The hybrid cloud falls under the category of cloud computing scenario that utilizes the blend of on-premises, the private cloud and the third-party services of public clouds (Botta et al., 2016). The “SoftArc Engineering Ltd” is a popular civil engineering firm working in Australia, Indonesia, Papua New Guinea and Timor-Leste.
They have needed an approach for designing and operating “hybrid-cloud methodology” where some portion of their data centre should be “on-premise”. Another part has to be within a “Cloud”.
The report is prepared to understand various aspects of cloud computing architectures, cloud computing delivery models and risk management strategies. Further the security and governance needs and business requirements to mitigate “cloud model” could be analyzed from the report.
Within the “cloud computing architectures” every applications has been served, managed and controlled by the cloud server. Its information has been replicated and stored carefully distantly as a cloud configuration part. A cloud system integrated efficiently could create about unlimited possibilities and efficiencies. Various cloud computing architectures are discussed hereafter.
Cloud computing architecture |
Description |
Reasons to deploy it |
Workload Distribution Architecture |
The IT resources are scaled horizontally through identical resources of IT and a load balancer. |
It reduces both the over-utilization of resource and the under-utilization relying on the sophisticated runtime logics and “load balancing algorithms”. |
Resource Pooling Architecture |
It is based over the usages of a single or more pools of resources. Here, identical resources of IT have been grouped. They are maintained by a framework automatically ensuring that they have been synchronized (Buyya, Vecchiola & Selvi, 2013). |
The cloud providers could create an immediate or infinite sense of the resources available by managing adjustments of resources at meta level (Toosi, Calheiros & Buyya, 2014). This would allow the customers of SoftArc to alter their service levels without subjecting to the restrictions of virtual or physical resources. |
It is based over a framework of scaling conditions already defined. Thus trigger the allocation of the resources of IT dynamically from the resource pools. |
It would allow SoftArc in scaling resources to changing application loads and enhances performances |
Benefits:
The operating system over the bare metallic server, also known as the “hypervisor”, utilizes efficiently defined protocols. This allows numerous guest virtual devices in running concurrently. This has been guiding communication between the containers and connected environment beyond. The central server systematically manages and runs the system (Wei et al., 2014). This is done through reviewing the client and traffic requests to ensure smooth running.
The virtualization methodology of the servers utilized by the hypervisors has been bypassing few physical limitations which the stand-alone servers could face. The virtualization permits the software in tricking a physical server in thinking that it has been a portion of multiple “server environment”.
As the quantity of services a hosted by the providers increase, the compute loads and higher traffic demands growing with it might be accommodated or anticipated (Tebaa & Hajji, 2014). However, the rising demands for storage spaces in exponential manner could not be ignored.
In order to sustain and secure data about client, the cloud computing architectures must need higher redundancy for the “Locally Hosted Systems”.
Risks |
Description |
Controls of the risks |
Lack of data redundancy |
The lack of redundancy across the data centers could become vital security risks. This happens as the redundant copies of information have not been distributed across the data centers. |
This could be controlled by SoftArc by the usage of numerous data centers from any hybrid cloud or any single providers or numerous providers of public clouds. |
Compliance |
To maintain and demonstrate compliance is difficult. Here SoftArc has to assure that the provider of private and public cloud has been in compliance. Further they should demonstrate that the coordination means between two clouds has been compliant (Chen et al., 2015). |
SoftArc require assuring that the card data has not been transferred to a low secured storage system in public cloud from any compliant database over a private cloud. |
Poorly constructed SLAs |
In many cases the private cloud of SoftArc could not live up to similar SLA or “service-level-agreement”. In such cases SoftArc should built SLAs on the basis of expectations of lesser of those two clouds. This might be their private cloud. |
Data is needed to be collected over the availability and performance of private clouds under the realistic workloads. Potential problems are to searches with integrating private and public clouds disrupting the service. |
Vendor liability and risk management |
It takes place as the vendors lose control over the disasters in service. In such cases the cloud vendors are unaware of their own data centers. They contract them with the third parties. Moreover, security breaches could occur in their data occurring in the cloud. |
These potential cases must be reviewed with cloud vendors before signing any agreement. The legal counsel should be contacted must as if there has been any query regarding legal liabilities (Gai et al., 2016). |
On-premise licenses and contract management |
As SoftArc shift its applications from the on-premises to cloud, optimal coordination might occur. This happens if they create the transitions as the software licenses on-premises gets expired. |
