StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cloud Computing - Research Proposal Example

Cite this document
Summary
In the paper “Cloud Computing” the author analyzes a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Cloud Computing
Read Text Preview

Extract of sample "Cloud Computing"

?Introduction to Cloud Computing A comprehensive covering all the concepts of cloud computing is defined as “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (for example, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service-provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” (Mell, Grance 2010) ‘Cloud Computing’ matches a perception of an imaginary cloud that illustrates the Internet or most likely a corporate network environment that is represented by a cloud. The imaginary Internet cloud of a corporate network environment is trustworthy for data transportation. Moreover, it is incorporated with advanced cloud generalization. In order to extend the cloud-computing concept, there are services along with network components consisting of routers, switches, application servers, and data servers. The components of the network are installed to operate at the back-end for providing advanced services that are proficient to develop web application (What is cloud computing?). Moreover, cloud computing consists of applications that are represented as a service on the web and the provision of hardware / software services provided by companies operating data centers. Likewise, the services provided over the Internet are referred as (Software as a Service) ‘SaaS’. Few sellers use the term (Infrastructure as a service) IaaS and (Platform as a service) PaaS ’in order to demonstrate their products and services. However, these terms are avoided and not accepted globally, due to variation (ARMBRUST, FOX et al. 2010). The Commerce Department’s National Institute of Standards and Technology (NIST) have illustrated some helpful definitions that focus on three concepts (Ryan, Loeffler 2010): Cloud infrastructure as a service ‘IaaS’ consists of provisioning elementary computing resources. Cloud software as a service ‘SaaS’ access software application that operates on a cloud infrastructure. Cloud platform as a service (PaaS) provides the accessibility to users for implementing and developing applications with programming language and tools supported by the providers. The core components of a cloud are consists of the data center hardware and software. When these resources are made available to the public, they are referred as public clouds and the service provided by the cloud is called as utility computing. Moreover, private clouds are only available to private organizations and are not accessible by public. Accordingly, cloud computing is the combination of ‘SaaS’ and utility computing (ARMBRUST, FOX et al. 2010). Furthermore, cloud computing is a successful contributor economically for cyber infrastructure as it “makes applications dramatically easier to develop and deploy, thus expanding the feasible scope of applications possible within budget and organizational constraints, and shifting the scientist’s and engineer’s effort away from information technology development and concentrating it on scientific and engineering research. Cyber infrastructure also increases efficiency, quality, and reliability by capturing commonalities among application needs, and facilitates the efficient sharing of equipment and services” (Vouk 2008)(Vouk 2008). Business Trends Information Technology organization has already invested millions since the 1990’s, to contribute in reshaping cloud computing. For instance, a popular slogan from Sun that was “Network is a computer” was recognized in 1980’s. Furthermore, salesforce.com, a ‘SaaS’ enabled website is providing services since 1999. Today, cloud computing represents a more innovative and productive approach, in order to provide online services along with online operating systems. Microsoft Azure provides an online operating system along with the set of development tools and services. Moreover, Google Docs provides online word processors along with spreadsheets and presentation applications similar to Microsoft Office. Furthermore, Google Apps gives the freedom to the developers to execute their codes and applications on Google infrastructure. Sun Microsystems provides computing power by charging $1 per hour for one CPU. In addition, Amazon provides web services named as EC2 and S3. Moreover, Yahoo has also announced recently that it will utilize ‘Apache Hadoop framework’ that will enable users to work on thousand of nodes and one million bytes of data. Accordingly, the contribution of cloud computing is covering every aspect of computation required for small, medium and large businesses (Han 2010). However, there security issues associated with cloud computing, cloud computing still promises to cope up with the task as it posses potential to redesign information technology contribution towards businesses. The most spectacular feature of cloud computing is that it provides flexible capacity for businesses. Moreover, it eliminates the cost of unnecessary hardware, software, maintenance and power. It also minimizes cost associated with launching corporate projects and application deployment, redefining business strategy by labeling it with cost perceptive. In the context of austerity, cloud computing provides a light of hope for organizations to reform their business with cost effective solutions (Shivakumar, Raju 2010). Hybrid cloud models are dominating currently as in a report titled as “2010 trends to watch cloud computing” Laurent Lachal who is a senior analyst employed at Ovum said “Enterprises will mix and match public and private cloud elements with traditional hosting and outsourcing services to create solutions that fit short and long-term requirements," he further said. "The past 18 months have seen a significant shift in focus away from public clouds towards private ones, owing to a powerful mix of vendor push and user pull” (Ho 2010). Virtualization In simple words, it is defined as “the creation of a product, service, or organization that has an electronic rather than a physical existence” (Virtualization. 