AutoRecovery Save of Cloud-Computing-Assignment-2023.24
AutoRecovery Save of Cloud-Computing-Assignment-2023.24
Mrs.Jithendri
Assessor Internal Verifier
Unit 28: Cloud Computing
Unit(s)
Researching, Planning and Implementing a could solution for Retail
Assignment title Enterprises
Mohamed Muthaib
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
LO2. Evaluate the deployment models, service models and technological drivers of Cloud Computing
and validate their use.
LO3. Develop Cloud Computing solutions using service provider’s frameworks and open source tools.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts
LO4. Analyse the technical challenges for cloud applications and assess their risks.
Pass, Merit & Distinction P7 P8 M4 D3
Descripts
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
pg. 2
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
12/18/2024
Student [email protected] Date
signature
pg. 3
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
pg. 4
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a
reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
pg. 5
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.
Student’s Signature:
Date:12/22/2024
(Provide E-mail ID) (Provide Submission Date)
pg. 6
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
pg. 7
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Unit Tutor
Issue Date
Submission Date
12/22/2024
Submission format
pg. 8
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced
using Harvard referencing system. Please also provide in-text citation and the list of references
using the Harvard referencing system. Please note that this is an activity-based assessment where
your document submission should include evidences of activities carried out.
The recommended word count is 4,000–4,500 words for the report excluding annexures. Note
that word counts are indicative only and you would not be penalised for exceeding the word
count.
pg. 9
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
pg. 10
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Follow the guidelines given below assuming that you have recently joined as a trainee systems
administrator for Retail enterprises, which is specializing in clothing, electronics, and home
goods in country.
Background
You have recently been hired as a cloud computing consultant for a group of retail enterprises,
each with several branches across the country. The retail group specializes in clothing,
electronics, and home goods, and has a customer base of a several million. The company is
looking to expand its operations and improve its IT infrastructure to keep up with its growing
business needs.
Note on assumptions to be made: You have been assigned to work with a team of technical
trainees to develop a report titled "Implementation of Cloud Computing Solutions for Retail
Enterprises". The report will detail the technical skills and knowledge required to design and
implement cloud computing solutions for the retail group. You are expected to analyze the
current IT infrastructure of the retail group and recommend cloud computing solutions that
will meet their current and future business needs. You can assume different requirements for
each retail branch and provide acceptable reasons for each recommendation.
You have been asked to support your technical and development executive with the
researching, planning and implementation of a Cloud solution for the existing diversified
clientele of retail enterprises.
Activity 1
Analyze the fundamental concepts of cloud computing and how they apply to the retail group.
Discuss why the retail group should migrate to cloud computing solutions and design an
appropriate cloud computing framework for the retail group by identifying the different needs
of cloud solutions for each retail branch.
Activity 2
Define an appropriate deployment model for the retail group by comparing different cloud
service models. Demonstrate the chosen deployment model with real-world examples and
justify the tools chosen to realize the proposed cloud computing solutions.
pg. 11
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Activity 3
Configure a cloud computing platform using a cloud service provider’s framework and
implement a cloud platform using open-source tools for the retail group. Critically discuss the
issues and constraints that you faced during the implementation of the cloud computing
platform and how those issues could be effectively overcome.
.
Activity 4
Analyze and critically assess the common problems and security issues that are likely to arise
in cloud environments and discuss suitable solutions to overcome these issues. Critically
discuss how an organization should protect their data when migrating to a cloud solution such
as the retail group.
pg. 12
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Grading Rubric
Grading Criteria Achieved Feedback
pg. 13
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
pg. 14
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Cloud Computing
pg. 15
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Contents
Cloud Computing .......................................................................................................................................................................................................... 15
Cloud Computing Solutions for Retail Enterprises .................................................................................................................................................... 17
Introduction .............................................................................................................................................................................................................. 17
Activity 01 ..................................................................................................................................................................................................................... 18
Fundamental Concepts of Cloud Computing ............................................................................................................................................................ 18
Benefits of Cloud Computing .................................................................................................................................................................................... 19
Framework for Retail Enterprises ............................................................................................................................................................................. 21
Home Goods Branch ................................................................................................................................................................................................. 22
Additional Considerations Across All Branches ........................................................................................................................................................ 23
Activity 02 ..................................................................................................................................................................................................................... 24
Cloud Service Models ............................................................................................................................................................................................... 24
Recommended Deployment Model.......................................................................................................................................................................... 27
Activity 03 ..................................................................................................................................................................................................................... 31
Implementation of Cloud Computing Platform ........................................................................................................................................................ 31
Services ..................................................................................................................................................................................................................... 32
Open-Source Tools .................................................................................................................................................................................................... 33
Open Stack ................................................................................................................................................................................................................ 35
Implementation Steps ............................................................................................................................................................................................... 36
Activity 04 ..................................................................................................................................................................................................................... 38
pg. 16
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Introduction
The document, titled "Utilizing Cloud Computing Solutions for Retail Businesses," aims to support the exploration, planning, and
implementation of cloud solutions for a group of retail businesses specializing in apparel, electronics, and household goods. It will evaluate the
current IT infrastructure, recommend suitable cloud computing options, and present a detailed strategy for migrating to the cloud.
pg. 17
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Activity 01
Cloud computing allows businesses to access IT resources over the internet on a pay-per-use model, removing the need to invest in their own
computing infrastructure or data centers. This model enables organizations to lease services like applications and storage from cloud providers.
pg. 18
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
pg. 19
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Cloud computing offers several advantages that make it appealing to businesses. It reduces costs by eliminating the need for physical servers,
allowing companies to pay only for the resources they use. It also provides scalability, enabling businesses to adjust resources based on demand.
