Monday, December 9, 2019

Storage And Computation In Cloud Computing â€Myassignmenthelp.Com

Question: Discuss About The Storage And Computation In Cloud Computing? Answer: Introducation A recognized and renowned regional retailer of Australia is the Webbs Stores. The main business of this company is to sell food items. It also sells some of the specialty stuffs. The company has two original data centers (Arora, Parashar Transforming, 2013). They are in Sydney and Melbourne. Apart from these two main data centers, the company even has some of the regional data centers in Brisbane, Bathurst, Port Macquarie, Auckland and Wagga. Recently, they have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. Webbs Stores have taken a decision of undertaking cloud computing for their business. The problem with this decision is that the data management, the operational and application complexities have become much complicated and they are not able to handle them. They have even decided to close down the regional data center in Auckland because of its traditional infrastructure (Avram, 2014). They could have easily replaced or updated its existing infrastru cture. All the services and the important data are shifted to the cloud database. A Risk and Security Workshop is planned to run for accessing the security risks, threats and the possible control methods, which are need for a hybrid cloud. The following report covers a detailed discussion on the Webbs Stores case study. The report also briefs about the benefits of data migration to cloud IaaS infrastructure. The threats of data migration to cloud are also provided in the report. The report even describes the use of cloud in case of removal and backup of the records. The report further helps to understand how to protect and control the access to the data and services for migration of data. Proper suggestions and recommendations are given in the following report. Type of Security Deployed Webbs Stores have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. They are worried about the security of their data and services. The type of security policy that should be deployed is the authentication and authorization policy (Dinh et al., 2013). Authorization is the permission given to a particular organization or individual for performing a task or job. Authentication is the process of verification of the identity of an individual, who will be performing a task. This security policy is extremely important in case of cloud computing as it provides permission and sanctions the activity to be performed. The open normative format of data, used for authentication purpose in cloud is the SAML or Security Assertion Markup Language (Garg, Versteeg Buyya, 2013). Webbs stores is moving their data to IaaS instance. The best IaaS instances the Microsoft Azure and AWS. The data moved to cloud is bulk in quantity. This type of policy would be helpful for them for protection of their data and services during migration. Benefits and Issues of Deployment The type of data security policy Webb should take is the authentication and authorization. Various advantages will be obtained by them due to this deployment. The benefits are as follows: i) Security: The first and the foremost thing that comes in mind during data migration is the security. Cloud computing provides excess security for transferring data (Fernando, Loke Rahayu, 2013). Moreover, authorization and authentication policy enables only the sanctioned and authorized users for accessing data or service. ii) Cost Effective: Cloud computing is extremely cost effective and does not incur much cost. This type of policy can be easily maintained with lower price. iii) Flexibility: This is again an important benefit that can be obtained by this security policy (Rahimi et al., 2014). The whole system turns out to be flexible after deployment. iv) Scalability: Authentication and authorization makes the database extremely scalable. The advantages of this security policy do make it popular enough to be accepted by several organizations (Arora, Parashar Transforming, 2013). However, it does have few disadvantages. The problems that can be faced after the deployment are as follows: i) Encryption: Encoding any message is a must for authentication and authorization policy. This can be an issue as there always exists a chance of losing the encryption key. ii) Complexity: this is another issue that is normally faced after deployment of this policy (Malawski et al., 2015). The implementation of this policy is complex in nature. iii) Brute Force Attacks: The most common attack that is faced due to this type of policy is the brute force attack. The hacker or intruder gets the password by a software and is able to get all the data. iv) Storage: The storage of usernames and passwords are hacked easily, the moment they are authenticated. Security risks are extremely common for migration of data. Webbs Stores will be migrating the data and services to cloud from MS SQL Server R2 database to IaaS instance (Botta et al., 2016). This new database can have various risks. The threats that are common for database are as follows: i) Loss of Data: This is the most significant threat for migration of data. The data can be lost when it is transferred to another database (Li et al., 2013). Moreover, there is a chance that the data cannot be recovered, which is extremely harmful for the company. ii) Database Corruption: This is the second most significant risk during data migration. The entire database can get corrupted and cannot be recovered. The IaaS Infrastructure Threats and risks are also common for the infrastructure of the cloud, which is the IaaS. The threats are as follows: i) Denial of Service Attacks: This is the most significant threat that occurs in the infrastructure during data migration. When a user uses the resources of the cloud, the overall quality of the services that are used by other users, gets degraded (Almorsy, Grundy Mller, 2016). The intruders utilize this opportunity and get all the resources for denying or slowing down the services. The attack is known as the denial of service or DoS attack. ii) Insider Threats: During migration of data, the infrastructure enables the administrator for accessing the data and the database. This type of risk is known as the insider threat. The Communications The communications between the IaaS instance and Webbs Stores can attract various threats and risks. The risks are as follows: i) Breaching of Data: Breaching of data is extremely common when migration is done (Li et al., 2013). The moment IaaS and Webbs Stores communicates with each other, this type of risk occurs. ii) Incompatible Database: The second most significant threat is the incompatibility of database. It must be compatible to avoid all types of threats while communication. Risks with Backup of Data i) Backup: Periodical backup is extremely needed for any company. Although, there are some risks that are common during the backup of data (Malawski et al., 2015). The risks are as follows: Security: Lack of security can be vulnerable during backup of data. Often data is lost during this backup. Control over Data: During backup of data, the cloud provider obtains the total control and access of the data. There is always a chance that the data can be intercepted. ii) Storing of Data: Data is normally stored in the cloud storage. Webbs stores might face various threats during this storage of data (Xiao, Song Chen, 