Cloud Architectures for SoftArc Engineering
Cloud Computing is becoming the integral part for any organization as it offers features that are quite useful and unmatched security. It also gives wide range of option for every group of organization and it can also be installed well in the premise. Cloud computing also helps in understanding the market quite well and can generate better decisions (Rosado & Bernardino, 2014). Cloud computing also aims in providing efficient work.
The following report discusses about the different cloud architectures and the problems related on having hybrid cloud architecture.
Various types of cloud services that can be used by SoftArc are listed down below.
- Elastic Disk Provisioning Architecture
- Redundant Storage Architecture
- Service Load Balancing Architecture
- Resource Pooling Architecture
- Dynamic Scalability Architecture
- Resource Pooling Architecture: Here, every identical IT resources pools have been grouped and then stored in a system. They are later used by the system ensuring that each and every resource has been staying connected with other resources. The primary idea behind using this architecture is that, the company could store every resource within one system and could be accessed from anywhere (Alamri et al., 2013). One of the effective benefits of using the architecture has been that all of them have been working in the same order meaning this will make the process much faster and makes it efficient (Almorsy, Grundy& Müller, 2016).
- Dynamic Scalability Architecture: It completely works on pre-defined systems having scaling condition, which helps in triggering the dynamic allocation of all IT resources from the resource pools. It works closely to the Resource Pooling Architecture. One of the main ideas of utilizing the architecture has been that it helps to allocate dynamic storage. The space is changed later which was not possible in static storage.
- Service Load Balancing Architecture:It has been a type of cloud architecture that has been made particularly in scaling down the implementation of the services of cloud. The primary reason to implement the architecture is because with this, the load can be evenly distributed so that there has been no load over one server (Almorsy, Grundy& Müller, 2016). It further helps to scale the cloud services.
- Elastic Disk Provisioning Architecture:It is type of architecture where it helps in giving a dynamic storage provisioning system which helps the cloud users to be billed for the exact amount of storage that the individual uses and not for the whole part (Othman, Madani & Khan, 2014). The main reason to consider this architecture as then SoftArc will have to pay for the amount storage they are using and not for the whole which will be cost efficient.
- Redundant Storage Architecture:It is a type of cloud architecture where a duplicate secondary storage is introduced which works as a failover system and helps in synchronizing the data that is already presented in the cloud storage device (Othman, Madani & Khan, 2014). The main reason behind to consider this is that it will create a backup and save the data elsewhere and after that it can be merged later on with the primary one.
Redundant Storage Architecture
Benefits: It is having high availability when it comes on cloud storage. It also helps in providing high-level protection. With the help of this, a backup is generated automatically which then merges with the primary one afterwards.
Issues: Redundant Cloud Storage devices are mainly the subject for failure and some problems of network connectivity, the controller, few popular hardware failure and even security breaches.
Elastic Disk Provisioning Architecture
Benefits: The main advantage of using this cloud architecture is that the company needs to pay for only the amount of cloud storage it is using and not the rest (Rosado & Bernardino, 2014). This functionality helps the company from the financial perspective as their cost to company would be less.
Issues: Problem with using this architecture is that the companies are given a limited amount of storage that they ask for. If that storage gets used up, they need to ask for extra storage again for which they need to pay extra amount.
Benefits:
The positive side to use the “Cloud Load Balancing” has been that it has been scalable. It has been moreover a global character. The architecture has helped the company through handling every type of traffic spikes. This has been without the compromising that performance. This has been performed by keeping a cloud load balancer. This has helped in auto scaling to meet the needs.
Issues:
There have been various problems that have been required to be considered to implement Cloud Load Balancer such as Infrastructure. This has been done as the main purpose of the cloud load balancer has been for distributing the traffic. The traffic has to be distributed among every server within their infrastructure (Sadiku, Musa & Momoh, 2014). Without proper infrastructure, messages would not get delivered. Bindings have been also another problem since it has dependent over infrastructure and below the bindings. Also there have been various sub parts like BasicHttpBinding and the NetTcpBinding.
Redundant Storage Architecture
The benefits:
There are many benefits of using this cloud architecture as these can monitor and track runtime usage with dynamic fluctuations. It is also useful as the hypervisor can be invoked with the help of dynamically scalable systems which in turn helps in removing virtual server instances (Alqahtanye et al., 2014).
The issues:
It can become very tedious at times and also quite time consuming. When there are multiple requests, one of server will gets full loaded. Here the performance is reduced with the increase in servers.
