Benefits of Cloud Computing
It is identified that organizations faces number of issues as well as challenges in storing confidential data as well as information properly on the site due to lack of proper security. It is found that if any issue problem occurs within the system then the organization faces number of challenges in accessing data. In order to resolve this issue, it is quite important for the organizations to adopt loud computing technology within the organization.
The problems that the organization faces due to lack of security as well as accessibility can be easily resolved with the adoption of cloud computing technology. It is found that cloud host mainly involves in monitoring security, which is very much efficient in comparison to in-house system. Utilization of cloud computing helps in providing greater security and the data as well as information, which are mainly stored within the cloud, can be accessed in spite of location and time. In addition to this, utilization of cloud computing helps in saving cost, increasing flexibility, mobility as well as collaboration within the organization.
- What are the steps that needs to be conducted in order to adopt cloud computing ?
- How cloud computing enhances accessibility of data and information?
- How security of data and information can be enhanced due to the utilization cloud computing?
According to Tao et al. (2014), the data as well as information of the organization is mainly stored in the cloud, which can also be accessible if the machine on which the information is present is not working. Proper accessibility of information as well as data irrespective of time and location is very much necessary when two or more member of the team is working together. Cloud computing assist in providing a collaborative simple process with the help of which, information can be accessible as well as shared securely on a cloud-based platform state it (Hashem et al., 2015). The ability to access information or to get connected to the office from anywhere irrespective of place reflects that person with some disability can also access the interface to connect with relevant infrastructure of work by utilizing proper cloud computing technology.
It is identified that numerous level of control within a network infrastructure is provided with the adoption of cloud in order to afford protection from continuity. It is stated by Chen (2015) that the main job of the cloud host is to properly monitor security, which is found to be quite efficient in comparison to in-house system. As most of the business generally does not want to consider the chances of internal data theft, however it is analyzed that high percentage of data theft mainly occurs internally (Gai et al., 2015). Thus, in order to secure the confidential as well as sensitive data as it is very much necessary to keep the sensitive data or information of the organization off-site. The main amped up security is considered as data encryption for data that is being transmitted over the network and stored within the databases.
Steps for Adopting Cloud Computing
The steps that are necessary for adopting cloud computing are illustrated below:
Assessment: It is stated by Tao et al., (2014) that after envisioning of the IT environment, the technology advisors generally needs to conduct a assessment for the infrastructure of the organization. This evaluation generally assists in providing proper baseline for developing timeframe, costs as well as resources.
Alignment: According to Chen (2015), the client organization is always advised to align its technical infrastructure with proper cloud solution. The step generally helps in providing a roadmap for ensuring that the client has clear idea about the transformation of its infrastructure from current to future states.
Design: The most important step is the design of the best cloud solution in order to help the organization in realizing its various business goals as well as objectives (Zheng et al., 2015).
Transition: After proper design of the solution, the various steps, which are very much necessary for the transition of current environment to the future, are generally outlined in order to create a proper transition plan.
Improvement: With proper technical requirements, internal utilization as well as publication licensing are generally required in order to make sure that IT environments are quite necessary for providing the greatest ROI (Gai et al., 2015).
It is identified that in this research, system development life cycle methods is utilized in order to describe the processes that are mainly associated with planning, creating, testing as well as deploying an information system (Akmeemana & Wickramasinghe, 2016). It is identified that SDLC method is mainly applied to number of software and hardware configuration that are very much necessary in order to implement cloud computing within organizations.
In this research, secondary data collection method is used in order to gather information about cloud computing technology. It is identified that in order to collect information various journal articles are generally reviewed so that proper information about the benefits, accessibility as well as security of cloud computing can be properly gathered.
The ethical issues, which can occur include:
Confidentiality: It is very much necessary to keep the confidential data and information secure. If proper security of data and information is not maintained then there are number of chances of data loss.
Do not harm: The people who are involved within the research must not be harmed otherwise there will be chances of occurring ethical issues.
Respect for privacy: It is very much necessary to respect the privacy of information and data properly. If privacy is not maintained within the organization then there are number of chances of occurring ethical issues.
Ethical and Occupational Health and Safety Concerns
As per occupational health and safety act, it is very much necessary to maintain proper as well as safe working environment for the employees of the organization in order to avoid various type of workplace accidents as well as injuries. Proper maintenance of occupational health and safety environment within the organization is very much necessary for proper implementation of cloud computing.
After undertaking a survey, it is analyzed that the organizations who adopted cloud computing are facing less challenges as compared to organization that does not have proper facility to store their data as well as information within the cloud. Out of 25 organization, 3 of them faces minor security related issues which can be easily managed by adopting proper security management strategies. In addition to this, it is found that with the adoption of cloud computing within organizations, accessing data becomes one of the easiest way to collect information and perform activities by the stakeholders irrespective of time and location.
