Benefits of Hybrid Cloud
Regional Garden Co., Ltd. Company operates a large number of gardening companies. It has a very large display of gardening products and is open every year for public inspection. This includes public and regional landscape planners providing garden advice, design and consultancy services to Regional garden nursery sales plants and garden supplies. The regional garden board is considering this strategy to improve the company’s responsiveness and flexibility. The council also hopes to significantly reduce the expenses of maintaining its ICT framework by closing its existing data center. They understand that this requires the retraining of existing ICT personnel so that they can manage the new cloud-based infrastructure. The regional gardens contact you again and advise them on this strategy. It has been suggested to the Regional Gardens that this planned approach means that they ultimately need to easily design as well as operate a “hybrid cloud” approach where some of the data centers are “on-premise” and the other is the cloud. Regional Garden also plans to organize risk and safety seminars to assess the risks, safety issues and possible controls needed for this “hybrid cloud” approach. This study includes how this approach will affect its BCP and its backup as well as disaster recovery strategy.
Cloud architecture shows different components such as databases, software functions, and applications. Its purpose is to use the power of cloud resources to solve business problems. Defines cloud architecture companies as well as their relationships. The entire cloud architecture is designed to provide users with high bandwidth, allowing users to gain access to data and to applications without interruption (Cowan, 2011). On-demand responsive networks can move efficiently and quickly between servers and even between clouds, the most important being network security. The large number of cloud-based building blocks selected by Regional Garden Co., Ltd. has brought new possibilities to the cloud architecture and brought new challenges. Cloud architecture begins with sticking to the familiar concepts of local architecture. Cloud computing is public computing based on the Internet, basically sharing software, resources, and information used by the end users that are hosted on a virtual server. Few people call anything outside the company or user’s private firewall as the cloud (Lang & Schreiner, 2011). Personal computing has been developed in three different phases. The very first stage is where data and applications are stored on the local desktop. Next phase is the application resides on the desktop with local servers moreover utility software as well as the Internet to provide valuable information. From the day of the popular Internet usage, Network Architecture illustrates the Internet as a cloud so that the end can hide the user’s complexity – hence the name is called Cloud Computing resides in services as data centers with application or software server forms and redundant storage. Finally users can access them through a web browser in a laptop or handheld device. Google Apps, Salesforce and Facebook are examples of cloud computing, especially for younger generations, which are quite popular (Lang & Schreiner, 2011).
Impact on Regional Gardens Ltd’s Infrastructure
The SaaS model is widely used a cloud model. Regional Gardens needs to build its career development in several aspects. Therefore, for this situation, SaaS is best service modes based on the following important features: So as to increase the efficiency of the company for all the remote regions and overseas missions Regional Gardens must use SaaS which is one of suitable option for dealing with problems that may be encountered (Pathari & Sonar, 2012). This includes service management, security, and the integration of organizational operations, which seems to be smoother and easier than any other traditional approach. When migrating all data centers to one single host location (where all is controlled and centralized from a node), cost minimization can be handled very efficiently. All the tasks of processing software as well as related deployments are controlled by any third-party vendor (Wang & Hou, 2011).
Since the applications and data are locally managed and the third-party vendors have a high level of control, it is critical to train employees to migrate data from the Regional Garden data center to other data centers. Many security and Consistency of the data may be affected, resulting in data loss. In order to overcome shortcomings, SaaS is the main choice and makes operations easier and more flexible (Lin & Huang, 2016).
When Regional Garden Co., Ltd. adapts to SaaS, there are several advantages in making internal management easier to operate.
• Higher reliability as well as the availability
• Reduce management work
• Collaboration across large business areas
• Zero infrastructure
• Provide a high level of services
• Work anytime, anywhere
• Enduring customer relationships
• Data recovery and Backup
Although there are several advantages to applying Regional Gardens Ltd to the SaaS cloud service model, there is an obligation to restrict end users from considering changing their traditional infrastructure to a new service model (Gluchman, 2016).
• Access control loss
• Limited application
• Connection requirements
• Bit slowly as compared to client/server apps
• Additional training costs for employees to adapt to the new system
• Data security is always controlled by third-party vendors and is not 100% trustworthy
• Terminating the switch between supplier contracts and SaaS providers
• More dependent on the internet.
