Cloud computing has experienced significant and rapid growth in the past few years. The cloud computing term emerged to describe the change that happens when services and applications are migrated into the cloud (internet). Cloud computing is a great change from the customer server model to a model that offers location and faster independent services. There are various essential features of cloud computing. They include device independence, minimized cost, scalability, security, agility, location independence, reliability and resource sharing. However, the main function of cloud is to offer services. In the current world, cloud computing is becoming essential and is anticipated to have a large effect on how things are used and designed in the internet. An essential aspect of migrating everything into the cloud is ensuring that everything is secure and safe. The context will explore the cloud computing security aspects, non-functional requirements of cloud-based solutions, advantages and disadvantages of cloud-based solutions, andadvantages and disadvantages of adaptive and predictive methodologies.
There are various security threats and issues in the cloud and can be grouped depending on the area of the security that is under attack. They include:
Privacy: privacy makes sure that data, personal identity and information of a cloud service customer (CSC) must be hidden to unapproved users. The decryption and encryption keys are normally present with the customer and thus the cloud service provider (CSP) is unable to view information in the clear. CSC should be cautious when selecting a CSP. Insider threat is another privacy threat (Pandith, 2014). A CSP insider could access CSC’s personal details, if the stored information was decrypted, if the encryption keys was given to the CSP, or if information was kept in several locations.
Confidentiality: it is important that CSPs maintain all CSC data confidential from other users, as it migrates between the communication platforms. There must be server and client authentication, secure encrypted channels (end-to-end encryption) and no leakage of data.
Integrity: no information should be altered when it is moved to the cloud. Ensuring data integrity (storage, transfer and recovery) means that information is only modified in response to permitted executions.
Data protection: a cloud stores vast amount of information and data. Isolation of data amongst users is essential. Each CSC must have a unique memory regions and address space so that they do not access addresses or data that is not authorized (Dyer, 2012). The isolation is normally effected by allocating a dedicated virtual machine to each CSC.
Cloud computing has brought up managerial awareness to the imbalance of utilized versus installed computing capacity, in addition to the necessary costs of power, support personnel, space and software licenses. Managers will authorize initiatives of infrastructure ecology, beginning with pooling and consolidation of data and compute resources, and advancing to effectiveness of software execution.
The scaling, automation, and on-demand features of cloud computing minimize lead-time delivery for infrastructure services. The ability to enhance capability delivery permits firms to reduce time-to-value, acquire runaway demand, and manage steady-state expenses.
Cloud computing operating practices and technologies commoditize the support and delivery of familiar business software and technology infrastructure. Headspace will need to embrace technology management, strategies and architectural practices that separate business capability, business information and basic infrastructure.
The following are some of the major non-functional requirements that Headspace should consider when migrating to the cloud.
Functionality: it represents the main features of the product that are well-known in the business domain of the solution being created (Rimal, Jukan, Katsaros & Goeleven, 2010). Other functional requirements that Headspace may consider include licensing, mail, printing, security, workflow, auditing, localization, online help, reporting, or system management.
Usability: it includes examining, stating and capturing requirements based around issues of user interface, things such as consistency, accessibility and interface aesthetics within user interface (Shamsi, Khojaye & Qasmi, 2013).
Reliability: reliability involves things such as accuracy, availability, and recoverability. For instance recoverability or computations of the system from failure caused by shut down.
Performance: performance includes aspects such as response time of the system, start-up time, information throughput through the system, and recovery time.
Security: security includes such as the established security standards and levels. Physical security of networks and data centers of the cloud providers should also be considered. Besides, data residency should be taken into consideration.
Supportability: supportability involves requirements such as adaptability, compatibility, ability to install, localizability, testability, maintainability, configurability, scalability, among others.
The other + of the FURPS+ acronym is used to define constraints including implementation, physical, design, and interface constraints
Design constraints: a design constraint restrict designs, for instance, demanding a relational database particularize the method taken in developing the system.
Implementation constraints: it restricts construction or coding- platform, standards, or implementation language.
Interface constraints: it is a requirement to communicate with an external entity
Physical constraints: it affects the hardware utilized to host the system, for instance, size, shape and weight.
