Professional Documents
Culture Documents
cloud-computing-use-this-and-get-knowlagde (1)
cloud-computing-use-this-and-get-knowlagde (1)
When submitting evidence for assessment, each student must sign a declaration confirming that the
work is their own.
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who
break the rules, however innocently, may be penalised. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the Internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
Assignment Brief
Student Name/ID
Number
Submission Format
Part 1
A detailed report (approximately 1500 words)
Part 2
A detailed report (approximately 1500 words)
Part 3
Cloud Platform & Recorded video of the Implementing Virtual Machine and other Resources, Attached
reports with relevant Screenshots. (Recorded video file should be uploaded on top of any video
streaming platform and the link should be mentioned on your report)
Part 4
A detailed report (approximately 1500 words)
Please submit your assignment by organizing a folder with your Student ID and batch
information, and make sure to compress the folder into a zip file before submission.
Vocational scenario
The healthcare provider CVS HEALTH CORP experiences fluctuations in patient data storage
needs, especially when adopting electronic health records (EHRs). During the COVID-19
pandemic, they faced a surge in telehealth services. The healthcare provider is looking to
enhance its IT infrastructure to improve patient care, streamline operations, and manage costs
more effectively also Healthcare organizations must adhere to strict data security and
compliance regulations, such as HIPAA (Health Insurance Portability and Accountability Act).
They want to implement a cloud computing solution to address various challenges and
opportunities. By adopting a cloud computing solution, Cloud computing allows them to scale
resources up or down based on demand and this healthcare provider can achieve its objectives
of improved patient care, data security, scalability, cost efficiency, and enhanced accessibility for
both healthcare professionals and patients.
In your role as a cloud solutions architect within your company, you're responsible for providing a
Cloud Computing Service Platform to host their existing healthcare provider application system
that aligns precisely with the specific needs of CVS HEALTH CORP.
Technical Considerations:
Amazon Web Service Provider – Free Tier
EC2 instance type t2.micro
Ubuntu (Amazon Linux 2023, 2023.2.20231030.1 x86_64 HVM kernel-6.1) Free Tier , 20GB
Associating Security Group, Auto Scaling Group and Load Balance.
Assignment activity and guidance
Task 1
1.1 Compare and contrast the healthcare service provider applications currently operating on
traditional computing systems with the cloud-based applications designed specifically for the
healthcare sector. Your main emphasis should center on the transformation from on-premises
systems to the utilization of Cloud Computing in these two chosen applications. [P1]
1.2 Create a suitable Cloud Computing architecture framework for the application of CVS HEALTH
CORP healthcare service provider (A Cloud Computing architecture framework refers to the design
used to build and organize the various components and services within a cloud environment, the
arrangement of resources, software, hardware, networking, and other elements needed to create
and operate cloud-based systems and services). [P2]
1.3 Examine how the migration into a Cloud Computing solution can assist the healthcare provider
CVS HEALTH CORP in achieving its objectives by integrating to a Cloud-based infrastructure. [M1]
1.4 Select the Tools and Technological drivers to implement cloud based CVS HEALTH CORP
healthcare service provider application and Provide proper reasoning for the selection of tools to
be used. [D1]
Task 2
2.1 Describe the suitable cloud deployment model for the above cloud based healthcare
service provider applications. [P3]
2.2 Evaluate a cloud service model to determine the most fitting model for the above
specified scenario. [P4]
2.3 Demonstrate the cloud deployment models utilized in current applications hosted in the
cloud, particularly implemented for the healthcare industry. [M2]
Task 3
3.1 CVS HEALTH CORP has a preference for constructing its server using an open source cloud
framework rather than relying on an on-premises server infrastructure. Considering the
requirements specified by CVS HEALTH CORP for a cloud-based healthcare service system,
identify appropriate open source cloud tools accessible in the cloud market to implement a
Cloud Computing platform for the deployment of healthcare service application. [P5,P6]
(It is recommended that you select AWS EC2 on the free tier and submit your Cloud Computing
platform configuration environments by including a series of properly listed screenshot images,
each accompanied by suitable descriptions, outlining the steps you've taken)
3.2 Developing a cloud platform involves various challenges and constraints that can affect the
process. As a Cloud Architect, explore the challenges and limitations encountered throughout
the development of the above cloud platform. [M3]
3.4 Addressing these above issues, explore the required strategies to address and overcome these
challenges and constraints effectively. [D2]
Task 4
4.1 Cloud Computing, despite its many advantages, can encounter various challenges. Identify some
primary issues commonly encountered in a Cloud Computing platform and explore suitable
solutions to mitigate these challenges. [P7]
4.2 Cloud Security concerns in a cloud computing platform which presents a range of complex issues
due to the shared responsibility model between the cloud service provider (CSP) and the user.
