The non-functional needs
Discuss about the Analysis of systems My Health Record.
The “Commonwealth Government” of Australia, has taken the initiative of “My health Record”. It delivers common people with an integrated platform via Internet. It is useful to view, modify, handle and record the data about health problems.
The “cloud-based” is the term referring to resources, applications, available on the user’s demand by Internet from the cloud computing provider’s servers. A project on “My Health Record”, has been estimated to be created regarding moving their data towards the cloud.
In this report the different non-functional needs and benefits review are analyzed. Moreover, the drawbacks of cloud solutions with the SDLC approach are also considered here.
The non-functional requirements have been the qualities required to be acquired by any system. Here the constraint under which the system has been operating has been also considered. Using the “FURPS+” acronym as reference, the non-functional needs are also known as “ilities”. The reason behind this that most of requirements have been ending with the term “ility”, such as availability, maintainability, reliability and many more (Botta et al., 2016).
The move into the cloud computing has different benefits. It includes the reduction of the operational expenses, capital costs. It helps in raising the support for the distant employees and the mobiles. It also helps in flexibility of the infrastructure. As this cloud services are properly imposed, they will be able to alter the corporate view of the IT of the organization. This would make “My Health Record”, a core of expense to competitive benefits. This would likewise create positive impact on their top-line revenue.
The project undertaken must ensure that the cloud service provider has been giving the services relevant for “My Health record”, to run their business operations. This is critical to efficiently transfer every services of IT to the cloud (Buyya, Vecchiola & Selvi, 2013). To guarantee the appropriate options, various attributes under the requirements that are “non-functional” are needed to go through during the evaluation of the service provider.
Security:
One of the fundamental drawbacks in moving into external cloud is the worthless security. Since the cloud service provider has been devoid of the requirements and appropriate security controls, the security becomes compromised. (Wei et al., 2014) As a result of this cloud service providers are to seek to acquire multi-factored authentication built in the company’s service with complete encryption in-transit and at-rest for content. Here the centralized security policies to manage the distant or local servers are important.
Security
Performance:
It has been dealing with the process to suit the cloud architecture well to support the workloads that have been deployed on the rise of workload (Tebaa & Hajji, 2014).
Reliability:
The business-basic administrations are extremely muddled. The business at commonly could not bear to have their administrations of IT decreasing because of the outrage affecting the business viably. The missed calls, online messages, unshared records and deferred quotes could influence top-line revue with the main issue costs. The unwavering quality has been worried about diminishing the likelihood of service outrage (Tebaa & Hajji, 2014). The organization ought to look for those service providers who have minimal history of cloud blackouts.
Usability:
This has been diverse to rely on the recognizable proof of the customers. The customers may be the modelers or engineers, business rulers or the IT professionals. For each situation the organization needs to consider the simple use of the product. They should likewise consider how good the interfaces are outlined. The IT is no longer mystery in the organization. Or maybe, the connecting with frameworks is out there for the outside world (Tebaa & Hajji, 2014). The viable planning of the framework has turned out to be more important than the before.
Regarding the software interfaces, the reason to link the system and “Google Big Table” is needed to be established and then retrieve the data. The connection between the system and mobile gadgets deliver the mobile access into the system. Besides, the system is to be integrated with social media such as Facebook and Twitter. There have been two types of user interfaces of the system. First one is the “System Administrator” interface. Here the administrator gets access to the complete system. Secondly there is the “Organization Administrator Interface”. Here the administrators could edit and access the complete information of the company they have been controlling (Chen et al., 2015). The members in the member interface have been capable to view and upgrade the personal information. It must also include the profiles and the public pages that have not been belonging to the organization. The project is meant to be worked over “Google App Engine”. Hence there has been absence of specific interface of hardware.
Those requirements which have been non-functional should be considered regarding the qualities that “My Health Record” would need from the information technology system along with those constraints they have been performing on. The “My Health Record”, would not be able to possess the complete control to do whatever they have been requiring as they move to off-premise cloud (Gai et al., 2016). This cloud is operated by the vendors. However, they are meant to be aligned to the servicing platforms delivered by them.
Performance
The business specialists have trusted that the pattern of distributed computing would proceed to develop and grow in advance. As this innovation has been without a doubt profitable for organizations of every size, it has not been without drawbacks. The different qualities and shortcomings with respect to the usage of distributed computing have been depicted below.
Cost effectiveness:
Cloud computing is likely the most practical system to use, keeping up and refreshing. Customary desktop programming is costing associations a great deal regarding economy. Counting the licensing charges for different customers could end up being to a great degree expensive for the foundation (Hwang, Dongarra & Fox, 2013). The cloud, of course, is open at more affordable rates and consequently, altogether been down the IT expenses of an organization. Additionally, there have been various one-time-installments, the pay-as-you-go and other versatile decisions open that make it especially sensible for the association being alluded to.
Unlimited Storages:
Securing information within the cloud gives for all intents and purposes the endless limit constrain. Hence, “My Health Record” needs worry more over the storage space shorting or growing the present storage space availability.
Recovery and reinforcement:
Since all the data is secured in the cloud, storing and restoring the same has been fundamentally less requesting than securing the same over physical gadgets (Hwang, Dongarra & Fox, 2013). Additionally, most cloud authority associations are regularly outfitted enough to manage recovery of information.
In this manner, this makes the entire methodology of support and recovery generously more clear than other regular systems for data stockpiling.
