Professional Documents
Culture Documents
Cloud Computing (L5)
Cloud Computing (L5)
Submitted by
Student Name:
Problem Statement
ABC.co.uk currently has a robust and efficient cloud infrastructure in place, which greatly
enhances the productivity and effectiveness of its mobile workforce.
Workers need a robust and fortified platform to store, distribute, and retrieve documents
seamlessly across various devices.
The solution should facilitate smooth functionality across both desktop and mobile platforms,
while guaranteeing convenient accessibility to work-related data.
Architectural Design
Deployment Model
Subnet 1
Subnet 2
After Setting it I launched the instance from EC2 in AWS:
After pressing the Launch Instance, the instance was successfully launched:
Steps Followed
To establish your Virtual Private Cloud (VPC), please furnish the ensuing particulars:
Identification label: Assign a descriptive label to your Virtual Private Cloud (VPC),
such as "MyVPC".
The IPv4 Classless Inter-Domain Routing (CIDR) block is a method used to allocate
and manage IP addresses in a more efficient and flexible manner. Please provide the
Classless Inter-Domain Routing (CIDR) block for your Virtual Private Cloud (VPC),
in the format of an IP address followed by a forward slash and a number indicating
the size of the network prefix (e.g., "172.16.0.0/16").
Select the "Create" option in order to generate the Virtual Private Cloud.
After the creation of the VPC, proceed to the "Subnets" segment located in the left-
hand navigation panel and select the option "Create subnet".
To initiate a new EC2 instance, please select the "Launch Instance" option.
During the "Configure Instance" phase, it is recommended to select one of the subnets
that were created in either step 7 or 9 for the instance.
Implementation Procedure
1. Choosing the Right Hardware and Operating System:
Begin by selecting appropriate hardware. For a small-scale implementation, a single machine
can suffice, but for larger deployments, multiple servers are recommended.
Install a Linux operating system, as OpenStack is typically deployed on Linux. Ubuntu
Server is a popular choice due to its extensive support and documentation.
Limited Control and Flexibility: Users of cloud services often face limitations when
it comes to exercising control over the fundamental infrastructure. This could
potentially impact the customization and configuration of different services.
Solution: Opting for cloud services that offer advanced customization features and
heightened control capabilities. Leveraging open-source cloud platforms can also provide
heightened flexibility.
Solution: When selecting cloud providers, it is crucial for businesses to opt for those that
provide flexible bandwidth options and possess a comprehensive understanding of the
bandwidth constraints and pricing framework prior to making any commitments.
Data Loss and Recovery: The potential for data loss arising from technical
malfunctions, inadvertent mistakes, or malicious cyber intrusions is a substantial
apprehension within the realm of cloud computing.
Solution: Regular data backups along with robust disaster recovery as well as business
continuity plans are of utmost importance. Encrypting data both at rest and in transit is a
crucial step in fortifying security measures.
Solution: Leveraging the power of edge computing can effectively minimize latency by
efficiently handling data near its origin. Furthermore, opting for cloud providers that have
strategically located data centers near the user base can effectively reduce latency.
Solution: By implementing robust access control policies, conducting routine security audits,
and employing encryption techniques, the potential risks can be effectively mitigated.
Awareness and training programs for employees about security best practices are crucial.
Identity Theft: Given the ever-expanding repository of personal information residing
in the cloud, the potential for identity theft is undeniably heightened.
Insecure APIs and Interfaces: Cloud services are accessed through APIs, which may
potentially be susceptible to security breaches.
Solution: Employing APIs with robust security measures and conducting routine security
assessments of APIs can mitigate the potential risks.
Insider Threats: Individuals who possess the privilege of accessing the cloud
infrastructure, whether they are employees or partners, have the potential to present a
substantial security concern.
Solution: By implementing the concept of least privilege access, conducting regular audits,
and effectively segregating duties, organizations can significantly reduce the risks associated
with insider threats.
Collusion with Cloud Providers: Engaging in secretive partnerships with cloud service
providers to gain insight into their security measures and guaranteeing their
compliance with the organization's security standards.