Question:
Discuss About The Australian Regional Retailer Of Foodstuffs?
Webb’s Stores is an Australian regional retailer of foodstuffs. The main data centers of this retailer are in Melbourne and Sydney. The other regional data centers are in Brisbane, Wagga, Auckland, Port Macquarie and Bathurst. They have decided to take cloud computing in their business. The main problem that Webb’s Stores are facing is the operational complexity, application complexity and management of data (Almorsy, Grundy & Müller, 2016). They have thought of closing their data center in Auckland rather than replacing or updating the existing infrastructure. The services and the data are moved to the cloud. They are also planning to run a Risk and Security Workshop to assess the security threats, risks and the probable methods of control required for hybrid cloud.
The report outlines the brief description of the case study of Webb’s Stores. It covers the advantages of migration of data from MS SQL Server 2012 R2 database to IaaS instance in cloud. It also covers the risks that are associated for the migration of data and services with proper details (Garg, Versteeg & Buyya, 2013). The report further describes the utilization of cloud in backup and for the removal of records. The final part of the report gives a description about the procedure of protecting access to the services for moving to the cloud. Proper recommendations are also provided in the report.
Webb’s Stores are migrating their data and services from MS SQL Server 2012 R2 databases to an IaaS instance in the cloud. The type of cloud security policy that can be deployed for protecting the critical database after moving to an IaaS instance in a public cloud is the authorization and authentication (Hashizume et al., 2013). Cloud computing is the way of utilizing the network of several remote servers that is hosted to control, store and process data on the Internet. Authentication is the procedure to enable confidence in the identities of the users. The Security Assertion Markup Language or SAML is an open standard data format that are utilized for authentication in cloud computing. Authorization is the permission given to a sanctioned individual or organizational body to access any confidential data or service. Webb’s Stores is dealing with high security data and services. It is evident that the authority will not give permission to access their data and services. The security policy of authentication and authorization will provide them excess security and there will be extremely low chances of the data being hacked (Malawski et al., 2013). Moreover, cloud computing modules are extremely safe and secured and thus it can be claimed that if Webb’s Stores will migrate their MS SQL Server 2012 R2 database to an IaaS instance, they should undertake authentication and authorization security policy.
Webb’s Stores is taking authentication and authorization policy for the security of their data in the cloud. They will get several benefits if they will deploy this particular policy in their organization. The main advantages of this policy are as follows:
i) Scalability: This security policy provides excellent scalability to the database (Li et al., 2013). This will be extremely helpful to the company.
ii) Flexibility: Another main advantage of this security policy is that the entire system becomes flexible.
iii) Cost Effective: The third advantage of this security policy is that the maintenance cost becomes lower and thus can be claimed as cost effective.
iv) High Security: This is the most important benefit if this policy. The security level is extremely high, which makes it popular for all organization (Arora, Parashar & Transforming, 2013). The authentication and authorization policy allows only authorized users to access the data in authenticated servers.
However, in spite of the above-mentioned benefits, authentication and authorization policy undergoes several issues (Tao et al., 2014). The issues that Webb’s Stores can have after deploying this security policy are as follows:i) Complexity: The main issue that is faced after deploying this type of security is the complexity. The authentication and authorization sometimes become extremely complex after it is deployed.i) Brute Force Attacks: This is another dangerous issue that is faced when this type of security is deployed (Wei et al., 2014). Brute force attacks are extremely dangerous for any organizational databases. It opens the way for intruders and hackers and the data can be leaked.
iii) Storage: When password authentication is used, the usernames and passwords should be stored in a database for authentication purposes. Storing of these passwords are done in a particular database. The storage can be easily hacked and the passwords and the usernames can be easily stolen.
iv) Encryption: Encryption is mandatory for this type of security (Garg, Versteeg & Buyya, 2013). However, there is a high chance that symmetric or the asymmetric key would be lost and the user can be in problem.
Risks and threats are evident and common in case of data migration. Webb’s Stores is migrating their database to an IaaS instance in public cloud. Several risks can occur in case of database. The risks that applies to the database are as follows:
The risks applied to the Infrastructure as a Service database are as follows:
There are several risks in communications between the Webb’s Stores and the IaaS database. They are as follows:
Security: This is the most common risk while backing up of data is done. Data gets lost and can never be recovered once lost.
Control over Data: When data is backed up, the client of the cloud gets complete control over that data (Hashem et al., 2015). This sometimes turns out to be risky as the cloud provider gets complete access and control over that data. He might not be trusted person and data can be theft.