It has been important to review thoroughly the contacts and even having review of the local counsel to price and stipulate or for other conditions. |
The steps and controls |
Description |
Reason for recommendation |
Protecting data in the cloud |
The security worries among the IT associations moving workloads to hybrid cloud have been incorporating controlling access to the basic applications and the dread of information ruptures or loss. |
Sound security must be trailed by the provider of hybrid cloud for example, isolating clients first at the system level and after that utilizing multi-occupant advances to guarantee there is finished isolation at the capacity level could be considered. |
Ensuring business continuity |
Another huge worry for SoftArc could be the capacity of specialist provider to convey ceaseless administration all day and every day. Regardless of whether worried with information security or recovery practices, numerous IT officials are uneasy about turning their applications and information over to the providers (Rittinghouse & Ransome, 2016). This give the effect that downtime could have on worker efficiency, customer satisfaction fulfillment, and productivity. |
IT officials require affirmation that hybrid cloud administration has been architected for the high accessibility. Cloud service providers could even enhance SoftArc’s current program of disaster recovery. This could be done with the capacity to copy information crosswise over geologically dispersed servers, which diminishes odds of information loss. Their protocols might incorporate imitating information daily to offsite storages in discs while at the same time giving on-request online restoration. |
Meeting compliance requirements |
Confronted with heightening regulatory necessities, SoftArc might ordinarily worried with which sorts of security controls are set up in a hybrid cloud condition. SoftArc might hesitant to utilize the public cloud for client and other delicate information due to their security and administrative compliance concerns. |
To read the fine print has been indispensable to ensuring that correct security arrangements have been incorporated into hybrid cloud SLAs. It must also assure and that the supplier is working persistently to look after compliance. |
Maintaining control of the data |
When the corporate and client information has been at no longer in the future put away in an the onsite information center, IT directors of SoftArc need to realize that they would even now have control of the information. |
While diminishing the expenses of buying and dealing with the physical equipment and the environment of operating system, SoftArc could even still have complete control over the legitimate parts of their frameworks (Hwang, Dongarra & Fox, 2013). Furthermore, SoftArc should stay responsible for moving their information, applications, and the workloads once again from the cloud service providers to their data center onsite as they decide to update their strategy. |
Tests recommendations for hybrid applications:
They should undergo increased latency testing, invalid message testing, authorization testing, VM server failure testing, network failure testing and authentication testing.
Right solution for business:
SoftArc should identify the critical data to be placed on-premise. As SoftArc is sensitive about the information stored externally, a letter of assurance should be requested from the provider’s side (Leymann et al., 2014). They should tell their provider regarding the reason behind using the data. This would help to determine the best-fitted solution. SoftArc should make sure that their speed of internet has been enough to control the workloads within the cloud. Lastly, they should assure that their solution has been secure.
Ensuring that the model is connected to where the business and IT has been going:
Firstly the strategy imperatives and the business objects are to be identified. Then SoftArc must align with IT strategies and further state architecture for achieving that. They must develop application and the data inventory. Mapping of the processes of business to the applications should be done. The disposition of the applications must be identified. The criteria of deployment decision must be defined and applied to the retained applications. This includes consolidation, up-gradation and so on. Lastly, the deployment model is to be documented.
The “integrated pattern” has been the evolution of dual pattern leveraging the on premises and the management of cloud-provider. This is done by utilizing current APIs automating the transfer, collection and the consolidation of the data of management from both of these environments (Jula, Sundararajan & Othman, 2014).
“Address connectivity requirements”:
SoftArc must consider the requirements of every link between the elements spanning two or more services of clouds or on-premises system. They must also ensure that the network virtualization usage has been available.
“Prerequisites of resource administration”:
The s company could include the cloud manager named “OnCommand”. This would provide the core focal administration to each and every closure of SoftArc’s information fabric.
“Remote Server Administration Tools”:
The Windows 8 has been including the “Server Manager”. Because of thus, the suggestion given would be required. Also incorporation of the “Microsoft Management Console” snap-ins could be done (Jula, Sundararajan & Othman, 2014). Moreover, the “Windows PowerShell cmdlets” could be considered in this list.
