Cloud Architectures for Regional Gardens Ltd
Technology in recent times can be considered one of the criticalsectors which are playing a role in the life of the ordinary people. In the area of the industry also technology is dominating and helping them to advance in a more innovative and technological oriented approach. Most of the technology is very much different in their way of assisting different sectors toexcel in the field of the implementation. In recent times it can be stated that the concept of cloud computing is very much in demand. This is due to the factor that it not only helps in the sector of advancement of the organisation but also alters the internal as well as the external working of the organisation (Chang, Kuo& Ramachandran, 2016). The field of benefit which can be achieved from the concept due to lie in one sector but are full spreader into different areas. This technology also helps in the industry of the less human intervention which would be beneficial in the way ofminimising the error in the operation of the working of the organisation. Most of technology in recent times are aimed at modifying an organizations internal as well as external working and most of the time the organization tend to achieve different kind of benefits which are related to the concept.
The primaryfocal point of the report is to focus on the organisation Regional Garden Ltd. The organisation is a large display garden which opens for public inspection some days in a year. The main aim of the organisation is to increase its responsiveness and flexibility. On the other hand, the board of the organisation is expecting to save significant money relating to the maintenance of the ICT infrastructure using closing the existing data centre. The motive of the activity is to move to the concept of the cloud which according to the organisation would be beneficial.
The cloud architecture which would be employed to assist the Regional garden directly is the Hybrid cloud architecture. The main reason for the selection of the hybrid cloud is due to the factor that it is a combination of both private and public cloud. Taking into consideration the definition of the hybrid cloud which is stated by the National Institute of standard and Technology (NIST), “Hybrid cloud is a combination of public and private cloudsbound together by either standardised or proprietary technology that enables data and application portability.”The aspect which is related to the concept of the hybrid cloud can be implemented in different forms, for example, it can be included as a private cloud which would be inside the organisation. The aspect can comprise more than one providers of public cloud or a hosted private cloud on the third party premises with more than one providers of the public cloud.
Benefits and Issues of Deploying Cloud Architectures
According to a recent survey which was made by Trend Micro, an organisation who is working in the concept of the security of the cloud stated that the service which is related to the public cloud eventually fails to meet the demand of the IT and the requirement of the business relating to few of the organisation. On the other hand, they concluded that the concept of the hybrid cloud would be very much beneficial for the purpose. It can be stated here that the idea of the hybrid cloud can be a stage which is intermediate as an enterprise prepare themselves to move their overall working which may include the internal as well as external operation into the concept of the public cloud. Some of the critical issues which can be considered in the idea of the hybrid cloud that is beneficial for the organisation would be increasing in the sector of the flexibility of the organisation. One of the other benefits which can beachieved from the concept is that since the overall working of the organisation is placed in the idea of the cloud, the organisation can focus more on job’s which are more critical for them(Chang, Kuo& Ramachandran, 2016). The cloud storage concept which is related to the data can also be beneficial in a way that the essential data of the organisation can be saved in the idea which wouldkeep in a secured manner without any third party getting access to the data. On the other hand, it can be stated that the data can be retrievedor access from anywhere and at any time. This fact mainly means that the data which is stored in the concept of the cloud computing is very much available whenever the organisation wants to access the data. In most the cases the resources which are required by the organisation to process their functionality are not available, but in the concept of the cloud computing can be stated that the funds are readilyavailable and are provided by the cloud providers upon the factor of the requesting(Almorsy, Grundy & Müller, 2016). Taking into consideration another traditional system it can be a very much cost-oriented factor but in the concept of the cloud computing the charges are applied according to the usage and the need of the different services which would be used by the organisation. These are factors can be very much beneficial for the Regional Garden Ltd,and they can achieve the advantage form the service straightforwardly and cost-effectively. The organisation by means of moving the complete infrastructure of the concept of the cloud they would be focusing on more of the important tasks which are related to the internal or external working. Most of the aspects which are related to the concept of the cloud computing would be very much beneficial in altering the working of the organisation and helping to achieve a greater standard of working of the organisation.