2013). They are as follows: Security: Security is the most significant threat during data storing. Often data is lost during this phenomenon. Lack of Standardization: The cloud vendor never follow a normal set of protocols or rules for supporting their business (Xiao, Song Chen, 2013). The selection of the vendors should be done carefully by Webbs Stores. iii) Data Retrieval: Several risks are even common during retrieval of data. They are as follows: Snooping: The intruder can always snoop into the data, the moment it is retrieved from the cloud (Almorsy, Grundy Mller, 2016). This is extremely dangerous for confidential data. Leakage of Data: Leakage of data is the most significant risk during data retrieval. Webbs Stores should be careful during their retrieval especially because they are using public cloud. Cloud Backup in DR Plans Cloud DR Plan or disaster recovery is a strategy for any type of backup and recovery of data that is utilized for storing and maintaining of records (Whaiduzzaman et al., 2014). These are stored for security issues. The most important task is done by the cloud backup. The DR plan will simplify the overall procedure of data migration. Only the storage is needed to be transferred. This will in case migrate the entire the data with that particular storage (Xiao, Song Chen, 2013). The benefit that Webbs Stores will be getting is that the entire data will have a copy that is sent to the offsite server by a public network. The major benefit of backup and restore strategy is the easy and simple backing up of data. The whole system of the database of Webbs Stores will be altered with this strategy (Rahimi et al., 2014). The second benefit is that if any data is lost during migration, it can be quickly and easily recovered. Therefore, the cloud recovery plan is extremely helpful for Webbs Stores. Protection of Access and Recommendations Access is the most important security factor. Everyone should not have the access to all the data and services. The authorized and authenticated users should be allowed to access the data and services of Webbs Stores. IaaS Infrastructure The IaaS infrastructure should not be accessed by everyone. Two significant methods are mentioned below for protection of access to the IaaS infrastructure. They are as follows: i) Physical Access to Infrastructure: The physical access should be protected and secured so that there exists no loopholes in the security (Wei et al., 2014). This will prevent the unauthorized users to access the infrastructure and thus it can be protected. ii) Access via API: Unauthorized use of API should be stopped and mitigated for Webbs Stores (Sanaei et al., 2014). It is recommended that they should check and stop this type of access on an immediate basis. MS SQL Server 2012 R2 Cloud Instance The overall access to the previous database, which is the MS SQL Server 2012 R2 can be protected by some methods (Rahimi et al., 2014). Two suggested methods are as follows: i) Physical Access: The physical access should be protected and secured so that there exists no loopholes in the security of the components of hardware and server. ii) Operating system Access: Webbs Stores should be strict about their access to the operating system (Rittinghouse Ransome, 2016). Firewalls might protect their operating system easily. Cloud Network Infrastructure Webbs Stores should protect and control their access to the cloud network infrastructure. Two recommendations are provided for controlling the access to the cloud network infrastructure. They are as follows: i) External and Internal Threats: Cloud network infrastructure always have the risk from external and internal threats (Sanaei et al., 2014). Webbs stores should be careful about their security of cloud network infrastructure. ii) Server Monitoring: Webbs Stores should monitor their server regularly so that the access is controlled (Tao et al., 2014). This can protect the access of the cloud network infrastructure. Cloud Backup and Restore Infrastructure Webbs Stores should protect and control the access of the backup and restoration infrastructure. Two suggestions that can help Webbs Stores in this phenomenon are as follows: i) Encryption: Encryption is the procedure of hiding a confidential data or information in such a way so that it does not get stolen by intruder (Hashem et al., 2015). It encrypts the data into a cipher text and only the authorized receiver is able to access that data. Webbs Stores should opt for encryption for protection of access to the backup and restore infrastructure. ii) Passwords: Passwords can protect any system from hackers and intruders. Webbs Stores should protect their cloud backup and restore infrastructure by applying password protection to it (Botta et al., 2016). It is recommended that the password should be biometric authenticated. The above mentioned recommendations will be extremely helpful for the Board of Webbs Stores for migration of data. Conclusion Therefore, from the above report it can concluded that, a recognized and renowned regional retailer of Australia is the Webbs Stores. The main business of this company is to sell food items. It also sells some of the specialty stuffs. The company has two original data centers. They are in Sydney and Melbourne. Apart from these two main data centers, the company even has some of the regional data centers in Brisbane, Bathurst, Port Macquarie, Auckland and Wagga. Recently, they have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. Webbs Stores have taken a decision of undertaking cloud computing for their business. The problem with this decision is that the data management, the operational and application complexities have become much complicated and they are not able to handle them. They have even decided to close down the regional data center in Auckland because of its traditional infrastructure. They could have easily replaced or updated its existing infra structure. All the services and the important data are shifted to the cloud database. A Risk and Security Workshop is planned to run for accessing the security risks, threats and the possible control methods, which are need for a hybrid cloud. The above report covers a detailed discussion on the Webbs Stores case study. The report also briefs about the benefits of data migration to cloud IaaS infrastructure. The type of security policy that should be deployed is the authentication and authorization policy. The various threats of data migration to cloud are also provided in the report. The report even describes the use of cloud in case of removal and backup of the records. The report further helps to understand how to protect and control the access to the data and services for migration of data. Proper suggestions and recommendations are given in the following report. Migration of data from MS SQL Server R2 database to any IaaS instance would be extremely helpful for the company. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Malawski, M., Juve, G., Deelman, E., Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds.Future Generation Computer Systems,48, 1-18. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications,19(2), 133-143. RittinghouType of Security Deployedent, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344. Xiao, Z., Song, W., Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment.IEEE transactions on parallel and distributed systems,24(6), 11

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.