Without doubt, firms can gain many benefits from cloud computing. Nevertheless, cloud computing is also connected with some weaknesses. The following are some of strengths and weaknesses of cloud-based solutions
Cost Efficient: cloud computing is a cost-effective technique to maintain, utilize and improve. The traditional desktop program of Headspace costs them greatly. Combining the licensing charges for several users can prove to be costly for the development concerned. On the other hand, the cloud is available at a lower cost rates and this, can considerably reduce the IT costs of Headspace (Januzaj, Ajdari & Selimi, 2015). In addition, there exist several pay-as-you-go, one-time payment, among other scalable alternatives, which will be sensible for Headspace.
Adequate Storage: storing data in the cloud will give Headspace adequate storage capacity. Therefore, the company will not have to worry about expanding their existing storage space.
Recovery and backup: since all of Headspace data will be stored in the cloud. Restoring and backing it up will be easier than storing it on physical devices. Besides, many providers of cloud services are normally skilled enough to manage data recovery. Thus, it makes the whole process of recovery and backup simpler than the traditional data storage methods.
Integrating software automatically: in cloud, software integration happens automatically. As such, Headspace will be relieved the effort of integrating and customizing their programs according to their needs. Besides, cloud computing will permit the company to modify their alternatives with ease. Thus, they can just select those software applications and services that they think will best match their specific enterprise.
Easy Access to data: once Headspace has registered itself in the cloud, it can access data from any place as long as they are connected to the internet. Such a useful feature will allow the company to solve geographic location and time zone issues.
Quick Deployment: cloud computing will also give Headspace the advantage of quick deployment. Once they chose this technique of functioning, their whole system can be wholly functional in a few minutes depending on the type of technology needed by Headspace.
Despite of the many benefits mentioned above, cloud-based solutions is also associated with some drawbacks. Headspace should be aware of these disadvantages before adapting the technology. The following are some of the cons of cloud computing:
Technical Issues: although data and information can be accessed anywhere at any time, sometimes the system can experience some critical dysfunction. Even the most competent cloud service provider faces such kind of problems despite maintaining a high maintenance standards (Satish Kumar & Salimath, 2012). In addition, Headspace will need an efficient internet connection that is always logged onto the server. Otherwise, the company may be constantly stuck in case of connectivity and network problems.
Security in the Cloud: security issues is another key issue in the cloud. Before acquiring the technology, they should be aware that they will be surrendering all their confidential information to a third party cloud service provider. It could place the firm at huge risk (Bisong & M. Rahman, 2011). As such, Headspace need to be sure that their select the most dependable service provider, who will make sure that the data is safe.
Prone to attack: keeping data in the cloud could make Headspace open to external threats and attacks. In the internet, there is always the hidden possibility of secrecy of confidential information.
SDLC is the process that IT (Information Technology) industry use to develop, design and examine quality software. The aim of the SDLC methodology is to ensure high quality software is produced within the approximated timelines and cost. SDLC describes the tasks carried out in every phase of the software lifecycle, from the start to deployment (Lee, 2014). There are two different SDLC techniquea notably; the adaptive and predictive SDLC. Predictive approach is effected in software projects whose results are well known and specified. It outlines a definite, specific plan for software development that is designed within a particular timeline and around some pre-defined outcomes (Memmel & Obendorf, 2010). Adaptive methodology, on the other hand, is effected when the current software entails unspecified or unknown results. It entails spliting the software project into different elements over undecided timeline to allow for extensibility in directing the course and the path of the project (Beyer, 2010).. The following are some of the advantages and disadvantages of predictive and adaptive SDLC to process of software development that Headspace should consider.
The recommended approach to use during the development of the Headspace project is adaptive methodology. Since Headspace project will be used by different users, employing adaptive approach is the best way since extensive user engagement is applied in every stage of development (Nicolaysen, Sassoon, Line & Jaatun, 2010). Achievements of user requirements is a vital aspect of the Headspace project, and it can only be completed by employing adaptive approach since those requirements are gathered constantly from the beginning to the end of every element and therefore guaranteeing contentment of all the requirements in the end product (Andrzej Kisielnicki & Maria Misiak, 2016). Headspace project involves different components and it is object-oriented in nature, as such, predictive SDLC cannot be used in the project. Since the project of Headspace is complex, the best approach to apply in the development and design would be adaptive methodology.