Risks Associated with Hybrid Cloud and Microservices Strategy
Figure 1: (HYBRID CLOUD)
(SOURCE: Manvi&Shyam, 2014)
1.1.Mainly in the process of the deployment, the use of two architecture would be done which are public cloud and private cloud.
Public cloud
A public cloud can be primarilybe considered as an internet. The provider of the service uses the concept of the internet to make the resources for example storage and application which would be directly available to the organisation. Some of the cases which is related to the public cloud is IBM’s Blue Cloud; Amazon Elastic compute cloud, Google Apennine and sun cloud (to name a few).
For the organisation, these type of clouds will be very much economical and can be considered to be very much inexpensive in the sector of the implementation due to the factor that the aspects which are related to the application, hardware and bandwidth are covered by from the side of the providers. It can be considered as a model which is built on the aspect of the pay per usage model,and the cost would be directly be related to the capacity of the usage of the service(Chang, Kuo& Ramachandran, 2016).
It can be stated here that the concept of the public cloud can be very much advantageous due to the factor of the concept being accessible from any location and by anyone. Any user or customer or organization can directly utilize the concept and make benefit from the aspect. On other hand one of the issues which can be stated relating to the public cloud is that it does not involve much of the security which is related to the data of the organization or the user. security can be one of the biggest issue in most of the aspects which are related to the concept of the cloud computing.
Private Cloud
A private cloud can be considered as the architecture of data centre which is owned by most of the organisation. The main advantage which can beachieved from the concept is that it provides provisioning, scalability, monitoring and automation. The central aspect which is related to the working of the private cloud is not to give the overall access to the data centre of the darkness and keep some of the control to within the operation of the organisation.
The private cloud concept can be expensive with the aspect of the typical modest economic scale. This option of the cloud service cannot be implemented by most of the small-scaleorganisations and is majorly performed by large enterprise groups. The private cloud concept is driven by the presence of the compliance and security and keeping the assets within the idea of the firewall.
Information Security Measures for Hybrid Cloud
Private cloud are basically used by organization who have a vast range of data which are majorly sensitive data of the organization. These type of data can be very much crucial for the organization and if the data goes into the hand of another person it would be a great loss for the organization (Almorsy, Grundy & Müller, 2016).
Comparing the concept of the private and public cloud it can be stated that there are different variety of functionality of each of the approach and which can be implemented according to the need of the organization. In most of the times organizations prefer the use of private cloud due to the aspect of the security which is involved into the concept and how the people can easily store their sensitive data into the concept without and concern factors such as loss of data or data theft affecting the data. On the other hand the private data of the organization can be sometimes so much critical for their working is that it cannot be placed into the concept of the public cloud were anyone can directly access the data. It can be stated here that the critical data should not be saved in the context of the public cloud being vulnerable to the attack by any third party and it can be accessed by anyone.
1.2.The concept of the hybrid cloud can be considered to be offering the aspect which is related to the scale and benefits which are related to the public cloud and the feature of security and control which is associated with the concept of private cloud (Hashem et al., 2015). The concept of the hybrid cloud focus on the aspect of the security and they majorly deal with the securing aspect of the data of the organization so that it is not into the hand of any third party or any unauthorized user. The following points give a direct overview of the benefits which are related to the aspect of the hybrid cloud relating to the implementation of it in the Regional garden Ltd.
Cost saving
- The concept directly reduces the capital expense due to the factor that the organisation infrastructure wouldbe outsourced to the idea of the providers of the public cloud
- It helps in the concept of the optimisation of thesupport which is spentduring the different stages relating to the application lifecycle. The idea of the public cloud can be used for the infrastructure development and the design if the private cloud can be used for the aspect of production. It can be stated here that the concept is very much cost effective when relating to the on-premises infrastructure.
- It improves the sector of the allocation of the resources at a cost which is vastly reduced due to the use of the concept of the public cloud removes the need which is related to the investment in the aspect of the carrying out different projects (Oliveira, Thomas &Espadanal, 2014).
