Thursday, December 12, 2019

Cloud Computing Implementation - Management - and Security - Solution

Question: Discuss about the Cloud Computing for Implementation, Management, and Security. Answer: Introduction As it can be seen that the cloud services have been getting popular day-by-day so with the technological advancements, there has been a major growth in the field of the information system business industry. The study is based on focusing over the cloud based data with the payroll systems for the protection of the Child. This brings a complete efficiency to the exchanging in data along with properly managing and addressing the payroll system. The report clearly displays the deployment modules with the cloud system for the Child Protection with the major impact on the employees. Cloud delivery models for the Child Protection This includes the delivery as well as the deployment modules which are important for the Child Protection Organisation. Hence, some of them are: The Public Cloud model which is able to properly deliver appropriate services which are important to set the open network which has been for the different purpose. There is a private cloud network model that has been set for handling the services so that the IT department can easily be handled through the protection of the firewall settings. (Mell et al., 2011). The hybrid cloud has been used for the on premises with the private cloud and the third party public cloud services which have been used for the mixture of the on-premises services. There is a community cloud which is mainly to handle the hosts of the cloud which are for a proper mutual setup in the organisation. With the cloud services, there has been identification which is based on the Hybrid loud module that is able to deliver the best system of cloud for the child protection organisation. Hence, the implementation part of the hybrid cloud system is mainly based on handling the efficiency with the proper exchange of the data with the payroll of the system where: There has been a cost saving method for the hybrid based services of the cloud which is able to provide the facilities that the Child Protection Organisation has not been able to purchase the software and the hardware sets. The connectivity of the internet set to handle and direct towards a proper backup of the software for the complete system. (Rittinghouse et al., 2016). The upgradation of the facilities is for the Child Protection Organisation with the focus on handling the applications which are based on the system of cloud along with the proper designs that are set with the connectivity of the Internet. The convenience options are based on the hybrid cloud based systems which are easy for handling the operations with the proper internet connectivity based applications. (Sookhak et al., 2015). The security is for the hybrid based cloud systems where there has been no major loss that has been done to the data. Hence, all the users are able to back up the data in the cloud. Impact of the delivery and deployment As per the observation, there has been different impacts where staffing is considered as the important aspect for the same. There have been positive impacts for the cloud delivery and deployment which includes: the cloud computing and help the employees to learn the different aspects which are related to the job. The hybrid cloud based system is based on handling the complexities with the proper deal with the knowledge of the employees. This is only possible through the cloud based deployment model. (Bhaskar et al., 2016). Certain negative facts for the cloud delivery model are set where: the employees are reluctant for the change and aspect a proper productivity along with the better and the new complex structure. This includes the communication system that has been improvised with the complete clear conventional pattern. Cost Billing Data Exchange of the Companies AMAZON IBM BLUEMIX RECURLY Service Model PaaS IaaS PaaS IaaS SaaS PaaS Server OS Linux, Windows Linux, Windows Linux, Windows Deployment Model Public Private Public Private Public Private Operating Price 1 TB data for 0.03AUD dollar per month For the next it reduces to 0.029 AUD For the start up, it has 256 MB which is free For the medium and the large enterprise, there is 800MB-1GB data with the cost of 130 AUD to 150 AUD For the small business plans there has been 1.25% of the revenue with 0.1 AUD The enterprise planning has been at 1.25% with the core plans set for 99 USD and the professional for 2.99.00 USD. Payroll System Firehost Azure CloudSigma Features This holds the staff with the automatic payment and the records management The staff is seen to get the pay automatically and the record staff management. Staff paid automatic with the records and staff management. Interfacing MYOB with the Microsoft The workflow and Sherpa MYOB, Xero etc. Pricing There has been small business for the 0.03 AUD which varies to 0.9 AUD for the larger business. There have been services of the App for 0.2 AUD and the other virtual machine for the 11 AUD The core of CPU has been for the 0.012AUD with the 1GB RAM The data transfer for this is 0.04 AUD for 1 GB. Information Security Feature This is based on handling the security perspectives which are able to handle: The security benefits which are related to handling the scale along with other security measures. The use of the different defensive measures is important for the proper filtering and the improvement set for the hardware system setups. The security providers are considered for the marketing differentiator where the operations are conducted at the higher priority with the focus on the aspects to hold the version of the services. (Hashem et al., 2015). The effective updates and the information is through the competitive market which includes the sustainability of the services with the IaaS service that will be able to update the facility of the system. (Li et al., 2015). There is a need to check on the flexibility and the scalability patterns which include the efficient and satisfy the regulatory requirements for the handling of the data. This has been effective to access the organisations which are based on the functions of the business with the keeping of all the sensitive operations in a secured manner. Conclusion The organisation need to focus on handling the entire scenario for the Child Protection. There is different technology for the cloud computing that can be used for the handling of the system and the exchange of the data. The data and the deployment modules are mainly for the organisations which emphasize mainly on the price patterns along with handling the system requirements as well as the cloud based structures. (Zhang et al., 2016). Through this, there is also a possibility of the reasonable service which has been set with the other service delivery. Reference Mell, P., Grance, T. (2011). The NIST definition of cloud computing. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Bhaskar, R., Shylaja, B. S. (2016). KNOWLEDGE Based Reduction TECHNIQUE for VIRTUAL MACHINE PROVISIONING IN CLOUD COMPUTING.International Journal of Computer Science and Information Security,14(7), 472. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Li, W., Zhao, Y., Lu, S., Chen, D. (2015). Mechanisms and challenges on mobility-augmented service provisioning for mobile cloud computing.IEEE Communications Magazine,53(3), 89-97. Zhang, H., Jiang, H., Li, B., Liu, F., Vasilakos, A. V., Liu, J. (2016). A framework for truthful online auctions in cloud computing with heterogeneous user demands.IEEE Transactions on Computers,65(3), 805-818. Li, J., Li, J., Chen, X., Jia, C., Lou, W. (2015). Identity-based encryption with outsourced revocation in cloud computing.Ieee Transactions on computers,64(2), 425-437. Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S. U., Buyya, R., Zomaya, A. Y. (2015). Remote data auditing in cloud computing environments: A survey, taxonomy, and open issues.ACM Computing Surveys (CSUR),47(4), 65.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.