Benefits:
The benefit to use the architecture has been it helps to store every IT resources in one place. It has been generally utilized for the interface with the backend systems and programs so that resource pool administration can be featured. This has been applied to create instances for the resources of IT (Sanaei et al., 2014).
Issues:
As every framework remains in synchronized mode so if there has been any technical problem generated within the system, and then it turns out to be very difficult to retrieve information from the dedicated pool with resources.
The risks of hybrid cloud with their mitigation processes:
Identifying the risk |
Possible explanation |
Controlling the risk |
IT architectural design |
A hybrid cloud computing has been the very complex kind of cloud computing thatbasically involves all forms of cloud services like the public clouds, private clouds and in premises IT. To build a hybrid cloud computing, it requires great skill as it has to be secure from one end to another end so that the communication becomes secure else anyone can highjack in the middle. |
The only way to control this risk is that it the cloud based architecture needs to build by someone who is quite experienced and has got acquired quite expertise in this field. |
Data Management |
Many companies uses this storage for automation in the their data centers to route data to their tiers but for some reason the data may gets lost in its way and it can be quite problematic. In this way, it puts the company’s data into a greater risk and even more complex when data goes to some non-data center destination. |
The only possible way to mitigate these problems is to make a backup for these data and all the routes should be made secure so that the company can keep a track record of every data and in this way the data will be safe. |
Network Visibility |
The hybrid cloud computing has been generating some problems sue to loss of network visibility. The fact has been that without the perimeter, the risks of the security breaches increase. These are often vulnerable as these are outside the control of any business. |
This can be controlled by applying clear perimeters so that there might not be security breach. Also the company should try to take control of their application as they might get attacked and get corrupted and this might hamper their whole infrastructure. |
Bandwidth and latency |
Access of cloud computing mainly works with the internet connection as without internet connectivity, no work can be performed. Risk of latency for the real time data streams and this can be quite dangerous as this can interfere with company’s own internal network. |
This can be avoided by making the internet available and the company should ask their service providers if they are offering high speed internet connectivity or not because to work with this, internet connectivity is really important for any type of data communication and this ensures un-interrupted data flow. |
- Themalware protection:
With the mechanism of the anti-malware, every servers and systems must be installed. This is because it could help to get the system from breaking down. Even it prevents stealing of the private information. The malware throughout the company should be scanned in all the systems. The malware could harm the systems and cripple the system of network that would input vast economic stress on the organization (Arora, Parashar&Transforming, 2013).
- Network Security:
The safeguarding the network for the external and internal attacks should be done. The network perimeter should be managed. This is because every network has been meant to be monitored fine for every type of access that is unauthorized (Kant & Sharma, 2013). They must also control the malicious content and the protocols of network security that are needed to be effectively maintained.
- Secure Configuration:
By applying the security patches to every application prove useful. This is because with this phenomenon the layout of the network could be kept secure(Arora, Parashar&Transforming, 2013). The application of security patches has been useful in protecting the system or the applications for the latest threats. Thus it helps the organization to upgrade the applications every month to safeguard their system.
- Monitoring:
The organization must monitor all the aspects relevant to cloud services. This is because this has been the state where organizations need to store data. As a result of this, the companies require to have a close look over the networks to watch that anyone has been trying to achieve the intrusion without any permission (Kant & Sharma, 2013). It also includes the checking of viruses, malwares or similar kind of things that could steal data or effectively harm the overall system.
- Incident Management:
Elastic Disk Provisioning Architecture
The organization must create the management system of incident where every incident about the network problems are registered. As the officials of security seek any suspicious thing, they could report that to management (Hashem et al, 2015).. Then required measures could be taken regarding the registered complaint.
There have been various elements for which SoftArc could do a lot of progress in the event that they utilize the Hybrid Cloud System. The first one has been the “Business Continuity” and it could be portrayed as something that it has been not something where all information gets moved down or duplicating the substance over the cloud (Garg, Versteeg and Buyya, 2013). It fundamentally implies that information is as yet public over the cloud. It should be arranged before hand with the goal that working should be possible appropriately. Second has been that there has been greater open door for development that is with hybrid distributed computing, the organization has been getting the most progressive type of cloud computing from where the organization could do their work all the more effectively (Hashem et al, 2015). Furthermore it can have the capacity to store reinforcement if there has been any specialized fault or even because of some catastrophic event. The third one has been the Scalability and this could help the organization by downsizing the particular workloads and actualizing these rules of automation on the cloud. This gives the capacity to scale the resources here and there. It likewise helps in improving the condition that can help for better execution and proficiency.