Mitigating these security concerns requires a concerted effort by both the CSP and the users to
ensure a robust and comprehensive security posture within the cloud environment. It demands a
proactive and vigilant approach to minimize the risks associated with data breaches and
unauthorized access represent a critical security issue in cloud environments. Discuss the above
mentioned two issues with the appropriate real-world examples in cloud computing platform.
[P8]
4.3 Creating a secure cloud platform involves a parallel approach that addresses various potential
vulnerabilities in the implementation of Cloud Mitigation. Addressing these Security
challenges
discuss appropriate solutions and strategies to overcome these issues when building a secure cloud
platform to enhance the security posture of a cloud. [M4]
4.4 Data migration to a cloud solution poses both opportunities and risks regarding data
protection. Considering some critical considerations, Discuss how CVS HEALTH CORP should
safeguard
their data during the migration process from on promises to the Cloud Platform. [D3]
Recommended Resources
Please note that the resources listed are examples for you to use as a starting point in your
research – the list is not definitive.
LO1 Demonstrate an understanding of the fundamentals of Cloud Computing and its architectures
P1 Analyze the evolution and M1 Discuss why an organization LO1 & LO2
fundamental concepts of Cloud should migrate to a Cloud
Computing. Computing solution D1 Justify the tools chosen to
P2 Design an appropriate realise a Cloud Computing
architectural Cloud Computing solution.
framework for a given scenario.
LO2 Evaluate the deployment models, service models and technological drivers of Cloud Computing and
validate their use
P3 Define an appropriate deployment M2 Demonstrate these deployment D1 Justify the tools chosen to
model for a given scenario. models with real world examples realize a Cloud Computing
P4 Compare the service models for solution.
choosing an adequate model for a
given scenario
LO3 Develop Cloud Computing solutions using service provider’s frameworks and open source tools
P5 Configure a Cloud Computing M3 Discuss the issues and constraints D2 Critically discuss how one
platform with a cloud service provider’s one can face during the development can overcome these issues
framework. process. and constraints
LO4 Analyze the technical challenges for cloud applications and assess their risks
P7 Analyze the most common M4 Discuss how to overcome these D3 Critically discuss how an
problems which arise in a Cloud security issues when building a organization should protect
Computing platform and discuss secure cloud platform. their data when they migrate to
appropriate solutions to these a cloud solution.
problems.
P8 Assess the most common security
issues in cloud environments.
Guidance for Students
NOTE:
You should include the COVER PAGE, Assessment Declaration form and Unit
Review Plan of this assignment when you submit your final report.
If submitted after the extended deadline, the assignment will not be accepted
whereas you shall be asked to go for a NEW assignment.
Late Submission is not permitted until otherwise recommended by the Assessor /Course
Coordinator.
Plagiarism will be treated as a very Serious academic misconduct.
Instructions to students:
1. All assignment should comprise of the standard Front Cover given. No other
front page will be accepted.
