Wednesday, May 6, 2020
Delivery Models in Cloud Computing
Question: Discuss about the various delivery models that are used in cloud computing and their assessment for the implementation of cloud service in Department of spatial information. Answer: Introduction The author has presented the report about cloud based solution and explained different aspects of cloud computing with respect to DSI (Department of spatial information). The deployment has been recommended to Department of spatial and it has been selected by the DSI and further information and assessment are required for SLA technical and management aspects. The main aspect of the report is to discuss in detail about Department of spatial information for OSDS (Online spatial delivery system) with respect to deployment model and security as well as risk management. The report also discuss about the data backup plan, disaster recovery, Service level agreement management and remote administration. 1. Management and Remote Administration 1.1. Remote Administration Requirement The use of virtualization technology in cloud infrastructure adds security concern to the cloud service. The Department of Spatial Information workstation can be hacked using virtual software and the datacenter of DSI (Department of spatial information) can be turned off or modified. Acquiringandstoringalargequantityof data requires data administration and distributed networking. The large amount of data is easy to locate and they can be retrieved using HTTP connection. The data that is sent over the network is encrypted and is send through the transport layer of OSI model (Chen Zhao, 2012). HTTPS is the secure version of HTTP and was previously used in sensitive websites like payment gateway service, emails etc. But now due to the security option it is used all over the web for increasing the privacy of the webpage of DSI (Department of Spatial Information). The data before storing to the cloud servers can be encrypted, that can be stored in segments to provide data isolation which means the data stored in the cloud servers cannot be accessed by other users. The data may not be in the same geographical location so the service provider must be binded with a contract to maintain data privacy and the laws of the country in which the data resides should be known to the Department of spatial information. (Gellman, 2012). 1.2. Resource Management: The resource management affects three basic criteria in cloud computing such as cost, performance and functionality. Resource management is required for any man made system, and if the resource management is inefficient it would have a negative impact on the cost and the performance of the system and the functionality can also be affected indirectly with respect to Department of spatial information (Beloglazov Buyya, 2013). A cloud computing infrastructure has a huge number of shared resources and it is the most complex system. Managing the resources of the cloud computing is a difficult task it can only be managed by complex decision making and policies for multiple objective optimization (Manvi Shyam, 2014). It is difficult because the complexity can never be measured as it is located globally over the network. To increase the revenue margin, improving billable usage, enhance clients satisfaction and retain the talented individuals and good resource management which is a primary aspect of Department of spatial information executives for those who are looking to improve the above points. The goal of DSI (Department of spatial information) is that the cloud computing is minimizing the cost of service and energy consumption (Beloglazov et al., 2012). The load balancing acts here differently, instead of distributing the data equally over the servers they are stored in a minimum number of servers possible which keeps the other servers in standby mode (Grozev Buyya, 2016). 1.3. SLA Management An effective SLA should meet some effective criteria of DSI. All the details regarding the data availability, data security, and performance, geographical location of data and recovery of data should be clearly mentioned in the SLA document and has to be reviewed well by Department of Spatial Information (Wu et al., 2012). A highly reliable cloud service is possible but the cost of maintaining is much higher than normal cloud service, so both this things should be mentioned to the customer. The customer may choose highly reliable cloud service on extra payment but the service should be made available to them. The security details and the actions taken by the service provider in case of failure should also be mentioned in the Service Level Agreement. 2. Backup and DR (Disaster Recovery) Data in the cloud can be in encrypted format to increase the security, corrupted encrypted data cannot be recovered and it is important for the user to know that how the service provider gives backup in case of disaster and data loss (Azarnik et al., 2013). Cloud computing is a new emerging technology and is the best in low risk for the medium level business organization. Application Resilience It refers to the ability of the server and network, entire data center and storage system. The Department of Spatial Information can also operate it when there is any kind of equipment failure or there is any power failure or any kind of other interruption. The immunity of software towards any disaster environment or any internal error is defined as the application resilience. It can backup or recover the data very quickly. Some immune factors are added in the software to help it fight in the disaster scenario or any error in the system to make sure that there is a minimum loss f data in case of such failure. Application resilience is the prevention of the loss of data stored in the cloud servers and software must be checked accordingly before using it as a service. In the DSI (Department of spatial information) based organization all the systems share the same cloud server and thus there is a risk of data loss in case of any system failure, or there may be a risk of hacking or breach in the system that can damage the files (Hsu eta l., 2014). Thus the software used in the cloud computing must have application resilience. DSI (Department of Spatial Information) should mention the vendor to include the proposal the resiliency and should connect it with the disaster recovery plan to recovery the data as quickly as possible. Back Up In case of any internal or external error in the system there may be a huge data loss and the cloud vendor or Department of Spatial Information using the service may face a huge loss. Thus in orders to minimize the loss the data are backed up in different cloud servers at different location (Dinh et al., 2013). In the traditional system the data were backed up in physical storage device in the same location, but in the cloud computing data is stored in different location to manage all the kind of disaster. For backing up the data RAID Six is used. If we compare disaster recovery with back up tool then it is been clearly observed that the retention time period of backup data is better than disaster recovery. The service provider will provide extra two disks for providing a better service to Department of spatial information. Disaster Recovery In case of any disaster the ability of a system to retrieve the files and documents that are lost from the system is called the disaster recovery in cloud computing. If an employee accidentally deletes a file, or the server fails physically