Cloud solutions improve collaboration by allowing teams to access data and applications from anywhere, facilitating real-time teamwork.
Security is strengthened with the latest protections, as cloud providers handle data encryption, access control, and regular updates. Business
continuity is ensured through backup and disaster recovery options, helping maintain access to data and services during disruptions.
Additionally, automatic updates handled by the cloud provider ensure that software is always current and secure. Finally, cloud computing
promotes environmental sustainability by reducing energy consumption through shared data center resources.
These benefits enhance operational efficiency, support security, and enable flexible work options, making cloud computing a valuable asset for
organizations.
1.Cost Savings: Cloud computing eliminates the need for investing in on-premise servers and infrastructure. Instead, businesses can use
resources on a pay-as-you-go basis, reducing both capital expenses and ongoing maintenance costs.
2. Scalability: Cloud services allow businesses to scale resources up or down depending on demand. This flexibility is particularly
beneficial for handling peak periods without over-investing in infrastructure.
3. Enhanced Collaboration: Cloud computing enables teams to access files, applications, and data from any location with an internet
connection, making it easier for employees to collaborate in real-time, regardless of their physical location.
4. Improved Security: Major cloud providers offer advanced security measures, including encryption, firewalls, and access control, to
protect data. They also keep up with the latest security standards, helping safeguard sensitive information.
5. Business Continuity: Cloud providers offer backup and disaster recovery solutions, ensuring data is preserved and services remain
accessible in case of technical failures, natural disasters, or other interruptions.
6. Automatic Updates: Cloud services are maintained by providers, who handle updates, patches, and upgrades automatically. This reduces
the workload on IT staff and ensures systems are always running on the latest, most secure versions.
pg. 20
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
7. Environmental Benefits: By leveraging shared data centers and efficient resource use, cloud computing can reduce the overall energy
consumption of an organization, supporting greener, more sustainable business practices.
These benefits make cloud computing an attractive option for organizations looking to enhance efficiency, improve security, and support remote
work and collaboration.
Retail enterprises can leverage cloud computing to streamline operations, enhance customer experiences, and meet various needs within
different store branches. Each branch has unique requirements that cloud technology can fulfill effectively:
Electronics Branch
The electronics branch focuses on delivering personalized shopping experiences and understanding customer preferences to drive sales. By
implementing cloud-based data analytics solutions, this branch can:
Analyze Customer Behavior : Cloud analytics tools can process large volumes of transaction data, browsing patterns, and purchasing habits to
provide insights into customer preferences.
Implement Personalized Marketing: Advanced machine learning models can segment customers and create tailored marketing strategies,
such as personalized offers and product recommendations.
Optimize Product Placement: Using customer data, the branch can optimize product placements in stores and on digital platforms, enhancing
visibility for high-demand items.
Monitor Product Performance: Cloud-based dashboards allow real-time monitoring of product popularity and sales trends, helping with
restocking decisions and product promotions.
pg. 21
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
For the home goods branch, efficient supply chain management and inventory control are crucial to meet customer demand and minimize costs.
Cloud computing provides:
Inventory Management: Cloud-based ERP (Enterprise Resource Planning) systems can track inventory levels across multiple stores in
realtime, ensuring that stock is replenished as needed and reducing the risk of overstocking or stockouts.
Supply Chain Visibility: Cloud platforms offer end-to-end visibility of the supply chain, allowing for better coordination with suppliers and
logistics partners.
Demand Forecasting: Using historical data, cloud-based analytics can predict demand patterns, enabling more accurate ordering and inventory
planning.
Cost Reduction: Cloud ERP solutions can lower operational expenses by automating processes, reducing manual tasks, and optimizing
logistics and inventory management.
Clothing Branch
The clothing branch often experiences fluctuating demand due to seasonal trends, holiday promotions, and sales events. To handle these spikes,
the branch can use cloud computing for:
Scalability During Peak Periods: Cloud infrastructure can scale up or down to accommodate high traffic, ensuring smooth operations during
peak shopping times.
Inventory Management: Cloud-based inventory systems can sync stock levels across online and physical stores, preventing stockouts and
optimizing product availability.