- It is very clear from these descriptions of PaaS platform that developers have many options.
- Initially, developing applications on the PaaS platform greatly reduce the time as well as resources needed to develop the cloud-based applications (Zúñiga-Prieto, González-Huerta, Insfran & Abrahão, 2016). By providing a higher level of service, developers can always take benefits of out-of-the-box functionality without having to spend time re-creating these services.
- Because the PaaS platform gives a higher level of programming framework and abstraction, it can accelerate the development of some cloud-based applications and migrate existing SaaS-based applications to the cloud (Abu Sharkh & Shami, 2017). However, these advantages are some costs for developers. Balanced costs and benefits indicate the use of the situation for the use of PaaS, when this is not a case.
- The first challenge for PaaS is a lookout platform. With the use of higher-level service and programming models, the dependence on these services and access methods depends on these services.
The hybrid cloud computing model is an integrated service model that comprehensively uses public as well as private clouds in order to perform several operations associated with regional garden organizations. Public clouds will be used for all the non-sensitive information and operations, and private service cloud models for sensitive operations related to internal operations (Pahl, Jamshidi & Weyns, 2017).
Risks, Safety Issues and Possible Controls
Fig 1: Hybrid cloud model
Image Source: realstorygroup.com
Hybrid cloud computing is highly complex Information Technology architecture that involves various combinations of private clouds, public clouds, and local IT. Complex IT staff is required to build and run an end-to-end infrastructure that must support continuous data transfer between all of these platforms and ensure continuous governance wherever data flows. Many IT departments do not have the necessary internal expertise, so managers need to determine if they want to hire, sign contracts or provide training for internal IT(Clarke, 2015) (Grützmacher, 2015).
Loss of control: When processing data, cloud providers must undergo full security control review. Once the cloud is deployed, companies lose the ability to manage their individual data sets. Regional Garden’s managers must know which security or safety levels are accessible in the cloud to secure them from accidents(Zhou, Wu & Hong, 2013). Flawless hybrid cloud computing management can only be achieved when all know what have to be done. Work should be defined strictly in accordance with management procedures and policies. Without these guidelines, the network may be affected. A holistic advancement should be taken in order to deal with the overall infrastructure (Singh, 2015).
Design of network issues: Any hybrid cloud computing model that seeks long-term success requires excellent network design. Your network needs to consider various factors such as network bandwidth, management between public and private clouds, the impact of network location, network requirements for each application, security requirements for different types of data, and many other factors. Different applications need to run in different parts of the cloud environment. Understanding the scalability requirements of each application will impact your network and infrastructure design (ZENG & WU, 2013). When it comes to the network, cloud administrators also need to consider the limitations of the public cloud, they need to develop strategies to solve this problem. However, services such as Azure and Cloud Hybrid Services now provide solutions that enable customers to securely broaden existing data centers without compromising security and response levels (Banerjee, Kundu & Dattagupta, 2013).
Advantages and Disadvantages of SaaS Cloud Service
Data Compliance: When it comes to compliance, hybrid clouds require more due diligence. Both public cloud providers and your private cloud must meet compliance parameters. As data moves back and forth, maintaining and demonstrating compliance is more difficult for mixed models.
Scalability: Incomplete security protocols from cloud providers can damage data that may be damaged, corrupted, or improperly accessed. This is particularly true in the job-driven BYOD environment (Philip & Bharadi, 2016). Not all staff members as well as insiders are reliable. Some insiders might be using customers or sensitive information to disturb corporate activities. This creates a lack of scalability issues for hybrid cloud and micro-services strategies.