Webb’s Stores may face several risks while storing their data in the cloud storage. The risks related to this are as follows:
Security: This is again the most common risk in case of cloud storage. There is a high chance that the data would be lost and cannot be recovered (Wei et al., 2014). Moreover, there is a chance that the data can be theft or hacked.
Lack of standardization: Vendors do not follow a standard set of rules and protocols for business support. Therefore, Webb’s Stores should select their vendor carefully to avoid any type of storage risks.
Webb’s Stores might undergo several risks while retrieving their data from the cloud (Dinh et al., 2013). The risks applied to retrieval of data are as follows:
Data Leakage: There is a high chance that the data can be leaked while retrieval. This type of leakage is extremely common in case of public cloud.
Snooping: This is another most common risk in case of data snooping in cloud. The hacker or the intruder can snoop in or look into the data while retrieval of data is done.
Cloud disaster recovery or DR is the strategy for backup and recovery of data, which is used for maintaining and storing of the electronic records for a security measure (Li et al., 2013). Cloud backup plays a very significant role in cloud disaster recovery plan. When Webb’s Stores is migrating their data to the cloud database, the DR plan helps them to simplify the process. They do not have to migrate everything rather if they will only migrate their storage. The main advantage that Webb’s Stores will get is that after deploying cloud back up is that a copy of their data will be sent in a public network to an offsite server (Rahimi et al., 2014). A provider of third party, who charges, normally hosts this server to the customers.
The main advantage of backup and restore strategy is that the data can be easily backed up. It will be helpful to Webb’s Stores as there will be a scope for backing up of data. This will change the entire system of database of this organization. Another advantage of data backup and restore strategy is that the data can be easily recovered by this strategy (Sanaei et al., 2014). If there is a chance that the data can be lost during migration, this strategy will help Webb’s Stores to recover their data quickly and easily.
Webb’s Stores should be careful before providing access to the data and services. Only the authorized and sanctioned individuals would get the permission to access the services and data. There should be an authority only to look into the matter of authorization of access to the services.
The infrastructure of IaaS is an extremely delicate infrastructure that should be utilized by only authorized users. Two methods are recommended to Webb’s Stores for protecting access to IaaS infrastructure. They are as follows:
The access to the MS SQL Server 2012 R2 can be easily protected by adopting certain security measures. The recommended security measures of access for MS SQL Server 2012 R2 are as follows:
Webb’s Stores should be careful about the protection and control of access to the infrastructure of cloud network. The recommendations that would be helpful for the cloud network infrastructure are as follows:
Webb’s Stores should be careful about the control and protection of access to the cloud backup and restoration infrastructure (Rahimi et al., 2014). There are certain recommendations for this organization for backing up and restoring their data in the infrastructure. This particular infrastructure can be protected by few recommendations. They are as follows:
These recommendations would be helpful and useful to the Board of Webb’s Stores for their successful migration of data to the IaaS cloud and their backup and restore strategies.
Conclusion
Therefore, from the above discussion it can be concluded that Webb’s Stores is an Australian regional retailer of foodstuffs. The main data centers of this retailer are in Melbourne and Sydney. The other regional data centers are in Brisbane, Wagga, Auckland, Port Macquarie and Bathurst. They have decided to take cloud computing in their business. The main problem that Webb’s Stores are facing is the operational complexity, application complexity and management of data. They have thought of closing their data center in Auckland rather than replacing or updating the existing infrastructure. The services and the data are moved to the cloud. They are also planning to run a Risk and Security Workshop to assess the security threats, risks and the probable methods of control required for hybrid cloud. The above report gives a detailed discussion about the benefits and problems in migration of data to the IaaS instance in cloud. The report also provides the detailed research about the risks and challenges about the database, the infrastructure of IaaS and the communications between Webb’s and the IaaS database in the cloud. Webb’s Stores is also considering to utilize cloud for their backup and archival of records. The report also helps to understand the probable risks and issues associated with the backup, storage and retrieval of data from the cloud. This cloud backup will also affect in their disaster and recovery plans. This strategy would be helpful for Webb’s Stores. Moreover, relevant recommendations are provided for protecting the access to the MS SQL Server 2012 R2, infrastructures of IaaS, cloud network and cloud back and restore.
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future generation computer systems, 29(1), 84-106.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.
Malawski, M., Juve, G., Deelman, E., & Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds. Future Generation Computer Systems, 48, 1-18.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133-143.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), 1435-1442.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.
Xiao, Z., Song, W., & Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment. IEEE transactions on parallel and distributed systems, 24(6), 1107-1117.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download