Customer Relationship Management (CRM): Cloud CRM tools help track customer interactions, preferences, and purchase history, allowing
for targeted communication and enhanced customer loyalty programs.
pg. 22
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Omnichannel Integration: Cloud solutions support omnichannel retail, ensuring seamless integration between in-store and online shopping
experiences. This allows for features like buy-online-pick-up-in-store (BOPIS) and easy returns across channels.
Sales Analytics: Real-time sales analytics provide insights into which products are performing well, helping managers make informed
decisions on promotions and discounts.
Data Security and Compliance: Cloud providers offer security measures like encryption, access controls, and compliance with industry
regulations (e.g., GDPR, PCI-DSS), ensuring that customer and business data is protected.
Remote Management: With cloud computing, store managers and corporate teams can monitor and manage operations remotely, facilitating
better oversight across multiple locations.
Cost Efficiency and Budget Flexibility: By adopting a pay-as-you-go model, each branch can optimize IT spending and allocate resources
more efficiently, based on actual usage and demand.
This framework leverages cloud computing to address the unique needs of each branch in a retail enterprise, ultimately enhancing efficiency,
customer satisfaction, and profitability.
pg. 23
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Activity 02
pg. 24
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
• Overview: IaaS provides the fundamental building blocks of cloud computing, allowing businesses to rent IT infrastructure, such as virtual
machines, storage, networks, and operating systems, on a pay-as-you-go basis.
• Use Cases:
o Setting up virtual machines for development and testing. o
Hosting websites or applications with high
scalability.
o Managing and storing large volumes of data.
• Benefits:
o High flexibility and control over the infrastructure. o
Cost savings on hardware purchases and
maintenance. o On-demand scalability based on
usage.
Examples: Amazon Web Services (AWS) EC2, Microsoft Azure Virtual Machines, Google Cloud Compute Engine.
• Overview: PaaS provides a platform that includes hardware and software tools for application development, allowing developers to build,
test, and deploy applications without managing underlying infrastructure.
• Use Cases:
o Developing web or mobile applications with streamlined workflows.
o Supporting collaborative development environments.
o Automating software updates and maintenance.
• Benefits:
o Simplifies the development process, reducing time-to-market.
o Supports agile and DevOps practices with integrated development tools. o Reduces the need for managing infrastructure, focusing
on application development.
Examples: Google App Engine, Microsoft Azure App Service, Heroku.
pg. 25
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
• Overview: SaaS provides complete software applications over the internet, accessible via a browser, with the service provider managing
the underlying infrastructure, maintenance, and updates.
• Use Cases:
o CRM (Customer Relationship Management) software for managing customer relationships.
o Productivity software like email, collaboration, and document management.
o Accounting, HR, and project management applications for daily operations.
• Benefits:
o Quick access to software with minimal setup. o Cost-effective, as it typically follows a
subscription-based pricing model. o Scalable access for users across multiple devices
without complex installation.
• Overview: FaaS, also known as serverless computing, allows developers to run individual functions or small pieces of code in the cloud,
with the cloud provider managing server resources and scaling based on demand.
• Use Cases:
o Running event-driven tasks, such as processing images or handling database updates. o
Supporting microservices architectures with separate, scalable functions.
o Cost-efficient for applications with intermittent or variable workloads.
• Benefits:
o Eliminates the need to manage servers. o Only incurs costs when code is running,
reducing expenses. o Automatically scales based on demand, ideal for unpredictable
workloads.
pg. 26
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
• Desktop as a Service (DaaS): Provides virtual desktops to end-users, allowing access to a cloud-hosted desktop environment from any
device. Suitable for remote workforces.
• Storage as a Service (STaaS): Offers scalable cloud storage solutions for data backup, disaster recovery, and archival. Examples include
Amazon S3 and Google Cloud Storage.
• Database as a Service (DBaaS): Provides cloud-hosted databases that simplify database management and scaling, often with support for
SQL and NoSQL databases. Examples include Amazon RDS and Firebase.
Hybrid Cloud
A hybrid cloud is a cloud computing environment that combines on-premises infrastructure (or a private cloud) with a public cloud, allowing
data and applications to be shared between them. This setup gives organizations greater flexibility, enabling them to leverage the advantages of
both private and public cloud models. In a hybrid cloud, businesses can keep sensitive data on private infrastructure while utilizing the
scalability and cost-efficiency of public cloud resources for less critical tasks or peak loads.
How it works?
In a hybrid cloud architecture, certain workloads are implemented within onpremises data centres or private clouds, while other workloads are
hosted in public clouds. This allows for seamless movement of applications or data between these two environments. Hybrid cloud models
provide a wide range of deployment options, offering a great deal of flexibility
pg. 27
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
1.Seamless Integration: Allows interoperability between private and public cloud environments, enabling data and applications to move
between them as needed.
2. Flexibility: Organizations can choose where to place workloads based on their unique security, compliance, and scalability needs.
3. Scalability: During peak times, hybrid clouds allow companies to "burst" into public clouds, scaling beyond their private cloud resources
without significant capital investment.
4. Enhanced Security and Compliance: Sensitive data can be kept in a private environment with strong security controls, while less-sensitive
data or workloads can be handled in the public cloud. This is useful for organizations in regulated industries with strict compliance
requirements.
