Resource Allocation Using Virtual Machines – Importance, Risks, And Benefits

Security Controls implemented by AWS to protect IaaS instance

Discuss About The Resource Allocation Using Virtual Machines?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Webb’s Stores is a popular retailer of food items and specialty stuffs in Australia. The two major centres of data re in Sydney and Melbourne. The regional centres of data are in Wagga, Brisbane, Bathurst, Port Macquarie and Auckland. They have decided to migrate their database. Webb’s Stores is migrating their database from MS SQL to Amazon Web Services or AWS instance of IaaS (Garg, Versteeg & Buyya, 2013). AWS is one of the best infrastructures of cloud computing. The main advantage of AWS is that it is extremely safe and secure. Moreover, it is absolutely cost effective.

Cloud Service Provider or CSP is a public or private entity, which provides cloud infrastructure, security, applications, and storage or platform services for an entity or organization (Fernando, Loke & Rahayu, 2013). Amazon Web Services or AWS is one of the best cloud infrastructures available in the market. The main advantage of AWS is that it is extremely safe and secure. Moreover, it is absolutely cost effective (Xiao, Song & Chen, 2013). There are various security controls that are implemented by the Amazon Web Services for protecting their IaaS instance. The security controls of AWS are as follows:

Te above mentioned security controls have several advantages and disadvantages. They are as follows:

 Passwords: The main advantage of password is that it secures the entire infrastructure and the infrastructure becomes secured and protected due to this (Avram, 2014). The disadvantage of password is that there are certain software that can easily hack passwords. Often, it is considered as not absolutely secured.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Encryption: The advantage of encryption is that it encrypts or encodes a message and maintains the confidentiality (Dinh et al., 2013). The disadvantage of encryption is that it often creates problems while decoding the message.

Multi Factor Authentication: The main advantage of this type of authentication is that it protects or authenticates the infrastructure of AWS (Hashem et al., 2015. The disadvantage of multi factor authentication is that it is little complicated than other security measures.

Restrictive Firewall Policy: The main advantage of firewall policy is that it detects or prevents all type of virus or malware and thus protects the infrastructure (Fernando, Loke & Rahayu, 2013). The disadvantage is that it has several numbers of vulnerabilities within it.

Intrusion Prevention System: The major advantage of intrusion prevention system is that it detects and prevents intrusion in a system by intruders (Xiao, Song & Chen, 2013). The disadvantage of this system is that they cannot process any encrypted packets in the infrastructure.

Benefits and limitations of the Security Controls

Webb’s Stores will be getting benefitted by the security controls implemented by Amazon Web Services as their infrastructure will be protected by this.

There are several types of risks associated in the migration of database for Webb’s Stores (Avram, 2014). These types of risks are extremely dangerous for both the database and the organization.

The common threats that are associated with migrating of their database are as follows:

Loss of Data: Data might get lost while the database is migrated from MS SQL to AWS instance and it might not be recovered at all.

Database Corruption: Another significant risk associated with database migration (Sanaei et al., 2014). This is extremely common when the database consists of bulk amount of data.

The common risks that are associated with migrating of their IaaS infrastructure are as follows:

Attacks like DoS: Denial of service attacks are the most common risks associated with the migration of the IaaS infrastructure (Whaiduzzaman et al., 2014). The intruder denies the service and the service is slowed down.

Insider Threats: The cloud provider has all the access to the infrastructure. This can turn out to be risky.

The common risks that are associated with communications within Webb’s Stores and their IaaS infrastructure are as follows:

Breaching of Data: Data can be easily and quickly breached while there is any type of communication within Webb’s Stores and the IaaS database of the cloud (Xiao, Song & Chen, 2013). Hacker are responsible for data breaching.

Incompatibility in Database: This is another common risk while there is communications between Webb’s Stores and their IaaS infrastructure.

Backup and archival of records are extremely important for any database. Cloud plays the most significant role in case of backup and archival of records. Amazon Web Services follows extra security while backup and archival of their records (Avram, 2014). There are three steps of movement of records. They are the backup, storage and retrieval of records. However, there are few security issues regarding these steps.