Tables
Table 1.Compare cloud computing models..................................................................................43
Task 1
The number of cloud storage suppliers online appears to develop each day. At this moment,
Dropbox is the reasonable pioneer in smoothed out cloud storage permitting clients to get to
documents on any gadget through its application or site with up to 1 terabyte of free storage.
Google's email specialist organization Gmail, then again, gives limitless storage on the cloud.
Gmail has changed the manner in which we send messages and generally answerable for the
expanded utilization of email around the world.
A marketing cloud is a start to finish advanced marketing platform for clients to oversee
contacts and target leads. Maropost Marketing Cloud consolidates simple to-utilize marketing
computerization and hyper-focusing of leads. Simultaneously, guaranteeing messages really
show up in the inbox, because of its high level email deliverability abilities.
(real world examples of cloud computing, n.d.)
Security
Flexibility
Mobility
Insight
Increased Collaboration
Quality Control
Disaster Recovery
Loss Prevention
Technical Issues
Downtime
Internet Connectivity
Lower Bandwidth
Lacks of Support.
(Advantages and Disadvantages Of Cloud Computing, 2021)
Platform-as-a-service (PaaS), where the supplier has instruments for general software
improvement on their cloud infrastructures;
1. Resources pooling
Asset pooling is one of the basic attributes of Cloud Computing. Asset pooling implies that a
cloud service supplier can divide resources between a few clients, giving everyone an alternate
arrangement of services according to their requirements. It is a multi-customer strategy that can
be applied to data storage services, handling services, and bandwidth offered types of
assistance. The administration cycle of allotting resources progressively doesn't conflict with the
customer's experience.'
3. Easy to maintenance
This is one of the best cloud qualities. The servers are easily kept up, and the personal time
stays low or absolutely zero now and again. Cloud Computing fueled resources go through a
few updates as often as possible to enhance their capabilities and potential. The updates are
more feasible with the gadgets and perform faster than the past versions.
7. Security
Data security is one of the best qualities of Cloud Computing. Cloud services make a duplicate
of the data that is put away to forestall any type of data misfortune. On the off chance that one
worker loses the data by any possibility, the duplicate version is reestablished from the other
worker. This element comes handy when a few clients work on a specific record progressively
and a document out of nowhere gets undermined.
8. Automation
Automation is a basic attribute of cloud computing. The capacity of cloud computing to
naturally introduce, configure, and keep a cloud service is known as automation in cloud
computing. In basic terms, it is the way toward capitalizing on technology and decreasing
manual exertion. Be that as it may, to accomplish automation in the cloud ecosystem isn't so
easy. Upon fruitful deployment, these resources require constant maintenance too.
9. Resilience
Resilience in cloud computing implies the capacity of the service to rapidly recuperate from any
disruption. A cloud's resilience is measured by how quick its servers, databases, and network
system restarts and recuperates from any sort of mischief or harm. Accessibility is another
significant quality of cloud computing. Since cloud services can be accessed distantly, there is
no geographic restriction or limitation with regards to using cloud resources.
Conclusion
Different highlights of cloud computing are assisting the two hosts with welling the customer. A
host contains various preferences as well, which advantage the clients. Nowadays, the
organization is in extraordinary need of data storage. The previously mentioned attributes of
cloud computing settle on it a famous decision among different organizations across industries.
Front End
Back End
Every one of the ends is connected through a network, generally Internet. The accompanying
chart shows the graphical perspective on cloud computing architecture:
The front end is utilized by the client. It contains client-side interfaces and applications that are
needed to access the cloud computing stages. The front end incorporates web servers (including
Chrome, Firefox, internet explorer, and so on), thin and fat clients, tablets, and mobile devices.
Back End
The back end is utilized by the service supplier. It deals with all the resources that are needed to
give cloud computing services. It incorporates a colossal measure of data storage, security
mechanism, virtual machines, deploying models, servers, traffic control mechanisms, and so on
Note: Both front end and back end are connected to others through a network, for the most part
utilizing the internet connection.