5. Cost Optimization: Hybrid clouds enable companies to use the more economical public cloud for high-volume, less-sensitive tasks while
maintaining a private cloud for core applications that demand higher security and control.
1.Improved Business Continuity: Hybrid clouds support data redundancy and backup across multiple environments, providing enhanced
disaster recovery and business continuity options.
2.Optimized Resource Usage: By balancing workloads between private and public clouds, hybrid solutions allow organizations to optimize
resource usage and control costs.
3.Reduced Latency and Enhanced Performance: Data and applications can be kept closer to end-users, reducing latency and enhancing
performance, especially when local access is critical.
4.Facilitates Digital Transformation: A hybrid approach allows organizations to gradually migrate to the cloud without completely
overhauling their existing IT infrastructure.
5. Supports Innovation: Hybrid cloud environments are ideal for testing and developing new applications, as businesses can leverage the
scalability of the public cloud while ensuring security for testing sensitive data or applications.
pg. 28
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
1.Disaster Recovery: Many organizations use hybrid clouds to back up critical data and applications. In the event of a disaster, they can fail
over to the public cloud and maintain continuity.
2. Handling Variable Workloads: Companies with seasonal or unpredictable demand can use the public cloud for "bursting" capacity,
allowing them to scale beyond on-premises limits during peak times.
3.Regulatory Compliance: Businesses in highly regulated industries (e.g., healthcare, finance) may keep sensitive information in a private
cloud for compliance reasons while using the public cloud for other applications.
4. DevOps and Application Development: Hybrid clouds enable DevOps teams to build, test, and deploy applications more flexibly by taking
advantage of public cloud resources for rapid development while keeping production in the private cloud.
1.Complexity: Managing multiple environments can add complexity, as hybrid clouds require seamless integration and strong governance to
manage workloads effectively across environments.
2.Data Security and Compliance: While hybrid clouds can enhance security, managing compliance across both public and private
infrastructures can be challenging, requiring robust data governance policies.
3.Cost Management: Although hybrid clouds can optimize costs, they may also lead to unexpected expenses if not carefully managed, as
organizations need to monitor both private and public cloud usage.
4.Interoperability: Ensuring that the private and public clouds work together seamlessly can require specialized solutions or configurations,
especially for data transfer and application integration.
pg. 29
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Many cloud providers offer solutions that support hybrid cloud environments. Popular providers include:
Microsoft Azure: Azure Arc and Azure Stack provide hybrid capabilities that extend Azure services to on-premises and multi-cloud
environments.
Amazon Web Services (AWS): AWS Outposts offers a fully managed service that extends AWS infrastructure, services, and tools to virtually
any on-premises or data center location.
Google Cloud Platform: Google Anthos allows businesses to deploy and manage applications across on-premises, Google Cloud, and other
cloud environments.
The foundation of public, private, and hybrid cloud models lies in servers. These servers can be situated on-premises and overseen by an
organization for a private cloud setup, shared in a public cloud environment, or a blend of both. The hardware resources and architecture play a
crucial role in the success of any cloud deployment.
Public, private, and hybrid cloud models rely on servers for their operation. These servers can be located on-premises and managed internally
for a private cloud, shared in a public cloud setting, or a combination of the two. The hardware resources and architecture are essential
components for the effectiveness of any cloud deployment.
Cloud models, whether public, private, or hybrid, present the potential benefits of agility, efficiency, and cost-effectiveness. By leveraging the
cloud, organizations can swiftly deliver services and make informed decisions to adapt to a dynamic market.
However, certain organizations exhibit reluctance in embracing cloud resources due to concerns about potential risks to their data and overall
security. In such cases, the implementation of a hybrid cloud security architecture allows these organizations to harness the advantages of the
cloud while minimizing exposure and vulnerability.
pg. 30
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Activity 03
Implementation of Cloud Computing Platform
pg. 31
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
AWS was selected due to its extensive range of services, dependability, and cutting-edge features.
Amazon Web Services, Inc. (AWS) is a subsidiary of Amazon that offers ondemand cloud computing platforms and APIs to individuals,
companies, and governments on a pay-as-you-go basis. Many clients utilize this service alongside autoscaling, which allows them to increase
computing resources during peak usage and reduce costs during periods of low traffic. These cloud computing web services encompass a wide
range of offerings, including networking, compute, storage, middleware, IoT, and processing capacity. Additionally, AWS provides software
tools through its server farms, eliminating the need for clients to manage and scale hardware and operating systems. One of the key services
provided by AWS is Amazon Elastic Compute Cloud (EC2), which grants users access to a virtual cluster of highly available computers. These
virtual machines can be accessed via REST APIs, a CLI, or the AWS console over the internet. AWS's virtual computers replicate the features of
physical computers, including CPUs, GPUs, memory, storage (HDD/SSD), various operating systems, networking capabilities, and pre-installed
application software like web servers, databases, and CRM systems.