- Comparing with traditional system it can be stated that most of the service which is related to the cloud computing are based on two tier system. The first tier basically consist of fixed amount of service which given to the customer and they pay for the service and the second tier mainly consist of the facility which is related to the aspect of usage per pay. This mainly means that the customer or the organization has to pay according to the resources they actually use and how much they use, there are no fixed amount involved into the concept.
Agility of business
- The deployment sector can be well managed within the aspect of the private cloud along with the issue of the scaling which is related to the public cloud.
- It directly provides improvement drastically in the sector of the organisational agility due to the factor that is related to the ability to directly leverage the public cloud concept. This helps in the idea of the increase in the opportunity which wasunavailablein the sector of the traditional infrastructure or pure cloud which are private (Almorsy, Grundy & Müller, 2016).
- The concept of the cloud bursting is also supported in the context which helps in the aspect of the tapping of the public cloud for a need which is unexpected relating to different computing resources.
Security consideration
- It can be stated here that since the concept of the hybrid cloud extends into the IT perimeter outside the boundaries of the organisation, it directly opens up the large surface area which is related to the attack with the hybrid infrastructure of the cloud under the control of the providers of the service (Hashem et al., 2015).
- When an organisation manage the complex hybrid environment of the cloud using the tool either as a section of the cloud platform which is in the cloud platform or the aspect of the third party tool, the organisations should take into consideration the element which is related to the security implication of using of each of the devices. It can be stated here that the tools of management.
- Security can be considered one of the most vital aspect in the concept of the cloud computing due to the factor that most of the critical data are saved in the concept of the cloud. It can be stated here that if the data of the user gets into the hand of any third party it would be directly affecting the overall functionality of the organization. In most of the cases organization thin twice before they actually mitigate their data into the concept of the cloud. This is due to the factor that they are not sure about the security aspects which are involved into the concept. On the other hand it can also be stated that most of the service providers do not give a clear idea about the type of security which would be included into the data.
2.
Risk factor |
Justification |
Control |
IT architecture Design |
The design concept of the hybrid cloud is complicated which requires the involvement of highly professional IT staff |
The control measure can be to appoint a highly professional IT expert who would be in control of the overall system |
Data Management |
Most of the organisation tend to move towards an automation process which would involve more security risk which is related to the data. |
The encryption of the data has to be done majorly in each of the data. This would be beneficial in the aspect of securing the data in the concept of the cloud. |
Disaster Recovery |
There can be different types of the disaster which can be facedwith the concept of the cloud which can directly lead to disruption in the normal working as well as the security of the data. |
There should always be a recovery plan which would be related to the data. The concept would be beneficial in a way which helps in the platform of securing the private information of the user or the organisation (Chang, Kuo& Ramachandran, 2016). |
Access control |
The access to the concept of the cloud can be done with the help of private network or over the idea of the cloud. This mainly means that the entrance to the data over the streamline of the data would be a risk-based approach which would be delivering the aspect of the concept (Hashem et al., 2015). |
The access aspect which is over the concept of the internet can be very much advantageous due to the factor that it would be directly securing the access and no other person apart from the authorised person. |
Switch between Vendor |
In most of the cases, the aspect of the switching between vendors can be a big problem which directly involved cost aspect involved in it. The organisation have to pay a considerable amount to mitigate from one service provider to another. |
In most of the cases, it can be seen that the data of the user are not safe in the hand of one vendor. In such a situation it can be seen that the allocation of the resources should be done in a proper manner taking into consideration different aspects which are related to the working within the concept of the cloud. |
3.The steps which are required for the concept control related to the hybrid cloud are stated below:
- Be wise about where the data goes:The concept of the hybrid cloud directly allow the organisation to save the critical data directly in the in-houseidea. On the other hand for the less critical data, it can be kept in the view of the cloud which is very easy relating to the storage of the data. This aspect is provided by the public cloud providers. Before the element of the securing of the data is taken into consideration, it must be taken into account that not all data are equally created. Some of the data may be considered as a regulated and another form of data can be supposed to be proprietary information. To get the maximum amount of security relating to the data, it should be ensured that the adaptation of the concept is done which is highly encrypted and also the idea of the resource isolation which provide that the data of the organisationare not saved in the concept of the other organisation(Oliveira, Thomas &Espadanal, 2014).