The deliverables of the project mainly include:
- Designing scalable infrastructure
- Finalize the hosting facility and bandwidth requirement
- Procuring infrastructure components
- Deployment of cloud computing infrastructure
- Planning for disaster recovery and continuity
- Integration of monitoring solution
- Preparing for customer call centre
Risk |
Description |
Impact |
Likelihood |
Mitigation Strategies |
Improper budget assumption |
Due to improper budget assumption, the project managers face financial issues while progressing with the project. |
High |
High |
The budget of the project must be assumed after undertaking proper market analysis about the cost of resources and materials. |
Inappropriate management of project schedule |
If the project managers does not maintain the schedule of the project properly then it will be quite difficult to complete the project on time. |
High |
High |
Proper management of project activities is necessary in order to compete the project on time. |
Security issues |
The security concerns in cloud computing mainly include data at rest as well as data at transit . |
High |
High |
In order to resolve security issue, cryptographic encryption mechanism must be used. |
Inexperienced project managers |
As the project managers are not experienced they face difficulty in managing the project properly thus completing the entire project on time. |
High |
Medium |
Experienced project managers must be hired so that the project does not faces any type of management issues. |
Task Name |
Duration |
Start |
Finish |
Implementation of cloud computing |
95 days |
Tue 20-03-18 |
Mon 30-07-18 |
Initiation phase |
10 days |
Tue 20-03-18 |
Mon 02-04-18 |
Development of business case |
2 days |
Tue 20-03-18 |
Wed 21-03-18 |
Establishing project charter |
3 days |
Thu 22-03-18 |
Mon 26-03-18 |
Undertaking feasibility analysis |
2 days |
Tue 27-03-18 |
Wed 28-03-18 |
Appointing team members of the project |
3 days |
Thu 29-03-18 |
Mon 02-04-18 |
Milestone 1: Completion of initiation phase |
0 days |
Mon 02-04-18 |
Mon 02-04-18 |
Planning phase |
18 days |
Tue 03-04-18 |
Thu 26-04-18 |
Creating project plan |
3 days |
Tue 03-04-18 |
Thu 05-04-18 |
Development of resource plan |
2 days |
Fri 06-04-18 |
Mon 09-04-18 |
Creation of financial plan |
3 days |
Tue 10-04-18 |
Thu 12-04-18 |
Development of quality plan |
3 days |
Fri 13-04-18 |
Tue 17-04-18 |
Creation of risk management plan |
4 days |
Wed 18-04-18 |
Mon 23-04-18 |
Development of communication plan |
3 days |
Tue 24-04-18 |
Thu 26-04-18 |
Milestone 2: Completion of planning phase |
0 days |
Thu 26-04-18 |
Thu 26-04-18 |
Execution phase |
63 days |
Fri 27-04-18 |
Tue 24-07-18 |
Designing scalable infrastructure |
3 days |
Fri 27-04-18 |
Tue 01-05-18 |
Data centre |
6 days |
Wed 02-05-18 |
Wed 09-05-18 |
Network infrastructure |
7 days |
Thu 10-05-18 |
Fri 18-05-18 |
Hardware |
5 days |
Mon 21-05-18 |
Fri 25-05-18 |
Backup and monitoring tools |
4 days |
Mon 28-05-18 |
Thu 31-05-18 |
Finalize the hosting facility and bandwidth requirement |
5 days |
Fri 01-06-18 |
Thu 07-06-18 |
Checking availability of data centre |
8 days |
Fri 01-06-18 |
Tue 12-06-18 |
Testing frequency |
7 days |
Fri 08-06-18 |
Mon 18-06-18 |
Availability of redundant systems |
6 days |
Wed 13-06-18 |
Wed 20-06-18 |
Physical security |
9 days |
Tue 19-06-18 |
Fri 29-06-18 |
Procuring infrastructure components |
9 days |
Thu 21-06-18 |
Tue 03-07-18 |
Deployment of cloud computing infrastructure |
8 days |
Mon 02-07-18 |
Wed 11-07-18 |
Planning for disaster recovery and continuity |
6 days |
Wed 04-07-18 |
Wed 11-07-18 |
Integration of monitoring solution |
7 days |
Thu 12-07-18 |
Fri 20-07-18 |
Preparing for customer call centre |
9 days |
Thu 12-07-18 |
Tue 24-07-18 |
Milestone 3: Completion of execution phase |
0 days |
Fri 20-07-18 |
Fri 20-07-18 |
Closure phase |
4 days |
Wed 25-07-18 |
Mon 30-07-18 |
Post project review |
1 day |
Wed 25-07-18 |
Wed 25-07-18 |
Stakeholder sign off |
2 days |
Thu 26-07-18 |
Fri 27-07-18 |
Documentation |
1 day |
Mon 30-07-18 |
Mon 30-07-18 |
Milestone 4: Completion n of closure phase |
0 days |
Mon 30-07-18 |
Mon 30-07-18 |
References
Akmeemana, A. P., & Wickramasinghe, C. N. (2016). Impact of Modern Project Management Methodologies and Software Development Life Cycle Models on Software Quality Assurance Success.
Chen, X. (2015). Decentralized computation offloading game for mobile cloud computing. IEEE Transactions on Parallel and Distributed Systems, 26(4), 974-983.
Costantino, F., Di Gravio, G., & Nonino, F. (2015). Project selection in project portfolio management: An artificial neural network model based on critical success factors. International Journal of Project Management, 33(8), 1744-1754.
Gai, K., Du, Z., Qiu, M., & Zhao, H. (2015, November). Efficiency-aware workload optimizations of heterogeneous cloud computing for capacity planning in financial industry. In Cyber Security and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference on (pp. 1-6). IEEE.
Ghaffari, M., & Emsley, M. W. (2015). Current status and future potential of the research on Critical Chain Project Management. Surveys in Operations Research and Management Science, 20(2), 43-54.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Hornstein, H. A. (2015). The integration of project management and organizational change management is now a necessity. International Journal of Project Management, 33(2), 291-298.
Osseiran, A., Boccardi, F., Braun, V., Kusume, K., Marsch, P., Maternia, M., … & Tullberg, H. (2014). Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Communications Magazine, 52(5), 26-35.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), 1435-1442.
Todorovi?, M. L., Petrovi?, D. ?., Mihi?, M. M., Obradovi?, V. L., & Bushuyev, S. D. (2015). Project success analysis framework: A knowledge-based approach in project management. International Journal of Project Management, 33(4), 772-783.
Zheng, K., Meng, H., Chatzimisios, P., Lei, L., & Shen, X. (2015). An SMDP-based resource allocation in vehicular cloud computing systems. IEEE Transactions on Industrial Electronics, 62(12), 7920-7928.