AWS services are provided to customers through a network of AWS server farms located worldwide. The fees for these services are determined
by a combination of factors, including usage, hardware, operating system, software, and networking features chosen by the subscriber. The
subscriber can choose different levels of availability, redundancy, security, and service options based on their requirements. They have the option
to pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either.
Amazon takes responsibility for certain aspects of security, such as the physical security of the data centres. However, other security aspects,
such as account management, vulnerability scanning, and patching, are the responsibility of the subscriber.
AWS is marketed by Amazon as a cost-effective and efficient solution for obtaining large-scale computing capacity compared to building
physical server farms. Each service is billed based on its usage, although the measurement of usage may vary across different services.
According to Synergy Research Group's data from Q1 of 2023, AWS currently holds a 31% market share for cloud infrastructure, while its
competitors Microsoft Azure and Google Cloud have market shares of 25% and 11% respectively.
Services
As of 2021, the AWS platform offers a wide range of more than 200 products and services. These encompass various areas such as computing,
storage, networking, database management, analytics, application services, deployment, management, machine learning, mobile development,
developer tools, RobOps, and tools for the Internet of Things. Among the most popular services are Amazon Elastic Compute Cloud (EC2),
pg. 32
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Amazon Simple Storage Service (Amazon S3), Amazon Connect, and AWS Lambda. AWS Lambda is particularly noteworthy as it allows the
execution of serverless functions written in any language and triggered by numerous events, including HTTP calls.
To provide access to their functionality, these services expose APIs that clients can utilize in their applications. These APIs can be accessed over
HTTP, following the REST architectural style. Older APIs may also use the SOAP protocol, while newer ones exclusively utilize JSON. Clients
have multiple options for interacting with these APIs, including through the AWS console, which is a website interface. Additionally, clients can
utilize SDKs written in various programming languages like Python, Java, and JavaScript, or they can make direct REST calls.
Open-Source Tools
Kubernetes is utilized for container orchestration, terraform is employed for infrastructure as code (IaC), and Prometheus is implemented for
monitoring and alerting purposes.
pg. 33
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
The four open-source cloud management platforms mentioned below each have their unique approach to cloud management, yet they share a
common goal: to simplify the process by providing abstraction and automation. This helps in reducing the burden on development and
operations teams when dealing with the complexities of cloud services.
It is important to note that these open-source platforms are just a part of a larger landscape that also includes proprietary options. While both
types aim for the same objective, open-source solutions offer additional benefits that closed-source alternatives may lack. Depending on your
specific requirements and the absence of any bias towards open-source software within your organization, closed-source cloud management may
also be a viable option.
Apache Cloud Stack is a versatile cloud management platform that was initially designed as an open-source IaaS cloud platform for both private
and public clouds. However, it has evolved to offer much more than that. With its comprehensive range of features, Cloud Stack provides
compute orchestration, network as a service, user and account management, resource auditing, and security. It also includes various types of
storage and resource provisioning capabilities.
One of the standout features of Cloud Stack is its extensive support for different hypervisors. In fact, it currently supports the largest number of
hypervisors compared to any other tool available. This includes popular hypervisors such as VMware, KVM, Citrix XenServer, Xen Cloud
Platform (XCP), Oracle VM server, and Microsoft Hyper-V. Users can interact with Cloud Stack through a user-friendly web interface,
command-line tools, or a robust RESTful API.
But what sets Cloud Stack apart as a multi-cloud tool? In addition to its core functionalities, Cloud Stack also offers an API that is compatible
with AWS EC2 and S3. This allows organizations to deploy hybrid clouds, where Cloud Stack serves as the private cloud and AWS acts as the
public cloud. This integration with AWS makes Cloud Stack a flexible solution for enterprises looking to manage their cloud infrastructure
across multiple environments.
In summary, Apache Cloud Stack provides enterprises with a powerful opensource platform for cloud management. While it may not support
multiple public cloud brands, it serves as an excellent starting point for those who prefer a DIY private-cloud-centred approach to cloud
management.
pg. 34
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
OpenStack is a prominent player in the field of cloud management, and it cannot be discussed without mentioning CloudStack. Similar to
CloudStack, OpenStack serves as an Infrastructure-as-a-Service (IaaS) platform for both private and public clouds. It possesses the capability to
oversee a vast array of computing, storage, and networking resources, whether within a data center as a private cloud or externally as a public
cloud.
Nevertheless, when it comes to the features and functionalities provided by the major public cloud providers, many OpenStack public cloud
deployments have lagged behind.
Open Stack
OpenStack seamlessly integrates with popular enterprise and open-source technologies, making it an excellent choice for heterogeneous
infrastructures, both within the OpenStack ecosystem and on external public clouds.
One of the potential advantages of opting for OpenStack is its thriving marketplace, which offers a wide range of options. Additionally,
OpenStack garners more interest than Cloud Stack, as it boasts a larger community of developers who actively contribute to the core code. The
approach to cloud management in OpenStack mirrors that of Cloud Stack. It revolves around the concept of running a multi-cloud deployment
from the OpenStack private cloud, utilizing native open-source cloud management tools
.