Risk Description |
Likelihood |
Impact |
Priority |
Preventive Actions |
Contingency Plans |
Loss of control |
High |
High |
Very High |
· Maintain updated security firewall networks. · Differentiate security access level on both clouds |
· Backup is initiated. · Restrict private data with certified personnel’s |
Design of the network issues |
Medium |
High |
Medium |
· Bandwidth must be precise for the public cloud as well as for private cloud. · Independent servers need to be properly installed. |
· Can’t proceed to a higher level unless the proper infrastructure is determined |
Data Compliance |
High |
Very High |
High |
· Understand all regulatory compliance laws. · Configure furthermore maintain the security policy. |
· Proof of policy document is must be created as well as signed by parties |
Scalability |
Low |
Low |
Low |
Interdependency of the security tools should be minimized in order to decrease intrusion attacks and data redundancy(Pahl, 2015) · . |
· Considering essential conditions or situations that will surely scale for high growth |
It is understood that the security issue is the primary factor affecting the large-scale adoption of cloud computing. Although this might be true, more detailed definition is suitable: organizations focus on the security features of the public cloud-based computing, but do not care about private cloud security. This hybrid cloud computing (that is, a hybrid public and private hybrid) can cause security problems compared to processing its various components. From a realistic perspective, Hybrid Cloud’s most important security decision is to choose an instrument that will be used to manage the environment. By defining, a hybrid cloud has a communication interaction between public and private cloud infrastructure, so that the tool is flexible enough to manage both the environment and to implement its security needs(Bernstein, 2014). When Hybrid Cloud Complies with the Computing Management Tools it provides a management interface for various cloud providers, especially if Regional Park does not use the same public and private cloud providers. Its web-based management platform provides an intangible interface for various low-level APIs of various cloud providers, which is more user-friendly than combining it alone. Sharing an identity is especially one aspect of the considered hybrid cloud. Regional garden hybrids grow for the cloud of their corporate identity solutions, but they must check that the public cloud expansion will affect the security of the private cloud and the entire company. Compared with controlling implementation issues, this is more like a risk assessment issue (Szyjewski & Niemcewicz, 2016). Regional gardens will need to ensure that their mechanisms for providing and consuming identities do not reduce the security in their private clouds.
Familiar management tools and technologies: IT security teams must change their perspectives and focus on protecting workloads and cloud-based data, not just servers and networks. For example, cloud-based workloads that contain regulated data should use similar control and monitoring measures as the mission-critical servers that reside on the corporate network. Similarly, SDN policies should simulate policies related to firewall rules and network segmentation. It should be based on workload classification, location and access requirements, through the expansion of strategic management, supply and configuration management technology to complete.
Challenges of Hybrid Cloud Computing
Comprehensive visibility, monitoring, and reporting: The security team cannot manage incomprehensible content, which applies to all security activities related to physical, virtual, and hybrid cloud infrastructures (Sala-Zárate & Colombo-Mendoza, 2012). The security team also needs to cover the entire range of security monitoring and analysis tools to reduce risk, detect problems, and respond quickly to incidents.
Support cloud automation and coordination: Hybrid cloud security management must work closely with the DevOps process. This requires the ability to create security templates so that according to workload classification, compliance requirements or corporate governance automatically provide the correct security controls.
Advanced Security Controls: With the development of regional garden clouds, new types of security controls are evolving. For example, both cloud and SDDC technologies are based on network security that supports micro-segmentation and use software to create virtual network segments for communication between allocated assets. Micro-segmentation can be an important first step in avoiding cyber attacks in virtual networks (Vostokin, Artamonov & Tsarev, 2018).
Heterogeneous Technical Support: Regional gardens increasingly follow a data center strategy that integrates open source, on-premises private cloud and SDDC technologies, and public cloud infrastructure. Therefore, cloud security tools must integrate with leading cloud and SDDC technologies, and use common command and control management and report to provide enterprises with appropriate security oversight (Ajoudanian & Ahmadi, 2012).
After careful caution, IT officials should decide to take public and private cloud services and best cloud service providers to make the best mix of their unique IT and business objectives. The deeper study of Hybrid Cloud Solutions will remove the general misconceptions related to hybrid clouds. U.S. In view of the Department of State Security Department, government agencies with strict security requirements like American citizenship and immigration services and federal emergency management agencies have accepted the Public Cloud Policy. Obviously cloud security rumors are being shelved(Chang, 2015). For service providers responsible for infrastructure hybrid cloud services, companies can take advantage of the physical infrastructure provided by cloud service providers, security control and security expertise to find them ahead of the security curve. Leading cloud providers often have more security expertise and utilize newer technologies to fully secure applications and data on Regional Garden’s infrastructure. Cloud provider organizations are provided with the firewall as part of their services to learn how their threats are being attacked by existing threats. Cloud providers can combine employees and contractor directories with access control policies to manage access to the cloud system in a centralized and comprehensive manner. Equally important, data theft sometimes allows employees to steal hard drives, so placing the data off-site of hybrid cloud provider equipment eliminates this potential risk (Fazio et al., 2016). In a public cloud environment, Regional Gardens can also obtain the net benefits of security needs demanded by its customers. The company might not be capable to prove the multi-factor protection or security of the data center. As per the “Private Cloud Reality and Vision” report released in the year 2012, almost 90% of security issues are related with data security and privacy, 62% control and visibility loss, and 40% are related to cloud integration.