- Start with the concept of the compliance and the supplement with the smart policy:The agreement which is related to the regulatory can be considered one of the most appropriate point of starting which is similar to the securing of the concept of the hybrid cloud. Taking into consideration the layer of the security it can be stated that the organisation can implement more layers of protection and different goals of the organisation and also can implement the aspect of the goals of the IT and business bodies. It should be made sure that the backups, redundancies and another point which are related to the vulnerability are kept at the sameend of same levels of the protocols of the security that can be considered as personal data.
- Redundancy builds:There are two types of hardware, one being the hardware which is failed and on the other hand a device which would eventually collapseshortly. Both the sectorof the private and the public solution of the cloud must directly include the data redundancies and the equipment so that when the devicefails, there would not be any data loss. It can be stated here that the concept of the redundancy can be achieved from the idea of the backups. It should be marked sure that the redundancyexist in the idea of the data and there are no single failure points.
- The transparent partnership of public cloud:One of the most important aspects which are related to the cloud computing is the collaboration between a service provider which can be directly be trusted,and the service which is generated from the end of the service provider is genuine.
4.Recommendation 1
Application resilience
There can be different types of problem which can be facedwith the concept of the cloud,and the implication of the question can be on the system. In most of the cases, the average working of the organisation can be altered if there is any problem faced by the organisation. It can be stated here that the standard functionality of the organisationdepends upon the application and if there isan error in the aspect, the concept will not work accordingly to the requirement. The primary recommendation in the idea is that it should be taken into consideration that the application should work correctly even if there is some problem in the system. It should be taken into account that the toachieve the standard functionality of the system a backup plan should always beimplemented which would be helping to secure the network(Almorsy, Grundy & Müller, 2016).
Recommendation 2
Backup
There can be different types of event which can hamper the normal working within the concept of the hybrid cloud. The game can sometimes alter the overall operation which is expected from the idea of the cloud. In most cases, the organisation tend to save data which are highly relevant and critical. The loss of the data can be a big problem for the organisation. The event can sometimes be-be considered as inevitable. To protect the data from such issue, the primary recommendation in the concept is the backup of the data. The data in such situation would be very much safe and would not affect the working if the data is lost due to some event.
Business Continuity Plan for Hybrid Cloud
Recommendation 3
Disaster recovery
Disaster in the concept of the cloud computing can be considered to be very much an event which can be regarded as one of the most significantdisadvantages in the sector of working with the cloud. The primary recommendation which can be stated in this context is that there should always be a backup plan in place which would be implemented when there is any disaster in the concept of the cloud environment. On the other hand, it can be stated that the disaster recovery action should be implemented as soon as the event occurs, due to the factor that it would not be altering any of the functionality and would not possess any threat to the organisation. Disaster can come anytime and it can be stated here that since the data of the user is stored in the concept of the cloud it can be a problem if the data are lost. Sometimes due to disaster the organization do not get the access to the data which could be very much crucial in the way which would be altering the initial working of the organization.
Recommendation 4
Initial set up
The initial concept of the cloud framework which should be taken into consideration should be planned according to the requirement of the organisation. This phase can be considered very much crucial due to the factor that the overall working of the organisation depends on the setup process and the implementation of the perspective of the cloud technology. The initial set up should be done in a manner focusing on the goal of the project and the requirement of the organization in the part of the technology should be considered in this manner. The technology can sometimes be very much crucial in the concept of the organisation due to the factor that if any of the aspects which is related to the adaptation fails it would be directly affecting the overall process of working which is associated with the external as well as internal working (Oliveira, Thomas &Espadanal, 2014).
