Cloud architectures for SoftArc Engineering
The paper will basically highlight the broad aspect of the Cloud Computing which describes the various developments as well as the technological advancements as mentioned in the case of SoftArc Engineering Company located in Australia. In that condition, the Cloud Computing can be described as a software service which deals with a variety of services as a response to a broad range of services that has been built upon one another under the moniker called the cloud (Almorsy, Grundy & Müller, 2016). Thus by acquiring the software of Cloud Computing the company will establish a model which makes the services convenient with an on-demand network access that has been transferred to a shared pool of configurable computing resources.
These services generally contain the networks, servers, storage, applications and the services. Moreover by taking these services will enable the process to become rapidly provisioned along with the decrease of the management effort in the organization. Thus, on the whole, the installation of the Cloud Computing will make the SoftArc Engineering Company become on-demand self-service, broad network access, resources pooling, rapid elasticity and measured services (Arora, Parashar & Transforming, 2013).
In this strategy, the Board will basically select the installation of the model of “Infrastructure as a Service or IaaS” to assist the SoftArc Engineering. The implementation of the IaaS in the company makes it efficient in terms of making the company on-demand service company. The IaaS is the service that the service of Cloud Computing with the services of servers, storage, network and the operating systems. All these services come under the on-demand service (Dinh, et al., 2013).
The cloud is further operated with the subcategories of public cloud and private cloud. In that context, the two sub categories are further mixed up and combined together by forming a combined approach called “Hybrid Cloud”. Out of all other cloud services this service has been selected because it can allow the dynamic scaling, variable cost along with the utility pricing model. Also, it will allow the usage by the handling through the multiple users upon a single piece of hardware.
The above clearly mentioned that the organization has selected the cloud software model of IaaS after moving its data centre from Brisbane to Sydney. By that, the company has gained the value with which the resources available get distributed as a service. Thus the most important benefit of implementing IaaS is to develop the ability to deploy the multiple types of clouds. In that context, the emergence of Hybrid Cloud is the part that can be counted under the important benefits of the company. Other benefits are the software tool is quite volatile in nature which will raise many significant spikes as well as troughs in relation to the demand on the infrastructure (Fernando, Loke & Rahayu, 2013).
This cloud infrastructure can be used by the new organizations without any kind of capital investment in case of hardware. This cloud software can be for the specific line of business or any kind of specific temporary infrastructural needs. On the other hand, the implementation of the cloud software creates the issues such as the difficulty in the data storage as well as processing. Other than that due to the presence of the software on-premise, the performance gets somehow slow down which results in lack of capacity to meet the organizational needs
Risks Involved |
How the Risks are managed |
Cloud Risk |
It can be managed by undergoing regular monitoring by the integrated usage of the public as well as the private cloud facilities. |
Formidable Risk |
. It can be managed with the resolve the internal conflicts as well as other business applications. |
Compliance Risk |
It can be managed by making the flow of data secure in the private as well as the public cloud systems. |
Benefits and issues of implementing IaaS
While the company SoftArc Engineering is counting for its success and decide to move the data centres at that time it has taken the decision of implementation of the IaaS in the company which forms the Hybrid Cloud. In that case, the security steps that should be followed by the company are as follows.
- Getting aware of various Risks: The risks associated with the various risks are the confined to the access control and the data protection. Due to the risks associated with the access control, it is recommended that the IaaS provider should definitely go through the implementation of the factor authentication and monitor which will enable the success of the premise data centre (Fernando, Loke & Rahayu, 2013). In addition, the security issue related to the data protection the system should go for the implementation of the data encryption and the DLP to make sure regarding the separation of each data.
- Selecting the Accurate Security Controls: Basically, the company is recommended to cover the selection process by going through the commercial firewalls, cloud provided controls and the host-based firewalls. All the three are highly fragmented and helps the company to choose the better security control best suited as per the business needs.
- Getting the Visibility across the Entire Environment: The risk that has been raised due to having the visibility across the entire environment. Rather the company is recommended to keep their visibility around only hybrid environment because it will help in carrying out successful migration and deployment (Hashem, et al., 2015).