The major concerns faced by Regional Gardens are:
- Access Control and Identity Management
- Continuing compliance issues
- Access of data from mobile devices
- Safety standards and certification
- Mixed customer data
Best practices for using AWS advanced security controls and measures to address security issues apply to internal and public data within the organization (Gordon, 2016)
.
Fig 2: AWS shared sources
Image Source: slideshare.net
Since it is recommended to use efficient security tools to protect organizational data at various access levels, the following recommendations are recommended:
- Fraud recognition
- AWS includes a private subnet that also helps encrypt data using the advanced data Encryption Standard.
- Provides safety logs as well as cloud HSMs to store the keys with the Amazon EC2 key pairs.
- Help users identify information assets that must be protected.
- Authorization to Applications and Data:
- AWS offers endpoint API admittance using a protected SSL connection.
- Built-in firewall allows traffic to be filtered through a network, creating several accesses in the similar instance without any interruption.
- AWS provides a single user access account to help access a console that provides service levels and is utilized to verify SSH access.
- Sign in Cloud Authentication
It moreover gives multi-factor authentication to help user accounts more secure and reliable (Junfeng & Weiping, 2016)
- Helps create private network connections.
- Supply access authentication, the users can access data merely after being properly authorized.
- Avoid invalid logical access attempts.
- Governance & Compliance
- AWS According to the Payment Card Industry DSS, AWS meets Level 1 standards. This helps the user store all personal information, credit card data for storage as well as processing. It is a conference information security standard certified by the ISO 27001 standards.
- Transfer existing system information, applications, plus custom log files in order to Cloud Watch Logs and help monitor these logs.
- With Cloud Trial, it provides reports on AWS API calls.
- AVPC to help users create their own IP address spaces to make private clouds in the AWS cloud. This also uses the RFC1918 private space.
- Operating system Hardening in addition to updates
- Use Amazon Machine Image (AMI) to help standardize operating systems and standardize system integration updates that users want to deploy
Nowadays IT organizations have to face challenge and complexity in optimizing IT budget and providing optimum services for internal and external customers(Li, 2015). Whether it is cost-cutting infrastructure, simplifying IT management, delivery of services or improving in other ways, it is not necessary for the strategic IT decision to get daily work and support- IP please increase competitive advantage. IT departments should ensure data security, enter the cloud In some years, progressive organizations have increased the use of cloud computing in various industries around the world. Many organizations have observed whether there is a difference between developments or production environment in the cloud or private and public clouds, and that cloud services can be offered for IT investment, which is not possible in the traditional IT infrastructure model. Although these commercial benefits are very attractive, yet there is a major concern for cloud security for many IT organizations. In fact, the 2011 IDG search survey conducted by corporate decision-making companies around the world, cloud attendance is the biggest difficulty in controlling security issues and controlling controls. What legal service providers want to see, taking into account security measures and understanding industry-specific compliance requirements is one of the methods discussed in this white paper which helps to deal with safety restrictions. Which usually prohibits the adoption of senior management cloud adoption and overcoming these security constraints is tremendous(Rashidi, 2012).
As a result of adapting to the hybrid cloud deployment model, the following must be considered:
Application Flexibility: In order to enhance resiliency, the factors that need to be considered are low dependencies, enhanced security and load balancing, which help loosely couple system components when accessing different components, and increase scalability and security by enforcing least privilege. It is usually implemented by some redundant components, and if one of the elements fails, the repeating elements will seamlessly take over plus continue computing-based services(Singh, 2015).
Backup & disaster recovery: By considering that IASO’s backup speed gives unique technology for backing up 9,000 files in one second, it uses a profound de-duplication phase that helps capture a full backup, thus reducing cost as well as storage space. It helps to keep the best low bandwidth and CPU usage. AWS accesses backup data by providing multifactor authentication, and provides various functions by storing data in different locations, such as AWS Storage Gateway, Amazon S3, as well as Amazon EC2 for the recovery of data(Pahl, 2015).