2007). Virtualization in the context of cloud computing refers to Server Virtualization, Desktop Virtualization, Storage Virtualization and Network Visualization. Server Virtualization is related with replicating the resources such as processors, applications and users along with the physical server. Moreover, server virtualization can be divided in to 3 categories i.e. Mainframe, Midrange and commodities. Mainframe includes virtual machine that is used for running an operating system virtually and ‘z Linux’ a virtual server for Linux developed by IBM. The Midrange virtualization includes Solaris containers and zones and the commodity virtualization consists of VM ware, Oracle VM and Xen. The desktop virtualization is categorized in two PC / MAC and Virtual desktop infrastructure (VDI). The category named as PC / MAC includes virtual box, virtual PC etc. VDI consists of Oracle VDI and desktop virtualization by Citrix. The next category is the storage virtualization, which includes storage area networks and arrays developed by Exadata, Netapps etc. Lastly, there is a category named as network visualization consisting of Virtual Local Area Networks (VLAN). Benefits Cloud computing provide many cost effective short term and long-term benefits. The organizations can avail services from multiple cloud-computing providers, to improve computerized business processes and high availability of services within the organization. Cloud computing also provides standardization of APIs, by operating on compatible applications to enable hybrid cloud computing. Moreover, organizations operating on IT infrastructure save staff, and financial resources. Cloud computing is also flexible and facilitate organizations to initialize a project robustly without upsetting on the cost, that may include disk storage, CPU and RAM. Likewise, organizations can buy spaces for data storage on data centers located in different geographical area, that enables them to protect their data in terms of natural disasters and hazards. Furthermore, one more advantage that is significant is related to the uptime and availability of services at all times. In addition, cloud computing is also efficient for handling large data sets. The data is analyzed in terabytes by pay for use business model to facilitate academic institutions by distributed computing with hundreds of computers in a short time cost (Han 2010). Furthermore, the integration of cloud computing and semantic web has produced a new revolutionary e-portfolio. Previously, e-portfolios have faced various challenges and limitations by the development and implementation approach. However, a research by (Kim, Ng et al. 2010) on a design based on Private-Public data index systems that integrate cloud computing applications and storage with the architecture of Semantic web architecture. The integration aided semantic web-based virtualization along with advanced intellectual search achievable. Green Computing Virtualization Virtualization has played a dominating role to provide isolation due to security issues while running applications on divided computing devices. Moreover, virtualization apart from isolation provides other vast benefits including design plainness, space reduction in a server room, cost reduction due to centralized management and minimal power consumption. A study was conducted by (Guster, Hemminger et al. 2009), to utilize virtualization for reducing data center infrastructure and to promote green computing. The study was conducted on nine workstations. These workstations were virtualized in to nine different zones on a sole workstation. The conclusion in terms of cost associated with power, the savings were $600 per year and cooling cost savings were $ 300 per year. The total savings were $900 per year. Furthermore, space savings in a corporate environment can also be added. Virtualization Security David Jackson who is a senior security architect employed at Logica’s security practice highlights virtualization security benefits. Virtualization can be installed with a clean image over an environment that can be infected by viruses or threats. Moreover, it facilitates people to share systems without exposing the personal and classified data. Organizations can centrally monitor application by factors including type, time and levels that are granted to each user. Furthermore, virtualization provides an isolated testing environment for debugging and testing new applications against threats and viruses (Mortleman 2009). Besides, in order to test the new application in an isolated virtualized environment, Jackson cautioned organizations as he said “Virtualisation can make the environment more complex by adding a new layer of software that must be maintained, including performance and availability monitoring, upgrades and patches. Add to this the increased complexity of diagnosing problems and managing virtual images, and you begin to see why an unprepared enterprise can easily be sidelined” (Mortleman 2009). Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. Guidance is also available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet Security and the virtualization vendors. This writing will revisit the risks and controls, which will be a basis for discussion of assessment techniques. As security assessors, auditors and compliance validators see more of the physical environment disappearing and being replaced by the virtual foundation, gathering the necessary metrics from virtual environment will be a key part of assurance activities. In order to secure the virtual environment from threats and vulnerabilities, organizations should follow security safeguards such as: Security teams should take a number of steps to ensure the improved protection of virtual environments, including (10 THINGS you should know now about... VIRTUALIZATION SECURITY. 2009): Speed Traps “Virtualization platforms have made it far easier and much faster to create and deploy servers and applications than was possible when physical limitations governed system rollouts” Net Perimeter “The traditional physical character of the network perimeter is impacted by the rate and quantity of change inside the data center brought about by x86 server virtualization” Stress Points “Increased stress is created by the sheer proliferation of VMs and the speed with which they can be built and torn down. Network security personnel must interject to ensure that these swiftly made systems do not start leaking data or carrying malware just as quickly” On the Move “The rapid movement of systems inside the data center also creates security stress. Unlike, physical systems, when a VM moves, it is far from certain that the security policies that govern how that resource is protected will move with it” Relative Effectiveness “Security tools and practices that worked in the physical world can be seriously compromised by the very qualities that make virtual machines so appealing mobility, demand-based provisioning, high utilization of individual physical server resources, and the blurring of roles between system and network personnel” VM Safeguards “Look for security products that can run as a virtual machine to secure inter virtual machine traffic and application activity. VMware, through its VMsafe API in vSphere 4, has set the stage for security vendors to see traffic that was previously difficult to monitor. Expect more products from major security vendors in this arena” CPU Cost Concerns “Because of the nature of virtualization, security products that consume even 2 to 3 percent of CPU per VM will likely soon be too expensive to implement” Security Policy “Aside from CPU cycles, security policy will have to be adapted to face the new reality imposed by VM proliferation, spontaneity, and mobility. It is very likely that IT managers will have to increase the number and expertise of security personnel devoted to security policy creation and maintenance as the percentage of VMs increases in the data center” Guest Services “Concentrate on the guest operating systems and applications, not the virtual machines. Much of the technological basis for server virtualization necessarily isolates VMs from one another” Management Relief “New capabilities in vSphere, including host profiles, which significantly reduce human labor and the chance for human error in host configuration that ease management while also improving the security posture of the virtual environment. Emphasize this dual-purpose approach with systems management staff” Issues As cloud-computing usage is increasing with its connectivity to the public through an Internet, new opportunities are also originating for hackers, cyber terrorists, viruses and worms. These threats will increase and focus on cloud computing enabled services and applications for stealing classified data, denial of service attacks on data centers etc. ‘Google apps’ is the major player in the market for providing ‘SaaS’, it was attacked and hacked. The report from cyber forensics indicated that the attacks were originated from China (Bisong, Rahman 2011). As the data is located and hosted geographically in different countries, different laws are associated with each country for data stored in the machines. Moreover, it is very difficult to save the classified data, if the host nation becomes hostile when the government changes and become uncooperative. Even though, cloud-computing services are reliable in terms of availability, there are incident that took place where a complete unavailability of cloud computing services was halted for hours and even days due to bugs. Similarly, Google Gmail went offline for two hours; Citrix ‘GoToMeeting’, Amazon.com ‘Simple Storage Service’ was also down for eight hours too. The organizations, that are completely dependent on cloud computing and they cannot do any business for hours or days, the loss could be disastrous (Bisong, Rahman 2011). Some of the threats for cloud computing involves incorrect usage of cloud computing services, malicious codes, viruses, vulnerabilities related to shared services and technology, traffic sniffing, data loss, data