Once again, this approach is increasingly appealing to enterprises due to the growing influence of public clouds and the desire to maintain cloud
management within an open-source domain, running on their own hardware platforms.
ManageIQ
ManageIQ serves as an open-source management platform designed for hybrid IT environments, encompassing a combination of legacy systems
and both public and private clouds. It is equipped to handle environments of varying sizes and can accommodate a range of technologies
including virtual machines, public clouds, and containers.
The tool enables users to gain insights into the present condition of their environment, offer self-service capabilities to end users, and ensure
adherence to compliance regulations. Management and monitoring functions are utilized for performance optimization and resource utilization.
pg. 35
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Cloudify
Cloudify is a model-driven cloud management tool that focuses on multi-cloud orchestration, automation, and abstraction. It streamlines the
deployment, configuration, and maintenance of application and network services across diverse cloud environments. By leveraging the TOSCA
specifications, users can define the desired state of application workloads through a policy creation engine. This allows for monitoring to ensure
compliance with specified SLAs. Workloads can be modelled using TOSCA files, facilitating collaboration between development and operations
teams. Ultimately, Cloudify enables efficient governance and deployment of workloads to production environments.
Implementation Steps
Generate AWS accounts, establish VPCs (Virtual Private Clouds), and arrange IAM (Identity and Access Management) roles. Deploy
Kubernetes Cluster
Utilize AWS EKS (Elastic Kubernetes Service) to effectively manage applications in containerized form. Infrastructure
as Code
Set up Prometheus to oversee the well-being of applications and notify of any problems.
pg. 36
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Security Concerns
Implement strong IAM policies and leverage AWS Security Hub for ongoing monitoring.
Cost Management
Data Migration
pg. 37
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Activity 04
Common Problems
pg. 38
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Data Breaches
1. Unauthorized entry into confidential information.
2. Illegitimate access to private data
Data breaches in cloud computing continue to be a significant cybersecurity threat in 2021. In this article, we will provide valuable advice on
safeguarding your business against these detrimental incidents.
In today's landscape, organizations are increasingly entrusting their data and infrastructure to the public cloud. This shift has allowed them to
enhance efficiency, agility, and seamlessly adopt new technologies. However, despite the numerous advantages offered by the public cloud in
terms of features and functionality, concerns arise regarding the security and accessibility of data stored in someone else's data centre.
The level of control over server infrastructure that organizations were accustomed to in on-premise datacentres has now been transferred to the
public cloud provider. Moreover, the media has been inundated with reports of massive data leaks and breaches, further intensifying the
apprehensions surrounding cloud security. How can organizations mitigate, prevent, and even evade data breaches in the cloud? Let's explore
five key areas:
pg. 39
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Cloud Outage is the term used to describe the period when the cloud infrastructure service is not accessible. This lack of availability can also
indicate that the service is not performing up to the agreed upon SLA standards. For example, if there is an incident that only affects a portion of
a data centre, the provider may need to take steps to maintain and restore the service. Until the service is completely back up to the agreed upon
SLA levels, it will be considered downtime for the end-user.
Version 1: Cloud downtime is the period when the cloud infrastructure service is not available for use. This lack of availability can also indicate
that the service is not performing up to the agreed SLA standards. For example, if there is an incident that only affects a portion of a data centre,
the provider may need to take steps to maintain and restore the service. Until the service is completely back up to the agreed SLA levels, it will
be considered downtime for the end-user.
Cloud outages can occur due to various factors, both within and outside the control of cloud vendors. The following list provides a brief
overview of the considerations that cloud vendors take into account to ensure that their services consistently meet the SLAs with satisfactory
performance:
1. Power Outage: One common cause of cloud service outages is the unavailabilityof electricity that powers the underlying datacentres.
Cloud vendors operate on a large scale, with datacentres consuming significant amounts of power. They typically rely on the national grid or
third-party power plants, which can pose challenges in ensuring consistent and sufficient electricity supply, especially with the increasing
demand for scalable power sources.
2. Cybersecurity: Cyber-attacks, such as Distributed Denial of Service (DDoS) attacks, can overload datacentres with excessive incoming
traffic, making it difficult for legitimate users to access the service. Despite having protective measures in place, hackers often exploit
vulnerabilities that can trigger protective mechanisms, compromise data, or even disrupt the entire service.
3. Human Error: Even with strict protocols and systems in place, a single incorrect command can potentially bring down the entire IT
infrastructure service. This risk applies to all cloud vendors, as demonstrated in 2017 when a human error at an AWS data centre facility caused a
global internet outage. Although the anomalous behaviour was detected early, affected datacentres still required a complete restoration and
restart.
pg. 40
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
4. Software and Technical Issues: Cloud infrastructure consists of a complex system of hardware and software technologies. Glitches and
bugs are inevitable in such systems, which can lead to service disruptions.