Conclusion:
The application of cloud computing utility has grown substantially in the past few years and it seems to be a natural evolvement of the data center to conduct storage and computing in a more extensible way. With such a substantial growth, the market is advancing rapidly and more firms are offering new services with improved features. It is now clear that in the near future, cloud computing will be broadly employed in healthcare areas. Diagnosed images are essential record, as such, storage repository requires redundancy to be a dependable system. Cloud providers provide backup system and data security without extra charges for clients. Headspace can minimize expenses of local storage maintenance by using cloud-based solutions.
References:
Andrzej Kisielnicki, J., & Maria Misiak, A. (2016). Effectiveness of Agile Implementation Methods in Business Intelligence Projects from an End-user Perspective. Informing Science: The International Journal Of An Emerging Transdiscipline, 19, 161-172. doi: 10.28945/3515
Beyer, H. (2010). User-Centered Agile Methods. Synthesis Lectures On Human-Centered Informatics, 3(1), 1-71. doi: 10.2200/s00286ed1v01y201002hci010
Bisong, A., & M. Rahman, S. (2011). An Overview Of The Security Concerns In Enterprise Cloud Computing. International Journal Of Network Security & Its Applications, 3(1), 30-45. doi: 10.5121/ijnsa.2011.3103
Dyer, J. (2012). Cloud concerns: the safe route to adoption. Computer Fraud & Security, 2012(10), 16-19. doi: 10.1016/s1361-3723(12)70104-5
Januzaj, Y., Ajdari, J., & Selimi, B. (2015). DBMS as a Cloud service: Advantages and Disadvantages. Procedia – Social And Behavioral Sciences, 195, 1851-1859. doi: 10.1016/j.sbspro.2015.06.412
Lee, M. (2014). Software Quality Factors and Software Quality Metrics to Enhance Software Quality Assurance. British Journal Of Applied Science & Technology, 4(21), 3069-3095. doi: 10.9734/bjast/2014/10548
Marques, A., Nogueira, T., & Queiros, C. (2011). P03-272 – Developing a methodology for measuring readiness in mental illness recovery. European Psychiatry, 26, 1441. doi: 10.1016/s0924-9338(11)73146-7
McHugh, M., McCaffery, F., & Casey, V. (2013). Adopting agile practices when developing software for use in the medical domain. Journal Of Software: Evolution And Process, 26(5), 504-512. doi: 10.1002/smr.1608
Memmel, T., & Obendorf, H. (2010). Agile + Usability. Agile Methoden, Usability Engineering, User Experience, User-Centered Design. I-Com, 9(1). doi: 10.1524/icom.2010.0008
Nicolaysen, T., Sassoon, R., Line, M., & Jaatun, M. (2010). Agile Software Development. International Journal Of Secure Software Engineering, 1(3), 71-85. doi: 10.4018/jsse.2010070105
Pandith, M. (2014). Data Security and Privacy Concerns in Cloud Computing. Internet Of Things And Cloud Computing, 2(2), 6. doi: 10.11648/j.iotcc.20140202.11
Rimal, B., Jukan, A., Katsaros, D., & Goeleven, Y. (2010). Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach. Journal Of Grid Computing, 9(1), 3-26. doi: 10.1007/s10723-010-9171-y
Satish Kumar, S., & Salimath, N. (2012). A Review on Mobile Cloud Computing with its Advantages. International Journal Of Scientific Research, 2(12), 101-102. doi: 10.15373/22778179/dec2013/33
Shamsi, J., Khojaye, M., & Qasmi, M. (2013). Data-Intensive Cloud Computing: Requirements, Expectations, Challenges, and Solutions. Journal Of Grid Computing, 11(2), 281-310. doi: 10.1007/s10723-013-9255-6
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download