Based on the many benefits that would be provided by the cloud platform, it would be highly recommended to the project manager in order to implement the cloud infrastructure within the bank services (Avram, 2014).
Private Cloud: In this kind of cloud based infrastructure, the cloud infrastructure would be hosted on the data center of the service provider. This would be helpful in offering extreme levels of security and control. As the components of this kind of infrastructure of the cloud would be entirely dedicated towards the business, hence they would be able to customize the process of computing, networking and storage (Goyal, 2014).
Public Cloud: In this cloud, the cloud based infrastructure has been shared by several businesses and they are especially possessed and are being operated by the provider of the cloud service. Hence, this kind of cloud service would offer fast provisioning of services. As users would be able to measure their resources in order to meet the demands, hence this kind of cloud service is an option of low-cost for the deployment of various applications (Wang et al., 2013).
Some of the security issues are-
Data loss-Data can be lost as a result of malicious attack or the crashing of the server.
Hijacking of service-In case, if the account is hijacked, the usernames and passwords of the users are stolen.
Malicious Insiders: The misconduct of workers of internal organization can cause security threat for the stored data (Hashizume et al., 2013).
Different types of control in the cloud security architecture:
Deterrent Control
Preventive Control
Detective Control
Corrective Control (Modi et al., 2013)
Different requirements to limit data security:
Control in access: Access of the system is permitted to the authorized users.
Firewall: Implementation of firewall helps to eliminate the unauthorized traffics in the network.
Encryption: The encryption implemented in accessing cloud secured the cloud data from the access of the unauthorized users.
Protection of the wireless network: The protection in the wireless network ensures the transmission of data from cloud to clients in a secured way.
Criteria for the selection of the cloud:
The selection of cloud in context of security issues-
Data governance and security
Degree of security needed in the organization
Service dependencies and vendor support
Reliability and disaster recovery
Migration Support
Main strategy for creating System Center Virtual Machine Manager for creating and managing private cloud:
A system center virtual machine manager provides self-service portals for using cloud. Admin users can login into system service virtual machine manager to use the private cloud through console. One of the system service virtual machine is App Controller which allows users to use virtual machine and service templates through it.
Features of Virtual Machine Manager and its role in private cloud:
Some of the features are-
Physical to virtual conversion
Resource management and optimization in centralized way.
Virtual Machine migration and rapid deployment
Windows Powershell
Takes advantage of SAN network
Provides centralized reporting and monitoring
Centralized library (Moreno et al., 2013)
‘The Efficiency Property’: It states that the virtual machine manager will run instructions directly in the CPU and not intervene where it is unnecessary (Beloglazov, 2013).
‘Equivalence Requirement Property’: The virtual machine manager has to run indistinguishably from the physical machine in the same situation. However, there should be difference in compilation time and availability of resources.
‘Resource Control Property’: Virtual Machine Manager needs to get full control over the resources and it should be maintained that no user can manipulate the data without the authorization of virtual machine manager (wook Baek, Srivastava & Van der Merwe, 2014).
General setting includes the following
‘Customer Experience Improvement Program Setting’
‘Database Connection’
‘Library Setting’
‘Placement Setting’
‘PRO Setting’
‘Remote Control’
‘Self-service administrative e-mail address’ (Westphal et al., 2014)
Assessment of the existing system is needed to be done in order to understand the requirements and hosting environments.
Assessment of the physical infrastructure needed for the implementation of private cloud.
Virtualization level is created using VMware (Guthrie, Lowe & Coleman, 2013).
Over infra layer virtualization tools are built
Integration of asset management and virtualization management is done.
Virtualization management tool is built over infra layer.
The building of service catalogs and ITFM are built.
Different aspects of multitenancy and expectations of clients:
Aspects:
Internal- Company considers its different departments as different tenants. This requires a logical isolations of different tenants while sharing the same physical infrastructure.
External- In case of environment of service provider, different companies is different tenants. Different tenants have different requirements (Espadas et al., 2013).
Expectations of client:
The dedicated cloud service (Varadarajan et al., 2015).
Security and isolation
Standard regulations and services
Service is manageable and scalable (Velkoski et al., 2013)
Cost efficient
References
Aceto, G., Botta, A., De Donato, W., & Pescapè, A. (2013). Cloud monitoring: A survey. Computer Networks, 57(9), 2093-2115.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Beloglazov, A. (2013). Energy-efficient management of virtual machines in data centers for cloud computing(Doctoral dissertation).
Espadas, J., Molina, A., Jiménez, G., Molina, M., Ramírez, R., & Concha, D. (2013). A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures. Future Generation Computer Systems, 29(1), 273-286.
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: A critical review. International Journal of Computer Network and Information Security, 6(3), 20.
Guthrie, F., Lowe, S., & Coleman, K. (2013). VMware vSphere design. John Wiley & Sons.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of internet services and applications, 4(1), 5.
Jamshidi, P., Ahmad, A., & Pahl, C. (2014, June). Autonomic resource provisioning for cloud-based software. In Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (pp. 95-104). ACM.
Kalem, S., Donko, D., & Boskovic, D. (2013, May). Agile methods for cloud computing. In Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on (pp. 1079-1083). IEEE.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The journal of supercomputing, 63(2), 561-592.
Moreno, I. S., Yang, R., Xu, J., & Wo, T. (2013, March). Improved energy-efficiency in cloud datacenters with interference-aware virtual machine placement. In Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on (pp. 1-8). IEEE.
Varadarajan, V., Zhang, Y., Ristenpart, T., & Swift, M. M. (2015, August). A Placement Vulnerability Study in Multi-Tenant Public Clouds. In USENIX Security Symposium (pp. 913-928).
Velkoski, G., Simjanoska, M., Ristov, S., & Gusev, M. (2013, July). CPU utilization in a multitenant cloud. In EUROCON, 2013 IEEE (pp. 242-249). IEEE.
Wang, C., Chow, S. S., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE transactions on computers, 62(2), 362-375.
Westphal, F., Axelsson, S., Neuhaus, C., & Polze, A. (2014). VMI-PL: A monitoring language for virtual platforms using virtual machine introspection. Digital Investigation, 11, S85-S94.
wook Baek, H., Srivastava, A., & Van der Merwe, J. (2014, March). Cloudvmi: Virtual machine introspection as a cloud service. In Cloud Engineering (IC2E), 2014 IEEE International Conference on (pp. 153-158). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download