Version 1: Cloud infrastructure is a complex combination of hardware and software technologies, making glitches and bugs likely to occur.
Version 2: Technical issues, including glitches and bugs, are common occurrences in cloud infrastructure due to its complex nature.
Compliance Issues
This article offers an overview of the key considerations related to cloud compliance and highlights the compliance services commonly offered
by the top three cloud service providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud.
pg. 41
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Security Solutions
Data Encryption
challenges, given the continuous evolution and increasing sophistication of cyber threats. One effective approach to address these risks is
through data encryption, which guarantees the safeguarding of data against unauthorized access, even if it falls into the wrong hands.
Encryption involves the conversion of data into a coded language, rendering it unreadable to individuals lacking the decryption key. When data
is encrypted within the cloud, it undergoes a complex algorithmic scrambling process, making it nearly impossible to decipher without the
appropriate key. Consequently, even if a hacker manages to breach the security of cloud-stored data, they would be unable to comprehend its
contents without the encryption key.
Dropbox serves as an exemplary case of a company that has integrated data encryption into its cloud security strategy. As a cloud-based service
for file storage and sharing, Dropbox employs advanced encryption algorithms to safeguard its customers' data. In addition to encrypting data
during transmission, Dropbox utilizes a technique known as "client-side encryption." This method encrypts data on the user's device before it is
uploaded to the cloud, ensuring that even if Dropbox's servers are compromised, the data remains encrypted and thus protected.
Another notable example is Amazon Web Services (AWS), a widely adopted cloud computing platform utilized by numerous businesses. AWS
offers a range of encryption options to its customers, encompassing server-side encryption, client-side encryption, and key management.
Furthermore, AWS adheres to stringent security protocols, including regular security audits and compliance certifications, to guarantee the
utmost level of data protection for its customers.
Access Controls
The rise of service-oriented architecture has led to the emergence of cloud technology, allowing organizations to outsource their IT
infrastructure through the Internet. However, the shared nature of the cloud raises security concerns, such as unauthorized access and data
misuse. Various access control techniques have been proposed to address these issues, focusing on authorization problems while overlooking
interoperability and management challenges. Access control as a service (ACaaS) is seen as a solution to mediate access to sensitive data in the
cloud. This chapter aims to help the cloud community understand the complexities of authorization services in the cloud, covering technical
issues like privilege escalation and managerial challenges such as time and cost requirements. ACaaS is presented as a comprehensive solution
to these problems, with a discussion on its significance and strategies for secure access to cloudhosted applications. The authorization needs of
the cloud environment, particularly in the software as a service (SaaS) model, are evaluated based on defined factors from the National Institute
of Standards and Technology.
pg. 43
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Regular Audits
Perform routine security audits and ensure compliance with regulations on a regular basis.
The widespread adoption of cloud computing has transformed the way organizations handle their data and IT infrastructure. Cloud-based
systems provide unmatched scalability, flexibility, and cost-effectiveness, making them an appealing choice for businesses of all sizes.
However, these advantages bring about unique challenges, especially in the auditing realm. This article will delve into the obstacles linked with
auditing cloud-based systems and present best practices to guarantee thorough and efficient audits.
Data Classification
The process of organizing data according to a set of standards and policies is known as data classification. It involves categorizing data based
on its importance, sensitivity, and risk levels. By classifying data, organizations can efficiently store, access, and retrieve information in a
secure and efficient manner. Data classification is also an integral part of an organization's overall enterprise data management system.
Effective data classification tools ensure compliance with regulatory standards and provide valuable insights through data analysis.
In addition, sorting data can streamline processes for companies dealing with large volumes of data on a daily basis. This improves visibility
within the organization and enhances control and access to data. The criteria for different types of data classification are determined by factors
such as importance, sensitivity, and other relevant considerations. With a better understanding of data classification, we can now explore the
various available types of data classifications.
pg. 44
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
The selection of data classification methods depends on various factors, including the size of your business, the expertise of users, and the
sensitivity of the data. Generally, data classification can be categorized into three types:
1. Content-Based Data Classification: This method involves scanning and analysing files in datasets to identify any sensitive information
that should be restricted. By inspecting the content of files, this approach helps determine whether the data is confidential or can be accessed by
the public.
2. Context-Based Data Classification: Instead of focusing on the direct contents offiles, this approach examines the metadata associated
with the files. It considers factors such as file locations, user information, and file formats to determine the sensitivity of the data. Contextbased
data classification is particularly effective when used by well-trained users.
3. User-Based Data Classification: In this type of classification, the responsibility lies with the users to review the contents of files and
categorize the data accordingly. This method relies on the expertise and discretion of the users, who need to be highly trained in data
classification. The accuracy of this classification method depends on the knowledge and capabilities of the users.
Understanding the different types of data classification allows us to compare them based on their effectiveness and suitability for different
levels of data classification hierarchy.
Digital transformation plays a crucial role in the modern business landscape, and a key aspect of this transformation is the digitization of data.