Data Integration: AWS Storage Gateway helps seamlessly provide consistent output data between local and public clouds. Using Amazon Redshift to quickly load data into the Amazon S3 helps company to efficiently manage large amounts of data by using RDS-compliant database engines for example Oracle and Microsoft SQL Server(Bernstein, 2014).
Cost Effectiveness: As large amounts of data enter the cloud, the precise storage cost will become a user network’s concern and impact. Therefore, by adopting a CloudArray that minimizes costs through de-duplication and advanced compression technologies, the storage requirement is limited to 10 times or more. Helps limit data to the cloud using a granular bandwidth scheduler based on business requirements.
This disclosure is an impetus for the advancement of our crossover cloud. Company will now have to begin the way toward offloading the objective workload to the cloud supplier in the office. The arrangement gives streamlined execution and lessens Regional Gardens’ objective in hyper-converged arrangements while additionally tending to cost and capital use issues. Not at all like the troubles experienced while picking an equipment seller, the greatest test in executing a crossbreed IT arrangement is the absence of topic mastery that includes cloud relocation administrations (Szyjewski & Niemcewicz, 2016). This is the first occasion when that a territorial garden has executed this kind of condition and it is hard to know where to begin.
Application Resilience issues: The rapid decline in the price of cloud storage services is driving Regional Gardens to move from expensive traditional storage systems to cloud storage services. While cloud storage should definitely be part of your future storage infrastructure, there are some limitations that you should keep in mind. Nirvanix’s untimely collapse forced its customers to rush to abandon their cloud storage services, shocking early adopters and underlining the need for cloud federation and data migration services. Long-distance data migration is still a problem for enterprises, especially those with large workloads ranging from hundreds of TB to several petabytes.
Backup Issues: The large scale of some organizations leads to the “insurance” of disaster recovery very expensive. Refreshing the disaster recovery infrastructure is a slow and laborious process. Reducing the data center footprint means hardware, maintenance; utility and operator costs are reduced. From a business perspective, the environment is purely logical, so the overhead for maintaining it is much smaller(SManjunath & Basu, 2012).
Disaster Recovery issues: Traditional DR is common but effective in most situations. DR will not be too difficult as long as it is maintained and the flow of the letter is followed. However, there are some common experiences among organizations that indicate a new disaster recovery motivation: organizational growth and changes in the causes of change in infrastructure. The backup strategy may be ignored until it is too late and the data is lost.Hybrid Cloud adds the benefits of personal and public excitement. The organization uses a private part of the cloud for mission-critical applications using Hybrid Cloud, as well as the least serious application that uses public cloud. The advantage of using this combination is that the private clusters provide improved protection, while the public cloud may reduce the cost of business continuity. Due to the many data leakages, data protection is a major concern for IT managers(Abu Sharkh & Shami, 2017). The DR program for BC should be based on a private cloud. Because only one customer uses this service in a private cloud, the (Chang, 2015). Other cloud service providers encrypt data and passwords even for a reliable security solution, transmitting data from a client’s firewall to a private cloud. This can be another backbone of increased security. Since private cloud is a dedicated club, so the cost structure of these services will be very high. In this case, non-complicated applications are often not organized in such an expensive environment to reduce costs, these non-critical applications and data may be stored on a public cloud. Even if the public cloud is not safe, this does not mean that anyone can easily attack the system. Public clouds will also have access controls, and most cloud service providers use a two-step approach system to authenticate users. Particularly serious disaster problem and business continuity process should be in a private cloud. This happens automatically and will ensure that recovery times and recovery points can be achieved by customer metrics when the product stops. By accessing programs that are located in the DR / BC private cloud, IT manager can resume production and the server can reload, get patched security, and run unexpectedly in recovery mode, private cloud will be able to handle the number of data traffic because organization data is non- Store in Critical Applications and Public Clouds, because it can be repaired in Even if the time has passed, it will not have significant fatalities. Even the public cloud can easily and easily handle any peak data transfer. In both cases, IT managers should ensure proper bandwidth capabilities and additional features that are easily available. Because of the terrible competition in the IT sector, transitioning hybrid system requires those companies’ pricing effectiveness, cost reduction, but there is no security cost(Gordon, 2016)
. The organization does not need to maintain an off-site production center, which can remain inactive for many years and cannot be used. The DR / BC plan is based on hybrid cloud system, when virtual infrastructure is destroyed, virtual desktops can be used in the cloud and the product can continue. Hybrid Cloud Solution for Business Continuity is a win for any organization (wins). It provides low-cost information and data security for IT managers.