Recommendation 5
Outcome
The outcome of the process should be taken into consideration at the start of the process. This is due to the factor that there should be an initial goal of the organisation which would be focused. In most of the cases, it can be stated that there should be an orientation target which would be directly focused on the aspect. It can be considered one of the most crucial sector or recommendation which would be focused on the element of the working of the organisation as well as the internal and external working of the organisation. The main goal should be set up in the phase of the initialization due to the factor that so that in the later face everyone one is involved into the organization can activity work towards a common goal which can be easy to approach if proper process is taken into consideration. Experts should always be involved into the concept of the decision whether the overall process and the aspect of the mitigation is done properly and it can be stated that if the final outcome is not reached properly then it would be directly mean that the planning phase was not properly (Almorsy, Grundy & Müller, 2016).
Remote Server Administration, Resource Management and SLA Management
5.Remote server Administration: The remote server administration can be considered as one of the most important aspects which is related to the working within the concept of the cloud infrastructure. Any type of problem in the idea of the remote server can be very much critical for the can later the normal functionally of the organisation. In these type of situation to take care of the case, a professional expert has to be appointed which would be taking care of the overall system(Rittinghouse&Ransome, 2016). One of the criticalaspects in this scenario is that whenever there is any problem in the remote server, the question has to be resolved in that particular instance only. The main reason for the aspect is that it should not possess any threat to the system (Almorsy, Grundy & Müller, 2016).
Management of resource: The management of resources in any technology can be considered very much necessary. This is due to the factor that it would be directly affecting the overall budget in any scenario. The resource section can be directly be related to the aspect of the functionality which is related to the budget constraint. If proper utilisation of the resource is done, it would be straight affecting the budget of the organisation,and it would impact the standard functionality of the organisation as well (Manvi&Shyam, 2014). Sometimes it can be stated that an experienced person should be involved into the activity so that the resources allocation are done properly and there is no wastage of the resources.
SLA management:The service level agreement can be considered one of the vital aspects which is related to the functionality which is related to the concept of the cloud computing. It gives a direct overview of the concept which are involved into the concept and how the overall working in the concept of the cloud would be managed. The central aspect which is related to the SLA management is that there should not be any unforced error which would be directly affecting the system which is similar to the Service level agreement. Some of the parts which are related to the SLA are stated below:
- Benchmark performance and actual performance can be directly be compared.
- Allocation relatedto the response time.
- Usage statistic which would be very much provided.
- The schedule notification in the sector of the network that may directly affect the user (Oliveira, Thomas &Espadanal, 2014).
These all aspects mainly include the sector of the service level agreement which should be taken into consideration which would be affecting the overall working of the organisation.
6.
Figure 2: (MIGRATION TO THE AWS CLOUD)
(SOURCE: Manvi&Shyam, 2014)
Phase 1: Business planning and migration preparation
Steps to Migrate Email Services to AWS Cloud
In this phase, the primary object is taken into consideration which would be involving an idea of different types of benefit which can be achieved from the concept. The main starting point relating to the process can be some of the fundamental experience and the development of the preliminary business case for the idea of the migration. These majorly takes the sector of the architecture of the present system and the constraints (Almorsy, Grundy & Müller, 2016).
Planning can be considered one of the primary objectives which are related to the organization and this planning aspect should be always goal oriented. The goal should be very much common for everyone and the working should be done accordingly (Almorsy, Grundy & Müller, 2016).
Phase 2: Portfolio planning and Discovery
The next step which is taken into consideration is the concept of the IT portfolio, the direct dependences between the applications and the beginning of the aspect which is related to the migration strategy. With the portfolio discovery and the approach of the migration, the basic concept of the movementis taken into consideration,and the functionality of the organisation should be taken into account(Manvi&Shyam, 2014).
Phase 3 and 4: Migration, designing, migration and application validation
In this phase, the focus moves from the aspect of the portfolio level to the application level which is related to the individual. Each of the application is designed, validated and migrated according to one of the six standard strategies of the form (“The 6R’s”). After this, there would be a fundamental approach which is related to the working of the migration process.
Phase 5: Operate
This can be considered as a phase where the application is migrated to another platform,and the dependent on the aspect is taken into consideration. It can be viewed as a time where the old system is switchedoff,and the new system is in full power of the organisation (Rittinghouse&Ransome, 2016).
