Benefits of PaaS, SaaS and IaaS models
Discuss About The Advantages And Challenges Of Cloud Computing.
Justification: The main reason for the implementation of the PaaS model is due to the factor that the model provides a platform of software applications as a service to the end users. Some of the advantage which can be related to the aspect is in the sector of lower of the administrative overheads, more current system of software, scalable solutions and lowering of the cost which is related to the ownership (Gai et al., 2015).
Justification: The main aspect which is related to the deployment of the SaaS architecture is that it would be directly providing the organization with a platform of software application service for the end users. The main sector of the advantage which can be achieved from the concept is the improvement in the customer relation management (CRM), human resource solution and invoicing and billing system (Sanaei et al., 2014)
Justification: The fundamental aspect which is related to the aspect of the deployment of the IaaS provides an access to the resources which are stated as fundamental such as virtual machine, physical machine and virtual storage. Apart from the following concept the main sectors of advantage from the deployment is the enhancement of the IP addresses, Load balancer and Software bundles (Avram, 2014).
- Overhead of the administrative process
- More current system of software
- Scalable solutions
- Lowering of the cost of ownership
- Processor scheduling is event based
- The security aspect which is related to the PaaS is not optimal
- Lack of portability (Rittinghouse & Ransome, 2016)
- Software license efficient use
- Modest tools of software
- Solution of multitenant
- Platform responsibility which are directly managed by the providers.
- Risk based on browser based
- Lack of portability
- Dependencies of network
- Efficient and flexible renting of the hardware of the computers.
- Control over the computing resources through the concept of the administrative access directly to the Virtual machine
- Interoperability and portability with the legacy applications.
- Data erase practices
- Robustness of the virtual memory isolation
- Virtual machine Sprawl
The risk factors which are associated with the new hybrid cloud and micro services are stated below:
Architecture design – The design of the IT architecture is very much complex. This basically involves a varying combination of the private, public and on premises it cloud. It order to achieve the desired standard of working IT experts have to be appointed which would be very much helpful in the aspect of the delivering the service which is related to the concept.
Control: The main aspect of the control is the appointment of a sophisticated IT professional who would be deploying the system directly. The person should be very much expert in the field of the working with the different aspects which are related to it (Rittinghouse & Ransome, 2016).
Data management – Most of the organization are using the concept of the storage automation in the data center to directly route the data to tier which is related to medium, fast or seldom used storage. This directly depends on the type of data and the access need. The stewardship and the rules of this type of data can get very much riskier and very much complex when the data gets ticketed for the non-data center destination and must be earmarked and tracked (Puthal et al., 2015).
Issues related to cloud computing
Control: The main aspect which is related to the concept is that IT would have to rethink of the data deployment and the stewardship of the rules of the automation to encompass not how the data would be accessed by also when and the frequency by which the data would be accessed.
Privacy and security – The aspect of the security of the data is very much improving in the framework of the cloud. But on the other hand it can be stated that the direct control of the data is in the hand of the cloud providers.
Control: The main aspect which is taken into consideration is that the cloud providers gives an overview of all the measures of the security of the data which would be enforced into the data (Hashem, et al., 2015).
- Encryption: The data must be encrypted whenever it is necessary. Most of the data encryption achievement can be very much difficult to be done. But it can be stated that to achieve higher standard of security encryption can be considered one of the most vital aspects.
- APIs protection: The server of the cloud directly run on the APIs let directly lets application to access the service which are achieved in the different servers. The main aspect of the API can be achieved in the concept by means of protection of the access which is authorized.
- Use and collect of security logs: Each of the cloud providers have a security log which directly explains what are the processes which are taking place in the concept of the cloud. It should be taken into consideration that the avoidance of the security silos should be done and the internal team has the tools which would be helping to oversee the security which is related in the public cloud (Rittinghouse & Ransome, 2016).
Issues of application resilience: The issue which is related to the resilience can be managed if proper functionality of the operation is taken into consideration by an IT professional person. It should be always a role of the IT professional to get the overall system working and most overcoming of the difficult issues in the internal working of the organization.