(Author's Work)
1.4 Why an organization should migrate to Cloud Computing
solution.
Many businesses have adopted cloud computing within their operative in the past few
years. Cloud computing or on-demand computing because it is usually referred to as
refers to a system of mistreatment laptop services over the web.
Companies pay great amount of cash developing and putting in software package to
boost their operations. Cloud computing allows your business to access software
package on the web asa service. Cloud computing is additionally safe means of storing
and sharing.
Unit: Cloud
Computing
1.4.1 How do you secure your data while transferring on the cloud?
Cloud computing has been a boon to the recent college grads and the universe of technology for
evident reasons. not exclusively does it permits data storage and the board, yet in addition helps
in accessing data whenever, anyplace over the internet. While cloud computing comes in with a
great deal of focal points, yet when the question of wellbeing emerges, we can't be excessively
certain regarding how secure the data is, especially the ones put away in a public cloud. The
security issues confronted can be extensively arranged into concerns looked by cloud supplier
and those looked by the customer. Cloud service suppliers should guarantee that their
infrastructure is secure and their users' data is ensured. Simultaneously, customers should make
sure they secret word secure their applications and have other verification measures in place.
Malware infections
Hacked interfaces
Insider danger
Hijacking of records
Nonetheless, the potential dangers to our data don't mean they can't be made secure. Cloud
security can be made successful if appropriate cautious measures are actualized.
Here are a couple of down to earth tips, which will make your cloud experience hazard free.
Conclusion
Cloud storage accompanies its own arrangement of points of interest in numerous manners than
one. However, consistently remember that security confirmations are not ensured, yet
conceivable. Adopting not many security measures from our end, similar to the
abovementioned, can go a long route in maintaining safe documents on and off cloud.
Task 2
2.1Cloud computing deployment models.
What are the most well known cloud deployment models? There are four types: public, private,
hybrid and community clouds. Moreover, there are likewise appropriated clouds that are not as
boundless, for example, multi clouds, poly clouds and different models.
Before we plunge into the basics of the most mainstream cloud computing deployment models,
we should sort out what a cloud deployment model is actually. A cloud deployment model is a
particular configuration of climate boundaries, for example, the openness and ownership of the
deployment infrastructure and storage size. This implies that deployment types shift contingent
upon who controls the infrastructure and where it's found.
Above situation given private cloud deployment model is utilizing by CVS HEALTH
CORP association. Since, utilization of private clouds includes capital consumption,
however the use is still lower than the expense of possessing and working the
infrastructure because of private clouds' more noteworthy degree of solidification and
asset pooling. Private clouds additionally offer more security and consistence uphold
than public cloud. CVS HEALTH CORP give IT assets to both sort of areas. CVS
HEALTH CORP has been giving everyday ICT administrations for differentiated
customer story including multinational organizations, government area, private
establishments, non-benefit associations, colleges, Schools, community-based
associations and people
2.1.5 The advantages of using a private cloud
1. Performance
Because of the way that there is no compelling reason to divide among different clients, there is
consistently a critical pace of move. Therefore, Private cloud gives more prominent degree of
performance. And likewise Private cloud is situated behind a firewall, which implies that there
are less odds of web security chances.
2. Security
Utilizing Cloud computing implies that you are rethinking your data. Because of this the
security of the data totally depends upon the specialist co-op. Private cloud guarantees
additional degree of security making it ideal for huge organizations with delicate and secret
information. The data is available inside an ensured climate that is exclusively allotted for your
business.
3. Availability
The entirety of the Cloud computing models permits clients to get to their administration
whenever and anyplace. As far as Private cloud this is significantly higher. Private cloud is
known for their interesting infrastructure which causes the client to control conveyance and
guarantee their greatest availability.
4. Resources
The greater part of the Private cloud specialist co-ops utilize their virtualization technology.
Rather than genuine resources, virtual servers and protections are being utilized. Therefore,
generally speaking expense of IT spending is fundamentally diminished which diverts you to
put more in business.