6.2.The issue in the migration phase are stated below
Phase 1: Business planning and migration preparation
The main issue which is faced in this phase is that if the planning of the process is not donecorrectly, it can create different types of problem. In some of the cases it is seen that the problem is not faced primarily,but in some situation, it can be stated that later on the issueare identified which directly affects the overall working of the organisation(Almorsy, Grundy & Müller, 2016)..
Conclusion
Phase 2: Portfolio planning and Discovery
This phase can also be considered as one of the vital steps in the process or the life cycle of the mitigation. It can be stated that it directly involves a post-stage related to the planning where portfolio planning is mainly taken into consideration (Manvi&Shyam, 2014). The concept of the migration is taken into account which if not taken into account properly can directly impact the internal as well as the external working of the organisation(Almorsy, Grundy & Müller, 2016).
Phase 3 and 4: Migration, designing, migration and application validation
In this step, the significant migration step is done. In this phase, it can be stated that the system planning is taken into consideration and the implementation of the system is done which directly impact the sector of the working of the organisation. Application validation process can be considered very much vital due to the factor that there can be different types of a loophole in the system which would be affecting the overall approach.
Phase 5: Operate
In this phase, it is seenwhether the implementation of the system is donecorrectly or not. This step can be considered one of the most vital area because there can be a different issue which can alter the functionality of the organisation(Almorsy, Grundy & Müller, 2016). Some of the sector which are taken into consideration security of the data which is involvedin the concept. It can be considered as a step where the old system turned off,and the new system would be taking control of the overall system. Some of the issue which can be noticed in this scenario is that whether the system is performing the intended task, it was expected to play (Rittinghouse&Ransome, 2016).
Conclusion
The report can be concluded on a note that the concept of the cloud can be very much beneficial for the Regional Garden. The primary sector of the functionality is in the industry of the flexibility and operation. In any technology, there are few disadvantages associated with the process, in this case even the concept of the hybrid cloud which is proposed on the implementation also has some issue which is majorly stated in the report. The migration aspect should be the most critical sector which should be given more focus due to the overall implementation would be responsible for the entire working of the organisation. The concept of the security of the data can be one of the sector or areas which should also be taken care of due to the factor that if there isan unethical issue in the aspect, it can lead to different kind of risk factors within the organisation. In the recent future, it can be stated that the concept of cloud computing would be playing a dominating role and more and more organisation would be focusing on the aspect and would be trying to gain advantage from the concept. The concept can sometimes be complicated for the ordinary people to understand so in that case a professional expert should be consulted so that there is no problem which is related to the operation and the working of the concept.
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., &Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Chen, M., Zhang, Y., Li, Y., Mao, S., & Leung, V. C. (2015). EMC: Emotion-aware mobile cloud computing in 5G. IEEE Network, 29(2), 32-38.
Chen, X. (2015). Decentralized computation offloading game for mobile cloud computing. IEEE Transactions on Parallel and Distributed Systems, 26(4), 974-983.
Gai, K., Qiu, M., Zhao, H., Tao, L., &Zong, Z. (2016). Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications, 59, 46-54.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Lian, J. W., Yen, D. C., & Wang, Y. T. (2014). An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. International Journal of Information Management, 34(1), 28-36.
Manvi, S. S., &Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.
Marinescu, D. C. (2017). Cloud computing: theory and practice. Morgan Kaufmann.
Oliveira, T., Thomas, M., &Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497-510.
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.
Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., &Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133-143.
Rittinghouse, J. W., &Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), 1435-1442.
Wang, B., Zheng, Y., Lou, W., &Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, 81, 308-319.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., &Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., &Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., &Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602-622.
Zhan, Z. H., Liu, X. F., Gong, Y. J., Zhang, J., Chung, H. S. H., & Li, Y. (2015). Cloud computing resource scheduling and a survey of its evolutionary approaches. ACM Computing Surveys (CSUR), 47(4), 63.
Zhang, H., Jiang, H., Li, B., Liu, F., Vasilakos, A. V., & Liu, J. (2016). A framework for truthful online auctions in cloud computing with heterogeneous user demands. IEEE Transactions on Computers, 65(3), 805-818