The main purpose of this report is to suggest a suitable cloud architecture framework for SoftArc Engineering based on the requirements. In order to meet the SoftArc board’s strategy, the two proposed cloud architectures are IaaS and PaaS. IaaS or Infrastructure as a Service is a type of architecture that deals with reduction of the usage of hardwares and increased use of the online virtual interface for storage and management of data and information (Garg, Versteeg & Buyya, 2013). The main reason behind choosing this architecture is that it is the most beneficial architecture for those who want to migrate to cloud for storage and management of data. PaaS or Platform as a Service is another important cloud architecture that enables the user to generate a platform for creating and operating a database. This architecture has been chosen so that SoftArc can create an application platform while migrating to the cloud system.
In this report, the case study of SoftArc Engineering has been analyzed and the associated issues have been discussed.
SoftArc Engineering: Cloud Architecture Requirement Analysis
In order to meet the SoftArc board’s strategy, the two proposed cloud architectures are IaaS and PaaS.
Description of the Architectures
IaaS – IaaS or Infrastructure as a Service is a type of architecture that deals with reduction of the usage of hardwares and increased use of the online virtual interface for storage and management of data and information. The main reason behind choosing this architecture is that it is the most beneficial architecture for those who want to migrate to cloud for storage and management of data (Erl, Puttini & Mahmood, 2013). Moreover, this architecture also does not require any data center or hardware maintenance.
PaaS – PaaS or Platform as a Service is another important cloud architecture that enables the user to generate a platform for creating and operating a database. In other words, PaaS acts as a middleware that a user can use to build an application platform for migrating from hardware to online cloud computing systems (Jadeja & Modi, 2012). This architecture has been chosen so that SoftArc can create an application platform while migrating to the cloud system.
Benefits and Issues of the Chosen Architectures
Benefits of IaaS – With the aid of IaaS, full control of the virtual machine can be provided to the user. Moreover, the customer is also able to run any application on the virtual machine having full control over the virtual machine processing.
Issues of IaaS – The main issue with IaaS is that it is extremely expensive. Moreover, since the user has the full control of the virtual machine, the user himself is responsible for keeping backups and maintaining the system (Li et al., 2013). Finally, in spite of full control over the virtual machine, the user cannot have any control over the server that is used with the system.
Benefits of PaaS – The main advantage of PaaS is that it is less expensive than IaaS and as a result, it complements IaaS perfectly when implemented together. Moreover, the user can have complete control over the data processing and software access.
Issues of PaaS – The main issue of PaaS is that the user cannot have any control over the platform. Moreover, management operations using PaaS can become significantly time consuming, thus reducing the cost benefit of the PaaS architecture.
Risks with Hybrid Cloud Strategy
There are several risks associated with the hybrid cloud strategy adopted by SoftArc. These are discussed as follows.
Loss of Control – Hybrid cloud users often face the issue of loss of control over the architecture and as a result, it negatively affects the operations of the users (Younis & Kifayat, 2013). During the use of a hybrid cloud architecture, the tools used for operations are all cloud based, the changes made inside the applications and the softwares are all possible from the service provider’s side. Hence, the user may not have any control over the software changes.
Cloud Security – Another major risk associated with the hybrid cloud is the cloud security. The main threat of hybrid cloud is the cyber attack that can easily deploy rogue files inside the cloud system and steal confidential information from it (Manvi & Shyam, 2014). Moreover, cloud security risks can also arise from the poorly developed service level agreements, poor security control measures and others.
Compliance Issues – Another major risk associated with the hybrid cloud architecture is the compliance issue. Since cloud computing has major unsolved issues related to security, the organizations who implement cloud computing system must comply with some specific guidelines and regulations in order to make the cloud environment secure (Zissis & Lekkas, 2012). However, the hybrid cloud architecture may not comply with all the industrial standard regulations and are maybe deemed unsuitable for use in the organization.
Security Steps and Controls for the Hybrid Cloud
The security issues talked about in the past header can be alleviated utilizing a few safety efforts. In any case, it is to be remembered that most ideal security control measures must be utilized after a point by point investigation of the issues, the instruments and the merchants. Besides, some detailed examination should likewise be led on the conceivable impacts of the security steps on the hybrid cloud system. A security control measures are as per the following:
Utilization of Anti-Virus Software – This product is very helpful in warding off interior and additionally outside assaults on framework security and approved zones. These virtual products, if connected legitimately, can give phenomenal security to the association frameworks. In addition, these virtual products can be utilized as an extra insurance layer to the cloud servers that are to a great degree helpless against security dangers (Manvi & Shyam, 2014). Another vital certainty is that these virtual products are extremely effective in erasing malevolent programming projects and malware documents that undermine to hurt the framework.
Utilization of inherent framework firewall – The frameworks ought to be furnished with characteristic firewall framework. This is to guarantee the natural invulnerability arrangement of the PC works legitimately to enhance the essential security framework. Characteristic firewall of a framework fortifies the fundamental security handle given by the framework to security dangers (Zissis & Lekkas, 2012). This framework is particularly useful in instances of inward framework dangers like malwares and nearby infection documents. In addition, these firewalls spare vital records from erasure amid framework mistakes.
Cloud Security – This is to guarantee the security of the hybrid cloud server that is facilitated by the association. Cloud servers are to a great degree helpless against security dangers like digital assaults and privacy breach attacks. Subsequently, a cloud security server must be introduced in the framework with a specific end goal to ensure the records and reports put away in the server.
