final computer arch word
final computer arch word
Date :
NAME : HARSHITHA GORREPATI
INSTRUCTOR NAME: JIANGJIANG LIU
1
SURVEY ON CLOUD AND DATA CENTER
ARCHITECTURE
Abstract— Today, the research outlines the evolving scenarios associated with cloud computing and
data center architectures. Initial explanations set the further chapters towards virtualization,
containerization, hybrid strategy, multi-cloud, edge, and sustainable green data centers to ensure an
efficient, safe, and scalable infrastructure is being offered for the growing demands of today's
businesses. We consider best practices regarding resource management and network optimization,
including disaster recovery approaches. This survey provides insight into what the future holds for
cloud and data center architecture, and how it is going to impact digital transformation by looking
through the advances of the industry and the up-and-coming emergence of innovations.
Keywords— Cloud Computing, Data Center Architecture, Virtualization, Edge Computing, Hybrid
Cloud
I. INTRODUCTION
Cloud computing and data-centre architectures are radically changing the way in
which businesses store, process, and manage data. Such cloud-based or hybrid
environments are being adopted with the increasing demands for scalable and
cost-effective solutions and are being driven by the need for agility, efficiency,
security, and sustainability.
The current scenario of cloud and data centre architecture is made clear through
this survey. The forecast for sustained growth in cloud and data centre
architecture explores the main trends, best practices, and new breakthroughs. The
2
purpose of this overview of such developments in the industry is twofold: it will
assist in understanding the digital infrastructure of the future and it will identify
ways businesses can set up that use this technology to operate smartly and build
resilience.
II.
As cloud computation and data centers design have gained much work, work on
many aspects such as elasticity, security, energy efficiency, future technologies
like Edge Computing have all made conto the modern growth of the
3
2. Data Center Architecture and Optimization:
Due to the increase in cloud service demand, data center architectures have
evolved. Other studies, such as Barroso et al. (2013), investigated hyperscale
data centers and analyzed various energy-efficient designs. The shift toward
software-defined data centers (SDDC) has been a primary focus such that Kreutz
et al. (2015) explored Software-Defined Networking (SDN) and its contribution
to scalability and automation in modern data centers.
Hybrid and multi-cloud strategies are fast becoming the trend for enterprises
looking into hybrid architecture for resource provisioning and gaining in
flexibility and strength regarding security levels. A study by Botta et al. (2016)
shows how hybrid cloud architectures actually improve resource usage and help
in complying with data regulations. Pahl et al. (2017) had also done an extensive
review of multi-cloud deployment models and argue on the point of avoiding
vendor lock-in and increasing resilience.
With the widening of IoT and the need for real-time processing, Edge computing
has been the talk of the town. Edge Computing, according to Shi et al. (2016), is
anything from combined cloud computing-it reduces latency and enhances real-
time decision-making. Satyanarayana et al. (2017) worked further in how edge
computing supports autonomous systems, AI applications, and 5G networks.
4
in cloud computing while Gao et al. (2019) discussed the effect of AI-driven
cooling techniques to reduce energy waste in data centers.
A. The Overall Work Flow Chart of the Distributed Data Centre is Shown
in Figure:
5
C. Live datacenters of a business double active:
Primaries and Active: This is meant for services Primary published based
on domain name. The highest level(double-active), is the primary double-
active for dual-active data center construction which enables us of the
highest degree compute utilization as well as business continuity as well.
So many industries started to re-engineer their business systems and
converted from the traditional IP address based on IP to domain name.
6
For the application-level disaster recovery data center, choose varying
deployment models depending on the character of the service release. In
whatever deployment mode the selection is, it needs to be evaluated from both
Internet network and service traffic perspectives prior to their deployment. The
concentrated load of data presents technical challenges to the information
system. With the pervasive increase in structured and unstructured data, data
storage has enormous structural variations and extreme heterogeneity.
Individuals are demanding more and more services for information systems, and
the availability needs of most fundamental services are 99.999%. But existing
disaster recovery technologies face many technical challenges like recovery
difficulty, recovery complexity, long recovery duration, and low recovery
efficiency when there is a huge amount of structured data and unstructured data.
For instance, the protection mechanism of data storage is not optimal.
Establish a hybrid cloud testbed between OpenStack (private cloud) and AWS
(public cloud). Design a a workload balancer considering the cost, performance
and security of the deployment and selecting the appropriate site for the
workload. Employing multi-cloud orchestration through Kubernetes to allow
seamless and headache-free cloud provider switching.
Insert the edge iterables into iFogSim for near-source time-critical task
execution. Develop an edge-cloud co-existence model whose workload can be
transferred on-the-fly based on the dynamic network condition caused by the
7
network congestion and the network performance. Research Internet of Things
(IoT) applications including smart surveillance and real-time vehicular traffic
monitoring.