As a result, safeguarding, backing up, and ensuring the availability of data in the digital realm have become more important than ever before. In
the context of the fourth industrial revolution, cloud-based backup solutions have emerged as a prominent trend. These solutions have gained
widespread trust and adoption among businesses due to the numerous benefits they offer.
An online backup service, also referred to as cloud backup or backup as a service (BaaS), involves storing an enterprise's files, applications, or
databases on cloud computing infrastructure managed by a service provider. The backup process takes place over an internet connection, with
the data being encrypted for added security.
pg. 45
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Cloud backup operates by duplicating a company's data onto cloud servers. There are two main methods for conducting backup operations:
Continuous replication: In this mode, the cloud service provider automatically copies the company's data to the server whenever any changes
occur. This is the most common method of cloud backup and is ideal for businesses needing realtime updates to their data backups.
Scheduled replication: In this method, cloud service providers follow a set schedule for replicating business data. It is typically used by
companies that do not require immediate updates to their data copies.
With Backup as a Service (BaaS), businesses link their local software to cloudbased backup solutions instead of setting up on-premises
hardware and software for data backup. Data is securely transmitted over a network connection to remote cloud servers. Once a company's data
is successfully replicated to the cloud, it can be accessed from anywhere in the world through an internet connection.
Secure Migration
Employ secure techniques and instruments for transferring data, like VPNs and encrypted links.
In the age of digital transformation, the discussion surrounding the security of cloud migration has become extremely important and cannot be
ignored. With more and more organizations embracing cloud services, there is an increasing demand for large-scale data storage and efficient
data management.
Moving data to the cloud brings about a range of unique security considerations. The complexity of the migration process itself can potentially
result in data loss and breaches, which raises the stakes for organizations. Additionally, the shift towards cloud adoption and infrastructure
creates new opportunities for cybercriminals to exploit vulnerabilities, potentially compromising the level of protection that was assumed. It is
crucial for organizations to recognize and understand the risks associated with cloud migration. This not only proves to be effective but also
imperative for their operations.
By proactively understanding these challenges, organizations are able to navigate the migration process with a heightened sense of awareness.
This empowers them to strengthen their security measures in the face of ever-evolving cyber threats.
pg. 46
M.A.M Muthaib (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
Investing in cloud technology offers a multitude of benefits, especially when handling large volumes of customer data. Notably, key advantages
such as enhanced security, scalability, and flexibility are prominent in this evolving landscape.
Cloud migration significantly boosts security measures by providing a secure environment for data storage and access. This transition equips
businesses with the latest security technologies and practices, ensuring a strong defense against cyber threats.
Furthermore, the scalability provided by the cloud is crucial. Businesses can easily adjust their operations based on their needs, streamlining
processes and optimizing resource allocation. This scalability not only improves operational efficiency but also leads to cost savings by
avoiding extensive infrastructure expansion, especially in cases where skilled personnel are lacking.
In addition to security and scalability, cloud adoption brings a new level of flexibility to business operations. Organizations can quickly deploy
new applications and services, promoting agility and responsiveness. This agility is essential for adapting to changing market conditions,
enabling businesses to stay competitive and adaptable.
Ultimately, investing in cloud technology unlocks opportunities for operational efficiency, cost-effectiveness, and increased adaptability,
making it a valuable asset for organizations managing significant amounts of customer and internal data.
References
1)Johnston, R. (2023). Edge Computing Versus Cloud Computing: Which is Right for Your Business? [online] Device42 - Official Blog. Available at:
https://www.device42.com/blog/2023/03/31/edge-computing-versus-cloudcomputing-which-is-right-for-your-business/.
2)www.insystechnologies.in. (n.d.). Benefits of Cloud Computing | Insys Technologies, Thane, Mumbai. [online] Available at:
https://www.insystechnologies.in/benefits-of-cloud-computing.html.
3)Stackscale (2021). Main cloud service models: IaaS, PaaS and SaaS. [online] Stackscale. Available at: https://www.stackscale.com/blog/cloud-
service-models/.
4) www.istockphoto.com. (n.d.). 2,100+ Hybrid Cloud Stock Photos, Pictures & Royalty-Free Images - iStock. [online] Available at:
https://www.istockphoto.com/photos/hybrid-cloud.
pg. 47
M.A.M Muthaiyb (E174609)/CLOUD COMPUTING
lOMoAR cPSD| 42842578
5) www.linkedin.com. (n.d.). What is AWS? Introduction to Amazon Web Services. [online] Available at:
https://www.linkedin.com/pulse/what-awsintroduction-amazon-web-services-bhupendra-tale.
6)EDUCBA. (2019). Cloud Computing Challenges | Top 12 Challenges in Cloud Computing. [online] Available at: https://www.educba.com/cloud-
computingchallenges/.
7)www.future-processing.com. (2023). The most common problems in cloud implementation | Blog - Future Processing. [online] Available at:
https://www.future-processing.com/blog/the-most-common-problems-in-cloudimplementation/.
pg. 48
M.A.M Muthaib (E174609)/CLOUD COMPUTING