The basic needs to be easily considered for the remote management are dependable Internet connection and a applicable IP address. You must also install connection server software to prevent safety breaches. A few examples of the servers are named as Windows Server 2003, and 2008, and Linux also chains Secure Shell SSH for remote management, which assists to secure connections (Hameed, Haider & Kantarci, 2017).
Service Level Agreements (SLAs) help to establish contractual terms in the services provided at each stage. The cloud storage service is provided by a third-party vendor and manages billing by annual plan or contract-based service billing to provide various functions with reasonable pricing.
The following figure shows the AWS cloud data storage service based on the user needs.
Fig 4: Pricing of the AWS Storage specifications
Image Source: aws.amazon.com
Fig 5: Data Transfer Pricing for AWS Services
Image Source: aws.amazon.com
Fig 6: AWS vs. Google vs. Azure
Image Source: zdnet.com
From the mentioned price point of view, AWS is usually considered as the medium price among three providers(Rashidi, 2012). Things to consider are geographical location, hourly and minute pricing, domestic business and international business. Longer contracts offer higher discount rates. Billing options vary based on usage. The AWS uses commercially reasonable efforts to perform the percentage of uptime (defined below) available in the Monthly Billing Cycle (“Service Commitment”) of each month, and the percentage of uptime per month is at least 99.99%(Zhou, Wu & Hong, 2013). Regional Gardens will apply any service credits for future Amazon EC2 or Amazon EBS payments that they pay. Depending on the judgment, Regional Gardens can issue credit cards to service credit which is used for absence. Service Points will not allow company to receive refunds or other payments from the AWS. Service credit will only be applicable and issued when the monthly billing period exceeded the ($1) credit amount. Service numbers cannot be transferred to any other account or not implemented unless expressed by the AWS agreement, if you do not see any unavailable, non-availability given to Amazon EC2 or MASS Or if there is only one solution to other failures, then SLA is to get service credit (if eligible) based on the following conditions (Philip & Bharadi, 2016).
At this stage, as the company gradually adopts more and more IT product portfolios, Regional Garden migrates existing applications (including mission-critical applications or the entire data center) to the cloud. From all appearances, we seem to have moved to SharePoint 2013 migration. Compared to previous versions, SharePoint 2013 has experienced a relatively slow adoption cycle because organizations pause to understand the impact of the new version and in many cases understand their cloud strategy. Migrating to the latest version seems to be increasing speed. More and more companies are approving budgets and updating plans, and with this trend and more firm cloud strategies in place, the Regional Garden has seen increased interest in SharePoint Online and Office 365. Identify critical workloads or use cases first and prioritize them based on business impact. Then, first deal with the most important workloads. Think about Regional Garden’s strategic initiatives and how it can help Regional Garden meet these workload requirements. The core of any knowledge management platform is the classification of Regional Garden. Without strong classification criteria, your data will still grow, but the content will become less “visible.” Both SharePoint 2013 and 2016 provide delayed site collection upgrades, and site collection administrators can upgrade themselves after upgrading the preview. At a fine grain, Regional Garden’s can upgrade the site collection to 2013 or 2016, and then use Export/Import to move individual sites although this may prove challenging depending on SharePoint.
One of biggest issue of migrating to the cloud is cost savings. By running applications in the cloud, companies do not have to pay IT staff to manage e-mail, handle large data centers, purchase as much hardware as possible, and keep applications running. The most expensive part of the migration is often moving storage or data. “It may require a 100GB database.” Cloud providers do not know how to charge for data, but if the volume of data is huge, it may take weeks or months. , especially if this is their first migration, and it is found that cloud-smart people may be challenging and expensive, and without cloud knowledge, migration may take longer than expected and experience more problems. The IT department may find that they just moved the old internal deployment to the cloud.
Conclusion
To maximize the flexibility to provide as much service as possible to most companies and to move towards their hybrid cloud access, your IT service provider looking for a better way to adjust costs. Responsible for reviewing its options, the IT Director discovered that hybrid cloud has provided the same or better security for the company’s business-critical applications and data, which led to the closure of which they were supposed to load workloads in the cloud. The question about sensitivity was given. Top hybrid cloud providers have data center infrastructure and expertise to ensure that there are adequate security measures to protect information in the cloud. The physical, activity, and network processes used in the cloud and controls, physical, activity, and controls used by internal systems of network processes and organizations, and better, and more often related to them. Using a secure hybrid cloud, the business is a valuable internal IT industry. Can eliminate resources, IT for business renewal Redistribute budget and can ensure that their applications and data are 24×7 available and continue to provide competitive advantages. It also concludes that the continuity of business is the starting driver of change, and re-evaluation of hybrid cloud strategy allows regional sector IT There may be substantial improvement in the infrastructure. This is related to the story of the Business Continuity Plan (BCP) because users can still use difficult systems like related systems like e-mail and file storage. Not only that we have successfully implemented a business continuity plan to ensure the availability of systems, better performance and provide a simple solution for regional horticulture. After talking about the advantages and disadvantages, it is clear that there is no clear answer to the support or resistance of the cloud computing. Until now, from the company’s point of view, this is a hybrid solution. Some key, business-sensitive applications will continue to use traditional business models as long as the concerns about confidentiality and legal issues are removed from the cloud, and simple applications in the cloud space will become more and more popular. This concept and technology is still present here, but it is still in its savings and is still a great way to go.
References
Abu Sharkh, M., & Shami, A. (2017). An evergreen cloud: Optimizing energy efficiency in heterogeneous cloud computing architectures. Vehicular Communications, 9, 199-210.
Banerjee, C., Kundu, A., & Dattagupta, R. (2013). SaaS Oriented Generic Cloud Compiler. Procedia Technology, 10, 253-261.
Bernstein, D. (2014). Cloud Foundry Aims to Become the OpenStack of PaaS. IEEE Cloud Computing, 1(2), 57-60.
Clarke, R. (2015). Does SaaS Backup Pass the Fitness-for-Purpose Test?. IEEE Cloud Computing, 2(6), 58-63.
Grützmacher, M. (2015). „Software as der Datendose” – Outsourcing, Cloud, SaaS & Co. Computer Und Recht, 31(12).
Hilber, M., & Reintzsch, D. (2014). Cloud Computing and Open Source – Wie groß ist die Gefahr des Copyleft be SaaS?. Computer Und Recht, 30(11).
Jeong, H., & Choi, H. (2013). The Web Service Framework for SaaS in Cloud Computing Environment. Applied Mechanics And Materials, 300-301, 664-667.
Pahl, C. (2015). Containerization and the PaaS Cloud. IEEE Cloud Computing, 2(3), 24-31.
Philip, J., & Bharadi, V. (2016). Signature Verification SaaS Implementation on Microsoft Azure Cloud. Procedia Computer Science, 79, 410-418.
Sala-Zárate, M., & Colombo-Mendoza, L. (2012). CLOUD COMPUTING: A REVIEW OF PAAS, IAAS, SAAS SERVICES AND PROVIDERS. Lámpsakos, (7), 47.
Singh, H. (2015). Profit Maximization Of SAAS By Reusing The Available VM Space In Cloud Computing. International Journal Of Engineering And Computer Science.
SManjunath, K., & Basu, A. (2012). Effective Technique for VM Provisioning on PaaS Cloud Computing Platform. International Journal Of Applied Information Systems, 4(6), 44-47.
Szyjewski, G., & Niemcewicz, P. (2016). PaaS Services in Cloud Technology, for IT Project Execution. Zeszyty Naukowe Uniwersytetu Szczeci?skiego. Studia Informatica, 41, 79-89.
Vostokin, S., Artamonov, Y., & Tsarev, D. (2018). Templet Web: the use of volunteer computing approach in PaaS-style cloud. Open Engineering, 8(1), 50-56.