Periodical data back ups are done in AWS.  During this step, certain threats can occur. They are as follows:

Security Issues: Data might get lost while the back up of data is done in the AWS instance and it might not be recovered at all (Whaiduzzaman et al., 2014). This is extremely vulnerable for any organization.

Control over Data: Data back ups are always done by cloud provider. There is always a chance that the confidential data can be intercepted during this (Sanaei et al., 2014). Amazon Web Services take extra care so that the control does not shift to any unauthorized entity.

Risks associated in the Database Migration

Webb’s Stores would be getting extreme benefit from this particular service and their data backup would be easier.

Data is stored for once and when it is done, it should be kept in mind that there are no vulnerabilities present within the storage. Cloud is the best storage for any types of data (Hashem et al., 2015). Amazon Web Services or AWS can help Webb’s Stores so that the data is stored in secured and perfect storage. During this step, certain threats can occur. They are as follows:

Security Issues: Data might get lost while it is stored in the storage of the AWS instance and it might not be recovered at all (Wei et al., 2014). This is extremely vulnerable for any organization.

Lacking in Standardization: The vendor of the cloud often becomes unsuccessful in following the standardization or standard rules of an organization (Rahimi et al., 2013). This is one of the most common risks that occur in data storage.

Webb’s Stores would be getting extreme benefit from Amazon Web Services and the storing of their data would be easier.

This is the third and final step of data migration to any infrastructure. The common risks of this step are as follows:

Data Leakage: There is always a high chance that the data would be leaked during the retrieval of data. AWS takes extra care so that the data is not leaked in the cloud. Once leaked, the data would definitely lose its integrity.(|Tao et al., 2014)

Snooping of Data: There is always a high chance that the intruders snoop in and checks the confidential data when it is retrieved (Sanaei et al., 2014). AWS provides intense care whenever data is retrieved from cloud.

AWS is the best infrastructure for any organization. It provides excess security while backups, storing and retrieval of data from the cloud. Webb’s Stores would be getting all the advantages from this particular infrastructure.

Cloud DR Plan means the backup and restore strategy in a cloud. The CSP is the cloud service provider. Here the cloud service provider is the Amazon Web Services (Arora, Parashar & Transforming, 2013). They have their innovative backup and restore plan for data. This plan helps in maintaining the security of data. Webb’s Stores must opt for the DR Plan of AWS. It is simple in nature. Moreover, it reduces the complications in data migration. The entire database is easily migrated by this strategy (Botta et al., 2012). Webb’s Stores would be the advantage of copying the entire set of confidential data thin the database. These are the major advantages of cloud backup and restore strategy of AWS.

Risks associated with the migration of the database

Access to the infrastructure or instance should be protected. Amazon Web Services protect their access to infrastructure by following few measures or approaches. They are as follows:

Any type of physical access to the infrastructure of cloud welcomes a hacker in the system. This particular access is prevented by Amazon Web Services easily (Rittinghouse & Ransome, 2016). AWS ever allows any type of unauthorized access to infrastructure.

The existing database of Webb’s Stores is the MS SQL Server R2. The access of this cloud instance can be protected by checking the access of the operating system (Rahimi et al., 2014). AWS helps in detecting the wrong access easily.

The cloud network infrastructure can be protected by regularly monitoring the server. This will check and reduce the excess and unsanctioned users from accessing the infrastructure.

The cloud backup and restoration infrastructure is needed to be checked that whether there is any risk or not (Garg, Versteeg & Buyya, 2013). If the access will be mitigated, automatically there would be more security. Two methods are given below.

Passwords: The main advantage of password is that it secures the entire infrastructure and the infrastructure becomes secured and protected due to this (Dinh et al., 2013). The access to the cloud back and restoration infrastructure can be mitigated by implementing passwords in the system.  

 Encryption: The advantage of encryption is that it encrypts or encodes a message and maintains the confidentiality (Almorsy, Grundy & Müller, 2016). The access to the cloud back and restoration infrastructure can be mitigated by implementing encryption algorithm in the system. 

References

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.

Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.

Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.

Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.

Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future generation computer systems, 29(1), 84-106.

Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.

Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.

Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.

Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., & Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), 133-143.

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.

Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.

Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), 1435-1442.

Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.

Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.

Xiao, Z., Song, W., & Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment. IEEE transactions on parallel and distributed systems, 24(6), 1107-1117.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP