Question:
Discuss about the Cloud Based Solution For Health Management System.
The National Youth Mental Health Foundation intends to adopt a cloud-based solution for deploying their main health management system: “My healthy record system”. Cloud computing refers to the delivery of computing resources ‘as-a-service’, instead of the convectional deliver – as-a-product. Adoption of a cloud based solution may involve developing the system and deploying it on the servers of a cloud services provider – instead of investing in the hardware required to run the application. Alternatively, the company may adopt an already existing system that is provided through cloud access. In both cases, issues of data security, data ownership, system security and risks have to be investigated to ascertain the feasibility and viability of the move. For this project, the company intends to adopt a cloud based solution, which is an off-the-shelf solution that is cloud based.
This paper presents an analysis of cloud computing in relation to “My healthy record system” project. The paper outlines the Non-Functional Requirements of the system, a review of cloud based solutions such as the advantages, disadvantages and security risks associated with the cloud, as well as legislative constraints that the project may encounter. The paper then presents an analysis of the SDLC approach to be used, focusing on either using a Predictive or Adaptive methodology.
Non-functional requirements refer to measures that can be used in judging the operations of a system. These can be thought of as software quality attributes and are summarized as FURPS (Valacich, George and Hoffer, 2015). FURPS non-functional requirements include; Usability, Reliability, Performance and Security.
The main usability aspect of the system is the user interface, since non-technical customers will be accessing the system. The system therefore requires an easy to use user interface. The system requires simple and straightforward user interfaces, so that even a novice computer user can easily use the system.
Reliability is a measure of the systems ability to consistently perform functions as its designer intended (Valacich, George and Hoffer, 2015). For this project, the realiability aspect will relate to the ability to manage patients, schedule appointments, and other functions of the system.
With regards to performance, the requirement is that the system should have optimal perfomance and should have the ability to accomplish tasks efficiently and consistently (Valacich, George and Hoffer, 2015). For a cloud based solution, end users must be able to access the system, and perform tasks without any unnecessay delays and errors.
Finally, the security aspect of the system will require that the system be secured to prevent possible data breaches through hacking. The solution should provide means of securing data in transit, through the implemetation of security measures such as data encryption. A second aspect of system security is the protection of stored credentials. The credentials need to be protected to prevent malicious access resulting from unauthorized disclosure.
Comparison of functional and non-functional requirements
Whereas the functional requirements of the system require that the system handle user login, the non-functional requirement requires that proper user authentication be done, to prevent malicious access. This includes preventing access to the system by users who may not have changed their passwords for a long time.
Secondly, the functional requirements require that the system provide functions to add patients and update patient details. For this, the non-functional requirement is that the system provides adequate security to the patient’s details. This includes securing access to the information when it is being transmitted over the internet, and when stored in a cloud database.
With cloud computing, sensitive health record data will be stored on a third party system. Although cloud computing brings numerous advantages such as access to superior computing power, scalability, cost saving and accessibility, the technology introduces a myriad of privacy and security risks that have to be analyzed and understood before adopting the technology (Krutz and Vines, 2013)..
Advantages of cloud computing
Disadvantages
A number of disadvantages exist relating to cloud computing adoption. Cloud computing inherits the traditional information systems risks. Additionally, cloud services are accessible through the internet, and the multi-tenancy nature of the cloud makes it particularly susceptible to attacks (Krutz and Vines, 2013). Some of the disadvantages include;
Downtime: outages can happen even on the most sophisticated platform. An outage of services would be very detrimental to the organization as this would completely halt the operations of the health services provider. For example in the year 2013, DropBox had a system outage that lasted for almost two days (Talbot, 2013). The fact that access to cloud computing is through the internet means that, if internet access to the facility is interrupted, then access to the services will also be interrupted
Security and privacy: one of the major concern with cloud computing is the issue of security and privacy of data. This is a major consideration for this project since the organization’s data contains sensitive personal and health data. Adopting a cloud based solution will mean outsourcing even the handling of this sensitive data. An attack on the cloud platform would result in access to the sensitive information. This has happened before on a cloud platform, the Code Space incidence resulted in a data breach and deletion of the data when their Amazon web service AWS EC2 console was hacked (Krutz and Vines, 2013). Such an incidence would be very damaging to the health services provider.Limited control and flexibility: By adoption a cloud based solution, the organization will have limited control over the infrastructure hosting the solution, such as the execution and computing functions.
Data protection in the cloud is the main issue facing cloud adoption today. The capability of cloud service providers to provide adequate data security is one of the key considerations when selecting a cloud service provider. Whereas the convectional data protection models focuses on network-centric and perimeter security, by use of network devices and technologies such as intrusion detection system and firewalls, this approach is not sufficient to provide security against today’s sophisticated attacks such as use of APTs and privileged users.
SDLC Approach
This project can either be approached using the Predictive or Adaptive SDLC. The Predictive SDLC Approach is best suited for a project where the requirements are well known and the steps can be predicted. The phases of the methodology are sequentially planned and executed with minimal overlaps. On the other hand, an Adaptive methodology is suited for a situation where the requirements are likely to change and the development process cannot be adequately predicted. Adaptive methodologies are highly flexible, iterative and interactive techniques of establishing project requirements. The approach embraces unpredictable changes to a project.
Predictive approaches such as the Waterfall Model has the advantage of;
Disadvantages
Adaptive SDLC methodologies are characterized by their adaptive nature. This approach facilitates optimization of the design of the intended solution by encouraging changes throughout the project (Moran, 2015).
Disadvantages
For this project, although the requirements are known and the steps can to some extent be predicted, the most viable approach would be the use of an adaptive SDLC. The approach will bring all the stakeholders together and will allow for changes to the requirements over the life of the project. This will help refine the system and improve the functionalities.
References
Asghar, A. R., Bhatti, S. N., Tabassum, A., Sultan, Z., & Abbas, R. 2016. Role of Requirements Elicitation & Prioritization to Optimize Quality in Scrum Agile Development. work, 7(12).
Brodkin, J., 2008. Gartner: Seven cloud-computing security risks. Infoworld, 2008, pp.1-3.
Carlin, S. and Curran, K., 2011. Cloud computing security.
Highsmith, J., 2013. Adaptive software development: a collaborative approach to managing complex systems. Addison-Wesley.
Kniberg, H. 2015. Scrum and XP from the Trenches. Lulu. com..
Moran, A. 2015. Agile project management. In Managing Agile(pp. 71-101). Springer International Publishing.
Krutz, R.L. and Vines, R.D., 2013. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.
Talbot, C., 2013. Dropbox Outage Represents First Major Cloud Outage of 2013. Talkin’Cloud.
Rumpe, B. and Schröder, A., 2014. Quantitative survey on extreme programming projects. arXiv preprint arXiv:1409.6599.
Valacich, J.S., George, J.F. and Hoffer, J.A., 2015. Essentials of systems analysis and design. Pearson Education.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download