Remote Server Administration System mechanism helps in providing tools and also provides user interfaces that can be used for the administrators of external cloud resources for configuring and administering IT resources that have been cloud based. The system can help in providing the user console while interfacing with underlying management system with the help of their APIs (Di Spaltro, Polvi & Welliver, 2016). This helps any server to communicate remotely and they can share information.
The Resource Management System can be useful when coordinating with IT resources with response the actions mainly performed by cloud consumers and providers. In the very core of this system lies the Virtual infrastructure manger that helps it in co-coordinating the server and this helps in creating virtual server instances (Bahrami & Singhal, 2015).
It is an administration instrument framework that speaks of a variety of scope of industrially accessible cloud administration items that has been featuring in organization, accumulation, stockpiling and furthermore helps runtime warning of SLA information.
Cloud Load Balancing Architecture
Steps required in moving the present application to AWS cloud:
There have been different strides that have been included in while moving present application to the AWS cloud (Hashizume et al., 2013). There are fundamentally six stages through which it must be gone through:
- Cloud Assessment Phase:While having this stage, the security and the consistence appraisal is being led and furthermore the specialized evaluation is directed. The authorities ought to likewise attempt to recognize the devices that have been need to construct this (Wei et al., 2014). They ought to likewise attempt to move their authorized items and making of an arrangement and measure achievement.
- Proof of Concept Phase:Validating the innovation and ought to attempt to test the current software that has been available within the cloud.
- Data Migration Phase:Understanding distinctive stockpiling alternatives that have been available in AWS cloud. All fileservers ought to be moved to the Amazon S3 and the MySQL to Amazon RDS (Wei et al., 2014).
- Application Migration Phase:Hybrid movement technique is to be made. Making AMIs for each specific part is to be done.
- Leverage the Cloud Phase:Hardening of the security has been must and automat the versatility and SDLC. It ought to likewise use different accessibility zones and ought to contain AWS administrations.
- Optimization Phase:Improving the effectiveness and attempting to actualize propelled advancement and telemetry. It should likewise re-build the application and ought to deteriorate every relational database.
- Identifying the holes that are available in the middle of the current conventional legacy architecture and cutting edge cloud engineering.
- Mitigating the hazard by approving basic pieces for the proposed design.
- They ought to likewise consider the various security issues.
- Considering the location has been additionally critical
- It ought to be future verification
- Should have the capacity to create backup for automated management.
Conclusion
From the report it is understood that the cloud computing has been really significant regarding business standards. This is because the cloud computing share files and communication in a more easy manner. Every file sharing and the communications occur with complete security. This results in the fact that no one could intercept within the middle stages. Moreover the cloud computing results in guaranteeing efficient work has been guaranteed. This is because they have been processing large data. This is done within much less time and t also from numerous systems. There have been various cloud services offering distinct functionalities. They might further try to impose security of the network and the protocols. This would help them in keeping all the files intact and secure.
Reference
Alamri, A., Ansari, W. S., Hassan, M. M., Hossain, M. S., Alelaiwi, A., & Hossain, M. A. (2013). A survey on sensor-cloud: architecture, applications, and approaches. International Journal of Distributed Sensor Networks, 9(2), 917923.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Alqahtany, S., Clarke, N., Furnell, S., & Reich, C. (2014). A forensically-enabled iaas cloud computing architecture.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.
Bahrami, M., & Singhal, M. (2015). The role of cloud computing architecture in big data. In Information granularity, big data, and computational intelligence (pp. 275-295). Springer International Publishing.
Di Spaltro, D., Polvi, A., & Welliver, L. (2016). U.S. Patent No. 9,501,329. Washington, DC: U.S. Patent and Trademark Office.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Kant, D. C., & Sharma, Y. (2013). Enhanced security architecture for cloud data security. International Journal of Advance D Research in Computer Science and Software Engineering, Volume3, (5).
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Othman, M., Madani, S. A., & Khan, S. U. (2014). A survey of mobile cloud computing application models. IEEE Communications Surveys & Tutorials, 16(1), 393-413.
Rosado, T., & Bernardino, J. (2014, July). An overview of openstack architecture. In Proceedings of the 18th International Database Engineering & Applications Symposium (pp. 366-367). ACM.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and challenges. IEEE potentials, 33(1), 34-36.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.