Modified Software Integration:
In cloud, the reconciliation of software is typically something that happens actually. This infers that “My Health Record”, does not need to take additional attempts to change and consolidate the applications as indicated by the inclinations.
Straightforward Access to Information:
At the point when the people enlist themselves in cloud, they could get to the information from wherever there is an Internet. This profitable component allows moving past time zone and geographic zone issues (Hwang, Dongarra & Fox, 2013).
Fast Deployment:
Above all, the cloud computing delivers the upside of fast deployment. When anybody settles on this technique for working, the entire system could be totally active in a matter of two or three minutes. Clearly, the time taken here would depend on the correct kind of innovation required for “My Health Record”.
Inclined to attack:
The storing of data in cloud could make “The My Health Record” powerless while dealing with external harms and attacks (Leymann et al., 2014).
Reliability
Security in Cloud:
This has been one of the important problems within the cloud. Before adopting this technology, “My Health Record” should be aware that they could have to surrender all their sensitive information to a third-party cloud service provider. This might place the company in incredible problematic situation. Thus they need to ensure that the going for the most reliable service provider who could store there information protected.
Technical Issues:
Though the information in cloud could be retrieved at any time and from any place, still sometimes the network could face some break downs. “My Health Record” needs to be aware of the approach about how this technology has been continuously inclined to breakdowns and other technical problems (Jula, Sundararajan & Othman, 2014).
The SDLC or “System Development Life Cycle” or “Software Development Life Cycle” is the structure characterizing undertakings that has been to be done at each progression within the hybrid cloud computing process. Two sorts of SDLC are examined here.
Without a doubt the conspicuous and comprehended predictive approach has been the waterfall model. The term waterfall got transformed into the token predictive system. This has been for debating the advantages of adaptive versus predictive. The nature of the predictive approach has been its accentuation over network. It has been further keeping up a far reaching vision of the resolution space. Its weakness has been the steady thoroughness not yielded (Zhang et al., 2014). However there has been no reason not to procure what has been required from this framework.
Eventually, there have been more than satisfactory in bona fide cases to exhibit that the versatile methods work in the “gigantic.” The adaptive SDLC keep running from the Rapid Application Development or the RAD that basically models things into actuality, to Scrum, with its staggering reliance over group collaboration. This proceeds up to XP that takes the adaptive to the outrageous with its capability of adjustment of joined software and steady reviews. These lighter and spry frameworks make cloud computing fast (Kalloniatis et al., 2014). However they do tend to be fairly strategic, as often as possible missing the primary strategic scopes.
For the current venture the Adaptive approach is proposed. The adaptive philosophy has been otherwise called the agile approach. This is on account of they take after “Agile Manifesto” which is an accumulation of focal standards backing up iterative improvement. The SDLC has been adaptable in using Agile SDLC that has been utilizing the “IBM Rational Unified Process or SCRUM”. All of these are outlined like an iterative approach for generating and quickly implement life-cycles. To bring operations on the comparative table, the application of DevOps might be utilized. This must be particularized in the system of the cloud SDLC.
Usability
Conclusion:
Like other field of technology the cloud computing likewise has some upsides with downsides. The advancement could demonstrate an awesome resource for the “My Health Record”. However, it could likewise damage if it is abused or not seen legitimately. To put it plainly, the information as put away in big data center everywhere throughout the world, it could become the objective of attackers. Moreover, in such cases it could not be utilized appropriately by the employees of cloud service providers. The experts of “My Health Record” require guaranteeing that cloud computing never turn out to be any system utilized by some of the clients. Like different advancements in today’s capitalized world, the technology of cloud has been marketed first. At that point its upsides and downsides should be remembered while implementing.
References:
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Buyya, R., Vecchiola, C., & Selvi, S. T. (2013). Mastering cloud computing: foundations and applications programming. Newnes.
Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies. Mobile Networks and Applications, 20(6), 704-712.
Choi, C., Choi, J., & Kim, P. (2014). Ontology-based access control model for security policy reasoning in cloud computing. The Journal of Supercomputing, 67(3), 711-722.
Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications, 59, 46-54.
Grewal, R. K., & Pateriya, P. K. (2013). A rule-based approach for effective resource provisioning in hybrid cloud environment. In New Paradigms in Internet Computing (pp. 41-57). Springer Berlin Heidelberg.
Hu, F., Hao, Q., & Bao, K. (2014). A survey on software-defined network and openflow: From concept to implementation. IEEE Communications Surveys & Tutorials, 16(4), 2181-2206.
Hwang, K., Dongarra, J., & Fox, G. C. (2013). Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann.
Jula, A., Sundararajan, E., & Othman, Z. (2014). Cloud computing service composition: A systematic literature review. Expert Systems with Applications, 41(8), 3809-3824.
Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards & Interfaces, 36(4), 759-775.
Leymann, C. F. F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud computing patterns. Springer, Wien. doi, 10, 978-3.
Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216.
Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., & Du, R. Y. (2013). Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterprise Information Systems, 7(3), 237-271.
Lu, P., Sun, Q., Wu, K., & Zhu, Z. (2015). Distributed online hybrid cloud management for profit-driven multimedia cloud computing. IEEE Transactions on Multimedia, 17(8), 1297-1308.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Zhang, H., Jiang, G., Yoshihira, K., & Chen, H. (2014). Proactive workload management in hybrid cloud computing. IEEE Transactions on Network and Service Management, 11(1), 90-100.