leakage, intruders, weak security of API’s, unidentifiable security profiles etc. Virtualization has many drawbacks as it requires additional hardware resources and the estimation for hardware resource requirements is not viable. Moreover, there are situations where RAM becomes an issue, as the server requires extra hardware to execute a virtual environment for an application. Even though, the server is equipped with RAM in megabytes or terabytes, motherboards limits RAM after certain amount that will create issues if multiple environments needs to be deployed on the server. Moreover, virtualization has no standards defined for virtual server management increasing management for featured tools. Conclusion After reviewing the concept of cloud computing and virtualization along with its vast benefits and drawbacks, the concept benefits the organizations to avoid purchasing and maintaining computing devices and software. Moreover, the amplification and flexibility of this benefit is provided by cloud computing. The accessibility is every time available, enabling organizations to access business applications and information any time from any location, whenever the user require. The cost is also a significant factor, as the organization only pays for the technology capacity it uses. Even though, cloud computing is spreading globally, threats and risk associated with it are also rising and needs to e considered as well. In comparison to these threats and risks, security teams are also working to improve security of cloud computing services. Cloud computing is a revolutionary technology that will keep on improving with new innovative technological developments. Virtualization on the other hand has dominated the economic factors in order to facilitate organizations to save cost in terms of power, space, hardware, software and maintenance. Virtualization has defined hybrid cloud models for businesses to overcome business challenges with significant cost savings. Moreover, virtualization possesses challenges in terms of security and certain security factors must be adhered for protecting virtual environments. However, virtual environments provide isolated environments for testing new applications and tools for any potential threats, weaknesses and vulnerabilities. Similarly, virtualization also is vulnerable and certain factors needs to be considered for securing virtualization in cloud computing. In addition, virtualization requires extra hardware resources without determining exact RAM requirements. Above all, Cloud computing and virtualization defines numerous options for businesses and innovation for Information Technology that will eliminate resource utilization and offering great features for the current digital era. References , What is Cloud Computing? | Cloud Computing Journal. Available: http://cloudcomputing.sys-con.com/node/579826 [2/25/2011, 2011]. RYAN, W.M. and LOEFFLER, C.M., 2010. Insights into Cloud Computing. Intellectual Property & Technology Law Journal, 22(11), pp. 22-28. ARMBRUST, M., FOX, A., GRIFFITH, R., JOSEPH, A.D., KATZ, R., KONWINSKI, A., LEE, G., PATTERSON, D., RABKIN, A., STOICA, I. and ZAHARIA, M., 2010. A View of Cloud Computing. Communications of the ACM, 53(4), pp. 50-58. HAN, Y., 2010. On the Clouds: A New Way of Computing. Information Technology & Libraries, 29(2), pp. 87-92. KIM, P., NG, C.K. and LIM, G., 2010. When cloud computing meets with Semantic Web: A new design for e-portfolio systems in the social media era. British Journal of Educational Technology, 41(6), pp. 1018-1028. BISONG, A. and RAHMAN, S.M., 2011. An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, 3(1), pp. 30-45. Virtualization. 2007. Bloomsbury Business Library - Business & Management Dictionary, , pp. 7812-7812. GUSTER, D., HEMMINGER, C. and KRZENSKI, S., 2009. Using Virtualization to Reduce Data Center Infrastructure and Promote Green Computing. International Journal of Business Research. MORTLEMAN, J., 2009. Security advantages of virtualisation. Computer Weekly, , pp. 23-23. MELL, P. and GRANCE, T., 2010. The NIST Definition of Cloud Computing. Communications of the ACM, 53(6), pp. 50-50. SHIVAKUMAR, B.L. and RAJU, T., 2010. Emerging Role of Cloud Computing in Redefining Business Operations. Global Management Review, 4(4), pp. 48-52. HO, A., 2010. Hybrid cloud models rule. Enterprise Innovation, 6(1), pp. 11-11. 10 THINGS you should know now about... VIRTUALIZATION SECURITY. 2009. eWeek, 26(12), pp. 42-42. VOUK, M.A., 2008. Cloud Computing -- Issues, Research and Implementations. Journal of Computing & Information Technology, 16(4), pp. 235-246. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cloud Computing Research Proposal Example | Topics and Well Written Essays - 3000 words - 1, n.d.)
Cloud Computing Research Proposal Example | Topics and Well Written Essays - 3000 words - 1. https://studentshare.org/information-technology/1415160-telecommunications-and-networking
(Cloud Computing Research Proposal Example | Topics and Well Written Essays - 3000 Words - 1)
Cloud Computing Research Proposal Example | Topics and Well Written Essays - 3000 Words - 1. https://studentshare.org/information-technology/1415160-telecommunications-and-networking.
“Cloud Computing Research Proposal Example | Topics and Well Written Essays - 3000 Words - 1”. https://studentshare.org/information-technology/1415160-telecommunications-and-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cloud Computing