- Segmenting the company’s networks: With having the risk of attacking the organizational surface the one approach is to make the segmentation f the company’s network. Thus it can be recommended that the company should enhance the quality of their internal corporate networks basing upon the IaaS platform (Li, et al., 2013).
- Improving the processes with security Automation: It is clearly recommended to go for the reduction of the business outages as well as the speed up deployments in the cloud to enhance the business agility (Othman, Madani & Khan, 2014).
- Placing the Security Ownership into the Right Hands
The adoption of Hybrid Cloud in the company will definitely bring some benefit to the public as well as the private clouds that protect the business from various causes of downtime. It also helps the business in providing many viable opportunities to accomplish the best possible outcomes like providing the implementation of the variable applications, reduction f the costs as well as the improvisation of the operations. It also accounts for the feasibility of the cloud infrastructures (Othman, Madani & Khan, 2014). Thus the resilience of the application has been studied based upon the best native cloud practices as per the requirement of the company. Moreover, any kinds of issues that are raised within the system can be addressed through the proper implementation planning as well as the execution and the efficient designs through the whole cloud applications.
In that context, the better evaluation can be done by involving the promising aspects of the efficiencies of the enterprises as well as the cloud economics (Rittinghouse & Ransome, 2016). Again in relation to that, the loss of data can be also be measured by the use of the cloud computing software which in later condition can be used for the backup as well as the data recovery techniques. Thus the used data recovery tools during the BCP of the SoftArc Engineering case study is the Linux Box, HSDRT, Cold/Hot Backup Strategy, SBA, PCS and the ERGOT. All these tools will be helpful in enabling the proper services to the system of the organization along with providing the viable insights for the efficiency of Hybrid Clouds (Sanaei, et al., 2014).
The requirements those are mandatory for the system is very well known from the provided checklists. These checklists basically provide a primary part which will provide the ideology basing upon the combination of the two operations, i.e.., basic and enterprise. Both will provide a clear idea of existing as well as the required features present within the cloud system (Tao, et al., 2014).
The requirements are again further found from the remote server based administration that can be capable of handling the monitor server images, OS control, instrumentation and the supervision of the intrusive attacks. The SLA should further contain the BCP of SoftArc Engineering that will in facilitating the transfer of intellectual property rights by positioning the data in the system.
The system continues with the description of a series of steps that will cover the process of migration of the SharePoint instance and SQL Server 2012 Database servers to the AWS cloud. In that context the first step that will enable the process is the creation of the AWS account in the system which is then followed by the launching of the network as well as the Active Directory Stack. This can be done by making the proper utilization of the sample template. Thereafter the process can be continued by the launch of the database stack which is d9one by the help of the database tier and the custom AMI.
Risks involved with Hybrid Cloud strategy
In relation to that, the processes then carried out by the implementation of the Windows Server 2008 R2 EC2 that will enable the installation of the Share Point server in the system (Wei, et al., 2014). This will be followed by the launch of the web stack which will be reflected through the BYOL, PD key as well as the test installation. This will be continued with the step of the deployment as well as the configuration of the ELB which is next followed by the final step of configuration of the SharePoint (Xiao, Song & Chen, 2013).
By going through each and every aspect of the Hybrid Cloud the critical issues that can be raised from the services are gained from various individual steps. One of such issues is the launch of the app stack that will provide a hindrance to the compatibility in between the trial PD key as well as the license key present within the system (Wei, et al., 2014).
Next to that is the launch of database stack that provides hindrances in the data redundancy and by that manner, it influences the provision by the help of the database tier. Thereafter that last issue that has been identified is the launch of the web stack. This basically hinders the utilization of the 2 Web Front servers that can be further used for the documentation processes of the identity cards in the company.
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future generation computer systems, 29(1), 84-106.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.
Othman, M., Madani, S. A., & Khan, S. U. (2014). A survey of mobile cloud computing application models. IEEE Communications Surveys & Tutorials, 16(1), 393-413.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), 1435-1442.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.
Xiao, Z., Song, W., & Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment. IEEE transactions on parallel and distributed systems, 24(6), 1107-1117.