Discuss about the Security And Securing Website Communication.
Preparation of the migration and the business plan:
In this phase the determination of the objectives for the migration to the AWS is prepared. In order to develop the business cases for the migration the primary business experience is required (Cretella & Di Martino, 2014). The effective business plan for the migration of the cloud is dependent on the planner’s perception and the past experience about the use of cloud vendors. The details about the AWS is needed to be known along with the detailed analysis of their partners such as Atadata, cloudamize and RISC networks.
Planning and discovery of the portfolio:
The planning and managing the portfolio help in discovering the dependencies between the different applications (Pouzin & Yip, 2017). The planning also indicates the right strategy for the migration of the cloud which will help to meet all the organizational requirements. The discovery of the portfolio and the migration approach will help to build the full business case. In this case the use of AWS application discovery service can be helpful.
Designing of the migration , migration and application validation:
In this phase the design of the implementation is drawn from the business plan. The main focus of this stage is on the individual application level and the designing of the migration and validating the migration (Nadon, 2017). The migration , designing and the validation is done on the basis of six application strategies known as 6 R’s (Jain & Mahajan, 2017). After gaining some experience from the migration of the few application the full overview can be achieved to accelerate the migration process for reaching the desired level or goals (Ngnie Sighom, Zhang & You, 2017). In this context partners of the AWS such as CloudVelox, Atadata can help to make the decisions along with the ‘AWS Server Migration Service’ and ‘AWS Database Migration Service’.
Operate and optimization:
The migration of the application is followed by the turning off the old system. This helps to iterate the old system towards the new operating system (Sarker& Tang,2015). The newly implemented system will deliver the sustainable and better management of the functionality in the organization (Cretella & Di Martino, 2014). The routine monitoring and evaluation of the performance is done accordingly.
Critical points and issues occurring in each steps:
Security: The security is the main issue in the implementation of the migration of the cloud. The security of the hybrid cloud is partially maintained by the third party cloud provider. The public cloud is maintained by the cloud vendor for the Regional Gardens. There can be problem regarding the security of the maintaining the security of the public cloud (Cretella & Di Martino, 2014). In case, if there is a lack of security occurs from the vendor’s side, the Regional Garden can lose many important information, which is not desirable.
Technical problems from the vendor’s side: There can be technical problem from the vendor’s side (Cretella & Di Martino, 2014). This can cause the organization to face the problems while accessing the data from the public cloud (Nadon,2017). Another issue can be raise regarding the compatibility of the services. In order to eliminate these problems the selection of the right clod providing vendor is needed.
Technical integration: The Regional Gardens is adopting the use of the hybrid cloud. The hybrid cloud consists of both public cloud and private cloud (Syed et al., 2015). The managing two different clod structure is a complex thing for the organization who is adopting the cloud architecture for the first time.
Accessing the system : There can be a problem for the employees of the organization to access the system as the whole system is new to them(Cretella & Di Martino, 2014). The error in the handling of the important component of the cloud can cause the leak of the confidential information and the loss of information.
The reason for referring those reasons as the critical reasons:
The above mentioned factors can be regarded as the critical issues as these have their impacts on the performance and maintaining the security of the whole system. The security of the system ensures that the data of the client is secured (Hwang,Vukovic & Anerousis, 2016). The violation of the security will lead to the loss of data and confidential information. There is another factor which determines the efficiency of the cloud. The cloud service should be available for any time of the day. The technical integration enables the possibility of the availability of the cloud computing. It also ensures the structure of the cloud is meeting all the requirements of the clients (Nadon, 2017). The technical problems from the vendor’s side will create a problem for the client while accessing the data from the cloud. This can cause the wastage of time and resources from both client and the vendor side. The employees of the Regional Gardens are habituated in using the conventional system for storing the data. The managing of the data and information using the cloud will apparently new for them. In this case, there is a chance of human error. In case, if the mistakes are made while handling the cloud system while managing the data, there is chance of data loss and the confidentiality of the information from the private cloud server may be violated (Cretella & Di Martino, 2014). However, the security of the private cloud can be managed by the organization itself or the third party cloud provider. The decision about the maintenance of the security of the private cloud of the organization can be decided after the discussion with the managers and the stakeholders of the company(Cretella & Di Martino, 2014). However, in order to provide the proper handling and managing the data through the cloud architecture, the employees of the company are needed to be trained with the architecture of the cloud used in the organization.
Cretella, G., & Di Martino, B. (2014). An Overview of Approaches for the Migration of Applications to the Cloud. In Smart Organizations and Smart Artifacts (pp. 67-75). Springer, Cham.
Hwang, J., Vukovic, M., & Anerousis, N. (2016, October). FitScale: scalability of legacy applications through migration to cloud. In International Conference on Service-Oriented Computing (pp. 123-139). Springer, Cham.
Jain, A., & Mahajan, N. (2017). DB Migration to the Cloud. In The Cloud DBA-Oracle (pp. 99-137). Apress, Berkeley, CA.
Nadon, J. (2017). AWS Enterprise Applications. In Website Hosting and Migration with Amazon Web Services (pp. 235-249). Apress, Berkeley, CA.
Nadon, J. (2017). AWS Security and Securing Website Communication. In Website Hosting and Migration with Amazon Web Services (pp. 225-233). Apress, Berkeley, CA.
Nadon, J. (2017). Static and Dynamic Storage Options in AWS. In Website Hosting and Migration with Amazon Web Services (pp. 117-125). Apress, Berkeley, CA.
Ngnie Sighom, J. R., Zhang, P., & You, L. (2017). Security Enhancement for Data Migration in the Cloud. Future Internet, 9(3), 23.
Pouzin, D. J., & Yip, G. (2017). U.S. Patent No. 9,729,488. Washington, DC: U.S. Patent and Trademark Office.
Sarker, T. K., & Tang, M. (2015, November). A penalty-based genetic algorithm for the migration cost-aware virtual machine placement problem in cloud data centers. In International Conference on Neural Information Processing (pp. 161-169). Springer, Cham.
Syed, T. A., Musa, S., Rahman, A., & Jan, S. (2015, April). Towards secure instance migration in the cloud. In Cloud Computing (ICCC), 2015 International Conference on (pp. 1-6). IEEE.