“SLA Management”:
The development of the cloud environment results in numerous consequences. The more the basic changes has over the SLA benchmarks, customarily few of the IT bunches finish management over their resources (Leymann et al., 2014).
Step 1: The SharePoint on AWS is run.
Step 2: “Scaling” and “deploying” of “collaborated platform” done fast.
Step 3: The benefits that the AWS cloud has been putting must be considered profited.
Step 4: Imposition of the “scalability”, must be done. It must also take the “information integrity” in account. The “pricing” to run the current SharePoint workloads should also be taken into consideration.
Step 5: The AWS might give extension for using the present licenses from Microsoft.
Issue 1: “Constant Universal’s” registry key is set up.
Issue 2: The default gateway is not actualized, while using different specific NICSs. (Kalloniatis et al., 2014).
Issue 3: The checking of the bugs of the codes lying within the head is not been done.
Conclusion:
The blend of on-premises, the private cloud and the third-party services of public clouds has been done by coordination between the platforms. Hybrid cloud provides higher flexibility and options of data deployment. This happens due to the allowing of workloads to go through between the public and private clouds according to the changing costs and computing needs. With the solution of hybrid cloud, the mission critical data could be kept in premise. This done to secure and readily access the data as required. SoftArc could reluctantly store this type of data in any data centre. Along with the clients, SoftArc should define the private cloud environment for business applications. For instance they should apply to the area of compliance and security. The engineers of the providers could control the complete chain form the cloud platform to the application. These individuals must possess in-depth awareness of the business and business processes and work with SoftArc safely.
References:
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Buyya, R., Vecchiola, C., & Selvi, S. T. (2013). Mastering cloud computing: foundations and applications programming. Newnes.
Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies. Mobile Networks and Applications, 20(6), 704-712.
Choi, C., Choi, J., & Kim, P. (2014). Ontology-based access control model for security policy reasoning in cloud computing. The Journal of Supercomputing, 67(3), 711-722.
Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications, 59, 46-54.
Grewal, R. K., & Pateriya, P. K. (2013). A rule-based approach for effective resource provisioning in hybrid cloud environment. In New Paradigms in Internet Computing (pp. 41-57). Springer Berlin Heidelberg.
Hu, F., Hao, Q., & Bao, K. (2014). A survey on software-defined network and openflow: From concept to implementation. IEEE Communications Surveys & Tutorials, 16(4), 2181-2206.
Hwang, K., Dongarra, J., & Fox, G. C. (2013). Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann.
Jula, A., Sundararajan, E., & Othman, Z. (2014). Cloud computing service composition: A systematic literature review. Expert Systems with Applications, 41(8), 3809-3824.
Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards & Interfaces, 36(4), 759-775.
Leymann, C. F. F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud computing patterns. Springer, Wien. doi, 10, 978-3.
Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216.
Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., & Du, R. Y. (2013). Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterprise Information Systems, 7(3), 237-271.
Lu, P., Sun, Q., Wu, K., & Zhu, Z. (2015). Distributed online hybrid cloud management for profit-driven multimedia cloud computing. IEEE Transactions on Multimedia, 17(8), 1297-1308.
Pluzhnik, E., Nikulchev, E., & Payain, S. (2014, June). Optimal control of applications for hybrid cloud services. In Services (SERVICES), 2014 IEEE World Congress on (pp. 458-461). IEEE.
Ren, L., Zhang, L., Tao, F., Zhao, C., Chai, X., & Zhao, X. (2015). Cloud manufacturing: from concept to practice. Enterprise Information Systems, 9(2), 186-209.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Taleb, T., Corici, M., Parada, C., Jamakovic, A., Ruffino, S., Karagiannis, G., & Magedanz, T. (2015). EASE: EPC as a service to ease mobile core network deployment over cloud. IEEE Network, 29(2), 78-88.
Tebaa, M., & Hajji, S. E. (2014). Secure cloud computing through homomorphic encryption. arXiv preprint arXiv:1409.0829.
Toosi, A. N., Calheiros, R. N., & Buyya, R. (2014). Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Computing Surveys (CSUR), 47(1), 7.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Zhang, H., Jiang, G., Yoshihira, K., & Chen, H. (2014). Proactive workload management in hybrid cloud computing. IEEE Transactions on Network and Service Management, 11(1), 90-100.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download