Cloud and data center architectures are extensively applied across industries owing to their scalability,
efficiency, and cost-effectiveness. Some of the notable applications are as
follows:
9
6. Financial Services & Banking
Cloud-based fraud detection systems and high-frequency trading
platforms.Secure online banking and digital payment processing (e.g., PayPal,
Stripe).
10
correct resources to authorized users is an important aspect of this security
control. The users should be identified by key management and passwords.
Cloud providers should also provide access controls to users, so that they
can give rights to other authorized users. Compliance models: STIG ,
FedRAMP , Oauth and NIST 800–63. NIST classifies access control as a
separate control supported by SOX and Safe Harbor .
4. Virtualization and resource abstraction: Virtualization introduces issues like
inter virtual machine attacks, hypervisor security etc. Virtual machine setup
should include firewall implementation. This security control is only
supported by CSA. Compliance standards: DMTF-CADF and PCI-DSS.
5. Portability and interoperability: The security standards implemented on
cloud system should enable information sharing amongst the other system.
Compliance standards: DMTF-CADF and OASIS (SAML).
6. Application security: Application security is overall security of the
applications running on the cloud. It includes secured SDLC (software
development lifecycle), authentication and authorization. Compliance
standards: PCI DSS, ISO 27002 , SOX, HIPAA.
10. Data centre operations, maintenance: Security controls for data centres
include configuration and personnel background check to allow entry into
secured data centre location, physical privacy of data centre.
11
VII. CHALLENGES AND FUTURE DIRECTIONS
Big data management and storage scalability are also challenges given that
organizations create huge volumes of data that need to be efficiently backed up,
retrieved, and recovered from disaster. Additionally, edge computing and IoT
integration introduce new risks in the form of security compromise of networked
devices and complexity in synchronizing distributed data. These challenges
highlight the importance of strong cloud architectures, security frameworks, and
innovative solutions to enable sustainable growth in cloud computing. The future
of cloud and data centers will be shaped by AI-driven automation, green
computing, and quantum technologies in the future. Artificial intelligence and
machine learning will play a critical role in predictive maintenance, autonomous
healing, and workload management for hybrid clouds.
12
management. 5G, edge computing, and federated cloud systems will take cloud
efficiency further with less latency and better real-time calculation. Multi-cloud
and hybrid cloud strategies will prevent vendor lock-in and improve workload
placement. Concurrently, autonomous data centers driven by AI and RPA will
provide self-healing and self-aware cloud infrastructure.
VIII. CONCLUSION
According to the survey on cloud and data center architecture, three big drivers
—hybrid cloud adoption, edge computing, AI-driven resource management, and
sustainable data center practices—are rapidly forcing change within cloud
computing. The results point to organizations going toward multi-cloud and
hybrid environments for optimization around cost, scalability, and security. Edge
computing has been mentioned as one of the key parameters that can be used
drastically in reducing latency, especially for apps that require real-time
responses from IoT and 5G networks. Another powerful integration is through
the usage of AI and machine learning—in the management, efficiency, auto-
distribution of workload, enhancing security with predictive threat detection, and
Zero-Trust Security models of cloud resources. Some of the challenges that are
now being faced in this industry include interoperability issues, energy
consumption concerns, and data security risks.
13
ACKNOWLEDGMENT
I sincerely thank all researchers, industry experts, and cloud professionals whose
insights contributed to this survey on Cloud and Data Centre Architecture. I also
appreciate the support of academic institutions, cloud providers, and peers for
their valuable guidance and resources.
REFERENCES
[1] The Notorious Nine: Cloud Computing Top Threats in 2013, pp. p8-p21,
2013.
[2] S. Subashini and V. Kavitha, "A survey on security issues In service
delivery models of cloud computing", Journal of Network and Computer
Applications, vol. 34, no. 1, pp. 1-11, January 2011
[3] Application Security and Development STIG, 2014.
[4] A. Alsaidi and Firdous Kausar, "Security Attacks and Countermeasures on
Cloud Assisted IoT Applications", IEEE International Conference on Smart
Cloud, 2018.
[5] N. Abwnawar, Halgie Janicke and Richard smith, "Towards Location-
Aware Access Control and Data Privacy in Inter cloud communication", IEEE
EUROCON 2017, July 2017.
[6] A. Singh and Kakali Chatterjee, "Cloud security issues and challenges: A
survey", Journal of Network and Computer Applications, 2016.
[7] J. Pan and James McElhannon, "Future Edge Cloud and Edge Computing
for Internet of Things Applications", IEEE Internet Of Things Journal, vol. 5,
no. 1, February 2018.
14
15