Cloud Computing

This paper ''Cloud Computing Assignment'' discusses that Cloud Computing is one of the modern forms of the readily available technology and favours the business operations and functions largely.... Cloud Computing The term Cloud Computing is utilized by the IT professionals for delivering the computing and technology requirements as an IT service to a community comprising heterogeneous end-recipients.... Most of the information technology experts view the concept of Cloud Computing as a model instead of technology....
6 Pages (1500 words) Literature review

Cloud Computing and Security

In the last few years, the paradigm of Cloud Computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world.... Additionally, its talent to offer users animatedly extendable and collective business resources over web-based technology like internet Cloud Computing prevents large level business expenses.... hellip; This paper ''Cloud Computing and Security'' tells us that the paradigm of Cloud Computing has evolved from a talented business idea....
7 Pages (1750 words) Term Paper

Cloud Computing Storage Issues

This paper ''Cloud Computing Storage Issues'' discusses that the storage of Cloud Computing requires a lot of space, in fact humongous data centers where data is collected and managed.... nbsp;… Cloud Computing delivers numerous benefits along with many security vulnerabilities that are classified as: Customary Security Availability Third Party Security Virtual Machine Issues This type of security is associated with the threats applicable on connecting the workstations to the cloud....
8 Pages (2000 words) Literature review

Benefits of Cloud Computing

The paper "Benefits of Cloud Computing" considers Cloud Computing technology, since its advent in 1950, has become an adorable information sharing platform.... hellip; Cloud Computing ensures that a large volume of information is available within virtual systems and clients across the world can access it effectively.... Cloud Computing is a technology whose history dates back to the 1950s and gradual development of this technology continues even today....
6 Pages (1500 words) Essay

Cloud computing chapter

Companies that are in between investing in a full blown automation and semi-manual operation are normally at a stage where it is taking a long time to… The best solution for these types of companies is Cloud Computing so as not to lose out on revenues from the potential expanded revenue base that is not realized because of the lack of computing capacity. ... loud computing offers Chapter Proposal: Service-Oriented Methodology and technologies for Cloud Computing Topic: governance compliaNT Service ORIENTED Computing chapter summary Cloud Computing offers a cost effective way of scaling information technology investments for start-up and small companies....
2 Pages (500 words) Essay

Information Technology: Cloud Computing

The paper “Information Technology: Cloud Computing” looks at Cloud Computing, which originates from the symbolic use of a cloud to represent the internet in computer network drawings.... Cloud Computing refers to the delivery of hosted services via the internet.... Cloud Computing is based on the convergence of infrastructure.... Cloud Computing is a popular alternative to traditional software licensing....
5 Pages (1250 words) Research Paper

Concepts of Cloud Computing

This report "Concepts of Cloud Computing" sheds some light on the Cloud Computing concepts that are aimed at improving various business operations.... Individuals also benefit from the services of Cloud Computing due to its unique characteristics.... hellip; Cloud Computing has a lot of benefits to its users.... The reduced infrastructure cost is considered as the major advantage of Cloud Computing.... The ability of Cloud Computing services to be accessed from any location is also a major advantage that encourages its use....
9 Pages (2250 words) Report

Cloud Computing and Virtualization

This essay "Cloud Computing and Virtualization" discusses Cloud Computing as the newest major shift in computing.... The widespread Cloud Computing is enhanced by the Internet which plays the integral role of being the most appropriate channel for accessing cloud resources.... hellip; The main reasons why GP-Clinics should use cloud solutions is that Cloud Computing will help it is a national company that owns and runs medical clinics of general practitioners throughout major cities of Australia to improve their health care services, effectively conduct health care research as well as change their current face or develop health information technology....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us