, cost and bill administration, processing data defence techniques, user approval process, etc.

Virtualized system must be structured for multi-layer SharePoint server and active directory framework.
  1. Database tier is set up and established. The inauguration of AWS cloud based SQL server 2010 AMI is for letting SQL server elements alignment..
  2. Behind organizing database records, the application server layer is activated. The 3rdstep is to verify that the installation of the Sharepoint servers is done by integrating PowerShell scripts.
  3. After that the initiation and composition of web Front-end column is done.  The web Front-end servers are incorporated for offering balance of several task loads that are accessed to Sharepoint application after using Sharepoint AMI incorporated as explained in step 3.
  4. SharePoint group servers are executed. The supervision of application server instances is done after employing Sharepoint web based application and Configuration wizard of cloud products.
  5. AWS Issues on Migration:
    • IT privacy accordance issues will be prevailed (Snell, 2010).
    • Distributed system data renewal required for Microsoft SQL server will not be fortified upon AWS. The arbiter declaration is authorized by means of AWS and Azure.
    • “On Amicable sets permanently” technique is not durable by Microsoft SQL server of standard edition.
    • The Elastic Beanstalk amends components during specification leading to the uncertainties in Amazon Main Image.
    • Colossal time is consumed to line up the Sharepoint servers group through AWS.
  6. Conclusion:

The evacuation from a long-established information center to hybrid cloud strategy has many improved reimbursements. The performance can be improved by altering the conventional data architecture of SoftArc firm to hybrid IaaS cloud strategy.

  1. References:

 Foster, I. (1999). A Distributed Resource Management Architecture that Supports Advance Reservations and Co-Allocation. Proc. Int'l Workshop on Quality of Service, 3(2), 27-36.

Nurmi, D. (2008, January 8). The Eucalyptus Open-Source Cloud-Computing System. Retrieved from www.cca08.org/papers.php.

Krishan, K. (2010). Comparison of SaaS, PaaS, and IaaS in Cloud Computing. International Journal on Recent and Innovation Trends in Computing and Communication, 1(3), 161-163.

Rochwerger, B. (2008). The Reservoir Model and Architecture for Open Federated Cloud Computing. IBM Systems J, 4(3), 160-178.

Sotomayor, B., Keahey, K. & Foster, I. (2006). Overhead Matters: A Model for Virtual Resource Management, Proc. 1st Int'l Workshop on Virtualization Technology in Distributed Computing (VTDC 06), 5, 2006.

Sotomayor, B. (2009). Resource Leasing and the Art of Suspending Virtual Machines. Proc. 11th IEEE Int'l Conf. High-Performance Computing and Communications (HPCC 09), 12(4), 59-68.

Snell, Q. (2000). The Performance Impact of Advance Reservation Meta-Scheduling. Proc. Workshop Job Scheduling Strategies for Parallel Processing (IPDPS 00/ JSSPP 00), 137-153.

Get An Awesome Price Quote For Your Paper – Absolutely FREE!
    Add File
    Files Missing!

    Please upload all relevant files for quick & complete assistance.

    Our Amazing Features

    delivery

    No missing deadline risk

    No matter how close the deadline is, you will find quick solutions for your urgent assignments.

    work

    100% Plagiarism-free content

    All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.

    time

    500+ subject matter experts

    Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.

    subject

    Covers all subjects

    We offer academic help services for a wide array of subjects.

    price

    Pocket-friendly rate

    We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.

    Getting started with MyEssayAssignmentHelp is FREE

    15,000+ happy customers and counting!

    Rated 4.7/5 based on
    1491 reviews
    ;