or intruder damages the files there is a requirement of disaster recovery plan (Ackermann et al., 2012). The disaster recovery plan is used to recover the data from the data backups that are located at different geographical location. The cloud vendors should be checked for its service of data recovery before signing in with that company. The department of Spatial information needs to observed and considered the below steps to get back the research data with respect to any disaster occurs. Evaluating and collecting the needs of the data protection DSI (Department of spatial information) needs to be collected in this stage and the information that is been gather has a critical role in protecting the cloud data. The data protect is critical for any organization. Cost Estimation Department of spatial information (DSI) needs to pay their service provider on monthly or yearly based subscription or can be based on bandwidth or storage space. Right Service provider The Department of spatial information needs to select the correct service provider which is always done with respect to this report. Management plan for building bandwidth To manage the bandwidth OSDS requirement needs to be considered. Considering the Logistic requirements DSI (Department of spatial information) needs to address different logistic needs to perform such as active directory synchronization and directory services that are cloud based. 3. SLA Assessment: Service level agreement or SLA acts as an agreement between the customer and the cloud service provider. The SLA document has different terms and conditions that should be fulfilled by the company, the architecture of the cloud computing system is shown in the Sla document to make its user understand about the resources. Evaluation of business policy of SLA: The cloud vendors fulfill the demand of the Department of spatial information with the use of SLA documentation. The cloud vendors using infrastructure as a structure guarantees that the data would be available 99% all the time (Baron Kotecha, 2013). Using the IaaS platform multiple cloud servers can work at a time. VPN can also be used to virtualizes the management system and manage the cloud servers remotely from any geographical location. There is a great flexibility of the cloud server that is the storage space of the cloud servers can be increased on demand by the DSI but Department of spatial information using traditional backup system has to install new hardware in order to increase its storage capacity (Mamaghani, 2014). This consideration should be analyzed by an Department of spatial information. Guarantees of SLA: A set of tools are implemented in the cloud computing to manage the IT resources. The tools are used to manage the interconnected resources of the cloud servers efficiently. SLA guarantees the data availability and the up time of the server, i.e. data would be available all the time to its customers. The cloud service providers also guarantee data backups and disaster recovery plans for the data that are stored in the cloud servers. Services of SLA: The computers used in the Department of spatial information are all linked with the cloud servers and can be managed virtually over the network. A dual band connection is required for a good backbone, minimum lag in service (Moreno-Vozmediano et al., 2013). If some computer is down and the link is busy the remote administrator can reach to the computer using another link and manage the situation. Governance and versioning of SLA: IT infrastructure Library provides a set of guidelines for the SLA document. It was developed in the end of the 20th century by CCTA. This guideline includes standardizations and various norms of information technology which the cloud service provider must follow before implementing a new service to its system (Adhikari et al., 2012). This guideline is used to guide Department of spatial information about the new technologies used n the service and to make their existing resources work more efficiently. Support: The security option and the encryption of data should be covered under the service level agreement. Secure Shell SSH uses an encryption method that allows its user to access data remotely and more securely. SSH has evolved from telnet with the encryption feature added to increase the security (Zissis Lekkas, 2012). The HTTP connection is less secure and can be breached by hackers very easily, to increase the security HTTPS and SSH protocols are used. 4. Conclusion: This report discusses about the various delivery models that are used in cloud computing and their assessment for the implementation of cloud service in Department of spatial information. The cloud uses infrastructure as a service model, platform as a service model and software as a service model and they are interlinked with each other. The cloud service provider is chosen by Department of spatial information according to the different service models. IaaS platform is the best platform used by AWS and provides a huge range of flexibility to its users to mix and match the models according to their requirement. There are various risk and management techniques for the adoption of cloud service for DSI (Department of spatial information). The SLA management plays an important role that helps in managing the cloud service. The security issues can be solved by using encryption techniques in the cloud servers. 5. Reference: Ackermann, T., Widjaja, T., Benlian, A., Buxmann, P. (2012). Perceived IT security risks of cloud computing: conceptualization and scale development. Adhikari, V. K., Guo, Y., Hao, F., Varvello, M., Hilt, V., Steiner, M., Zhang, Z. L. (2012, March). Unreeling netflix: Understanding and improving multi-cdn movie delivery. InINFOCOM, 2012 Proceedings IEEE(pp. 1620-1628). IEEE. Azarnik, A., Shayan, J., Alizadeh, M., Karamizadeh, S. (2013). Associated risks of cloud computing for SMEs.Open International Journal of Informatics,1(1). Baron, J., Kotecha, S. (2013). Storage options in the aws cloud.Amazon Web Services, Washington DC, Tech. Rep. Beloglazov, A., Buyya, R. (2013).U.S. Patent Application No. 13/955,956. Beloglazov, A., Abawajy, J., Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing.Future generation computer systems,28(5), 755-768. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Gellman, R. (2012, August). Privacy in the clouds: risks to privacy and confidentiality from cloud computing. InProceedings of the World privacy forum,. Grozev, N., Buyya, R. (2016). Regulations and latency-aware load distribution of web applications in Multi-Clouds.The Journal of Supercomputing, 1-20. Hsu, P. F., Ray, S., Li-Hsieh, Y. Y. (2014). Examining cloud computing adoption intention, pricing mechanism, and deployment model.International Journal of Information Management,34(4), 474-488. Mamaghani, F. (2014). AN ANALYSIS OF COSTS, BENEFITS AND RISKS OF CLOUD COMPUTING.Journal of International Management Studies,14(3). Manvi, S. S., Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey.Journal of Network and Computer Applications,41, 424-440. Moreno-Vozmediano, R., Montero, R. S., Llorente, I. M. (2013). Key challenges in cloud computing: Enabling the future internet of services.Internet Computing, IEEE,17(4), 18-25. Wu, L., Garg, S. K., Buyya, R. (2012). SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments.Journal of Computer and System Sciences,78(5), 1280-1299. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer s.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.