Backup: There should be a backup of the data due to the factor that the data would not be lost if there is any problem in the database. Back up can be considered one of the most vital aspect in the working in the concept due to the fact that if any type of data is lost then this back up would be very much beneficial in the aspect. In most of the cases it can be stated that since most of the time the data of the organization are stored which are very much crucial it can be a big loss if there is loss of the data (Rittinghouse & Ransome, 2016)
Disaster recovery: In case of any disaster the recovery action should be implemented very much in time. This can be considered very much important due to the factor that the issue should not impact the overall working. In present time there should be a disaster recovery plan which mainly aim at recovering from a disaster as soon as the problem is encountered so that it does not possess any type of threat to the internal as well as external working of the organization.
Remote server Administration: The remote service administration should be done by an expert person due to the factor that it directly involves the internal and external working of the organization. Any type of changes in the remote server could lead to problem in different sectors which may alter the normal functionality of the organization. In most of the cases IT professionals are appointed in this role as they should be well adverse with the different conditions it may face. In such a sector problem may be a common issue but it must be stated that the problem should be resolved before it could impact the normal functionality of the organization.
Steps to secure hybrid cloud
Resource Management: The management of the resources should be done most with most priority. This is due to the factor that loss of resources should not take place anytime. Resource management can be directly linked with the budget and it may be stated as directly proportional due to the factor that if proper utilization of the resource are done it would directly help in the sector of the minimizing the budget (Rittinghouse & Ransome, 2016)
SLA Management: SLA management should be included so that it does not force any sort of unwanted error related to the SLA aspect. Some of the aspects which may be related to the SLA are stated below:
- Benchmark specific performance to which the actual performance can be compared.
- Response time allocation
- Statistic of usage which would be provided.
- The notification of the schedule in the sector of network that may directly affect the user (Puthal et al., 2015).
The steps which are included in the concept of the mitigation of the AWS cloud are stated below:
Phase 1: Mitigation Preparation and planning of the business
In this phase the determination of the right objectives are done and the beginning of the process of the mitigation of the process is started (Dembla, Flack & Petter, 2015). Planning can be considered one of the most important sector in this aspect due to the factor that of the planning is not done properly it may directly alter the working of the project.
Phase 2: Portfolio planning and discovery
The next phase which is related to the concept is the portfolio planning and discovery. In this phase the main aspect which is taken into consideration is the identification of the dependencies between the application and how to move to different planning phases and its discovery. Each of the planning phase has a different functionality and it can be stated here that each of the sector may be dependent on each other for their proper working. If one of the phases go wrong it would be directly affecting the overall functionality of the project (Whaiduzzaman et al., 2014)..
Phase 3: Migrating, designing and validating application
It can be stated here that in this phase the foundational experience of the migration is fixed and the migration process is accelerated and the main aim after the process is the achievement of the scalability.
Phase 4: Operate
At this stage the mitigation process is completed and the old system are turned down and the advantage with the new system is achieved. It is the main part due to the factor that it would directly show weather the new system would was implemented successfully or not. In most of the cases it can be seen that it directly involve the working of the system and changes should be noticeable in this aspect (Puthal et al., 2015).
Mitigation of AWS cloud
In Phase 1: This phase can be considered very much important due to the factor that the setting of the objective are done in this process. If any type of problem is done in the process it can lead to big problem.
In Phase 2: Planning phase there can be different sectors or options which can be implemented. The main decision aspect is taken into consideration and the progress towards the step of the mitigation is done.
In Phase 3: The designing aspect should be very much oriented within the framework of the business. In most of the cases it can be stated that the aspect of the design should be towards the goal and the objective of the organization.
In Phase 4: It can be stated here that the overall aspect which is related to the mitigation is done in this process. There are different types of issue which can be faced which can alter the normal working of the organization (Hashem, et al., 2015).
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Dembla, P., Flack, C., & Petter, S. (2015). Extending the DeLone and McLean IS Success Model to Cloud Computing.
Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications, 59, 46-54.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608.