ZENG, Q., & Wu, S. (2013). A SaaS Development Platform based on Cloud Computing. TELKOMNIKA Indonesian Journal Of Electrical Engineering, 11(3).
Ajoudanian, S., & Ahmadi, M. (2012). A Novel Data Security Model for Cloud Computing. International Journal Of Engineering And Technology, 4(3), 326-329.
Behara, D. (2017). Microservices Maturity Model. International Journal Of Engineering And Computer Science, 6(11).
Chang, H. (2015). Privacy Regulatory Model for the Cloud: A Case Study. IEEE Cloud Computing, 2(3), 67-72.
Esposito, C., Castiglione, A., & Choo, K. (2016). Challenges in Delivering Software in the Cloud as Microservices. IEEE Cloud Computing, 3(5), 10-14.
Fazio, M., Celesti, A., Ranjan, R., Liu, C., Chen, L., & Villari, M. (2016). Open Issues in Scheduling Microservices in the Cloud. IEEE Cloud Computing, 3(5), 81-88.
Gordon, A. (2016). The Hybrid Cloud Security Professional. IEEE Cloud Computing, 3(1), 82-86.
Hameed, M., Haider, S., & Kantarci, B. (2017). Performance impacts of hybrid cloud storage. Computing, 99(12), 1207-1229.
Junfeng, T., & Weiping, L. (2016). Design and Research of Hybrid Network Electronic Forensics Model Based on Cloud Computing. International Journal Of Grid And Distributed Computing, 9(12), 75-86.
Li, C. (2015). Hybrid cloud service selection strategy: Model and application of campus. Computer Applications In Engineering Education, 23(5), 645-657.
Linthicum, D. (2016). Practical Use of Microservices in Moving Workloads to the Cloud. IEEE Cloud Computing, 3(5), 6-9.
Rashidi, A. (2012). A Model for User Trust in Cloud Computing. International Journal On Cloud Computing: Services And Architecture, 2(2), 1-8.
Sill, A. (2016). Standards for Hybrid Clouds. IEEE Cloud Computing, 3(1), 92-95.
Singleton, A. (2016). The Economics of Microservices. IEEE Cloud Computing, 3(5), 16-20.
Sood, S. (2013). Hybrid Data Security Model for Cloud. International Journal Of Cloud Applications And Computing, 3(3), 50-59.
Zhou, Z., Wu, L., & Hong, Z. (2013). Context-Aware Access Control Model for Cloud Computing. International Journal Of Grid And Distributed Computing, 6(6), 1-12.
Abu Sharkh, M., & Shami, A. (2017). An evergreen cloud: Optimizing energy efficiency in heterogeneous cloud computing architectures. Vehicular Communications, 9, 199-210. d
Cowan, D. (2011). External pressure for internal information security controls. Computer Fraud & Security, 2011(11), 8-11.
Gluchman, V. (2016). Disaster issues in non-utilitarian consequentialism (ethics of social consequences)1. Human Affairs, 26(1).
Lang, U., & Schreiner, R. (2011). Analysis of recommended cloud security controls to validate OpenPMF “policy as a service”. Information Security Technical Report, 16(3-4), 131-141.
Lang, U., & Schreiner, R. (2011). Analysis of recommended cloud security controls to validate OpenPMF “policy as a service”. Information Security Technical Report, 16(3-4), 131-141.
Lin, G., & Huang, F. (2016). Research on Database Remote Disaster Recovery and Backup Technology Based on Multi-Point and Multi-Hop. International Journal Of Database Theory And Application, 9(6), 265-274.
Pahl, C., Jamshidi, P., & Weyns, D. (2017). Cloud architecture continuity: Change models and change rules for sustainable cloud software architectures. Journal Of Software: Evolution And Process, 29(2), e1849.
Pathari, V., & Sonar, R. (2012). Identifying linkages between statements in information security policy, procedures and controls. Information Management & Computer Security, 20(4), 264-280.
Wang, J., & Hou, W. (2011). The Feasibility of Researching Computer Network Data Backup and Disaster Recovery. Advanced Materials Research, 219-220, 107-111.
Zúñiga-Prieto, M., González-Huerta, J., Insfran, E., & Abrahão, S. (2016). Dynamic reconfiguration of cloud application architectures. Software: Practice And Experience, 48(2), 327-344.