Business Continuity Planning
Since the Private Cloud is a kind of selective framework, the value structure for such administrations will be on the higher side. This being the situation, to decrease costs, non-basic applications are for the most part not facilitated in such an expensive domain. Such non-basic application and information can be put away on the Public Cloud (Manvi & Shyam, 2014). While the Public Cloud might be less secure, yet that does not imply that anybody can hack into the framework effectively. The Public Cloud too will approach controls and most cloud specialist co-ops utilize a two phase get to framework for confirmation of the client.
With such a variety of information breaks occurring, securing information is the prime worry of IT Managers. The Private Cloud specialist organization additionally scrambles information and alongside Passwords and so on a very reliable security situation can be made. Information can be exchanged from behind the firewall of the customer's server straightforwardly to the Private Cloud, which give another layer of included security.
The hybrid cloud joins the benefits of a Private and Public Cloud. Associations utilizing a Hybrid Cloud utilize the Private segment of the cloud for mission-basic applications and for less basic applications they utilize the Public Cloud (Zissis & Lekkas, 2012). The upside of utilizing such a blend is the Private Cloud gives upgraded security while the Public Cloud brings down the cost of the Business Continuity arrangement.
Requirements for RSA, RM and SLA Management
Virtualization is not required for remote server administration, but rather it is assuming an imperative part into what's to come. Server solidification decreases the quantity of physical boxes, which facilitates the time and exertion spent overseeing them. SoftArc can choose bigger and all the more effective servers fit for facilitating more VMs than an expansive number of fundamental "ware" boxes, ordinarily bringing about more productive spending. The greatest test is overseeing figuring assets and information assurance forms as new VMs multiply crosswise over server farms.
The SLA ought to go about as a guide for taking care of potential issues. SoftArc necessities to take a gander at the SLA as an instrument for securing the soundness of the administration, ensuring the benefits of the organization and limiting the cost ought to intense activities be required (Younis & Kifayat, 2013). For instance, changing specialist organizations and fixing the agreements set up, ought to be a final resort; it is an extremely costly and excruciating arrangement. In any case, it should be canvassed in the SLA so that both sides can withdraw a claim.
One of the central parts of virtualization innovations utilized in Cloud conditions is asset union and administration. While this enhances the circumstance, it regularly is lacking. Extensive Cloud organizations require a huge number of physical machines and megawatts of energy. Utilizing hypervisors inside a bunch situation takes into account various independent physical machines to be combined to a virtualized domain, subsequently requiring less physical assets than at any other time (Manvi & Shyam, 2014). Subsequently, there is a need to make a productive Cloud processing framework that uses the qualities of the Cloud while limiting its vitality impression.
Migration from Microsoft SQL to Amazon AWS
The migration steps from Microsoft SQL to Amazon AWS along with the critical points to be considered are discussed below.
Ensured Uptime: 99% of accessibility can be ensured by the IaaS if 100% uptime is provided, as observed by the Service Level Agreement (SLA).
Dynamic Infrastructure Scaling: The shifting from SQL to Amazon AWS will guarantee the user very dynamic infrastructure scaling (Nathani et al., 2012). Due to this, the organization can be ensured with sufficient capacity for further data innovation resources.
Administrations Automation: The migration process will also help in the automation of the administrative operations like management of virtual servers for clients and employees, network operations and administrations and others (Younis & Kifayat, 2013).
Managerial Process Automation: Managerial operations can also be automated by the migration from SQL to Cloud. In other words, the managerial processes like monitoring and control through the managerial server can be done automatically using the migration to the cloud.
Hence, migration from Microsoft SQL to Amazon AWS will definitely be beneficial for the company.
In this report, the case study of SoftArc Engineering has been analyzed and the associated issues have been discussed. In order to meet the SoftArc board’s strategy, the two proposed cloud architectures are IaaS and PaaS. Hybrid cloud users often face the issue of loss of control over the architecture and as a result, it negatively affects the operations of the users. During the use of a hybrid cloud architecture, the tools used for operations are all cloud based, the changes made inside the applications and the softwares are all possible from the service provider’s side. Another major risk associated with the hybrid cloud is the cloud security. The main threat of hybrid cloud is the cyber attack that can easily deploy rogue files inside the cloud system and steal confidential information from it. Moreover, cloud security risks can also arise from the poorly developed service level agreements, poor security control measures and others. Hence, SoftArc needs to solve these issues before complete implementation of the hybrid cloud system.
Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems, 28(5), 755-768.
Bruneo, D. (2014). A stochastic model to investigate data center performance and QoS in IaaS cloud computing systems. Parallel and Distributed Systems, IEEE Transactions on, 25(3), 560-569.
Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: concepts, technology, & architecture. Pearson Education.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Ghosh, R., Longo, F., Naik, V. K., & Trivedi, K. S. (2013). Modeling and performance analysis of large scale iaas clouds. Future Generation Computer Systems, 29(5), 1216-1234.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880). IEEE.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. Parallel and Distributed Systems, IEEE Transactions on, 24(1), 131-143.
Malawski, M., Juve, G., Deelman, E., & Nabrzyski, J. (2012, November). Cost-and deadline-constrained provisioning for scientific workflow ensembles in iaas clouds. In Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis (p. 22). IEEE Computer Society Press.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.
Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2012). IaaS cloud architecture: From virtualized datacenters to federated cloud infrastructures.Computer, (12), 65-72.
Nathani, A., Chaudhary, S., & Somani, G. (2012). Policy based resource allocation in IaaS cloud. Future Generation Computer Systems, 28(1), 94-103.
Qiu, M., Li, J., Ming, Z., Quan, G., Qin, X., & Gu, Z. (2012). Online optimization for scheduling preemptable tasks on IaaS cloud systems.Journal of Parallel and Distributed Computing, 72(5), 666-677.
Younis, M. Y. A., & Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.