5. Control
Control is known to be one of the positive highlights of the Private cloud. Because of the
presence of hardware on location, the organization will have the option to control their data to a
much serious degree. This implies that total oversight of the data should be possible through the
way toward monitoring.
6. Flexibility
Flexibility is one the fundamental reasons why a considerable lot of the organizations are
moving toward cloud. Regardless of whether that can be Public, Private or Hybrid cloud, the
clients are consistently profited. Be that as it may, on account of Private cloud, the flexibility is
undeniably more better. Utilizing a Private platform implies that there is no really a similarity
issues for the applications. Indeed Private cloud has the capacity to get shaped according to the
manner in which client needs.
(Roomi and Roomi, 2021)
Cloud service models come in three types: SaaS (Software as a Service), IaaS (Infrastructure
as a Service) and PaaS (Platform as a Service). Each of the cloud service models has their
own set of benefits that could serve the needs of various businesses.
Infrastructure as Infrastructure as an Usually platform Grid computing, utility Avoid capital Business efficiency
a service (Iaas) asset independent; computing, compute expenditure on and productivity
are shared and thus cloud bursting, multi- resources the vendor’s
reduced; tenant computing, reduced ROI risk capabilities
resource pooling potentially greater
service level low barriers to entry
agreements (SLAs); long-term cost
streamlined and
pay by usage; automated scaling centralization
requires new/
self-scaling
different security
measures
Platform as a License purchasing Consumes cloud Solution stack Streamlined version Centralization
service (Paas) infrastructure; deployment requires new/
semantic
interoperability
Table 1.Compare cloud computing models
In the above scenario given SaaS (Software as a Services) is used by CVS HEALTH CORP. Because, they provides virtualized computing
resources over the internet. web hosting, DNS hosting, storages, virtualization, IT outsourcing, DR sites and other ICT facilities for people.
Solution
Installing or updating the VMware Tools is quickly accomplished through the vSphere Web
Client. This installation or update may not even require a reboot of the virtual machine guest
OS. If VMware Tools need to be upgraded, you’ll be prompted on the Summary tab of the
virtual machine
solution
Removing memory limits is easily done by setting the limit back to zero. Unfortunately, finding
memory limits can be more challenging than actually removing the limit. Without the right
tools, determining whether you have any memory limits configured in your virtual
infrastructure, you need to manually look through each virtual machine in your inventory by
going into the settings of each virtual machine and verify whether a memory limit is configured
3.3.3 Virtual Machine Logging Limitation
Virtual Machine Logging Limitation The last of the five most common virtual machine issues is
related to virtual machine logging. VMware vSphere offers a number of different log files that
are stored in different places. Log files are used to provide more detailed information. Usually
that detailed information is used Solving the Five Most Common VMware Virtual Machine
Issues Page 17 during the troubleshooting of a problem in the virtual infrastructure. One of
those log file is the virtual machine log file, vmware.log. By default, the vmware.log file is only
rotated when a virtual machine is restarted and six old logs are retained. Because many virtual
machines are likely stored in the same datastore, a malicious attacker could try to find ways to
flood log files in order to fill the datastore and thus bring down all virtual machines running
inside that datastore. To prevent a virtual machine log file from being maliciously flooded
(which can lead to denial of service) you should limit the number and size of the log files ESXi
generates.
solution
Because VMX configurations can only take effect at power on, that means that after you make
these logging additions to your VMX file, you will have to reboot your virtual machines. To
make the changes necessary, you will need to add these lines to the VMX file with the VM
powered off:
• log.rotateSize = <1000000=
• log.keepOld = <3=
• Note: The logrotate Size value is in bytes (such that 16384 would be 16MB) and the log.
keepOld is the number of logs to keep.
These log tweaks will ensure that your log file doesn’t grow forever and potentially fill the
datastore where many other virtual machines are running
Task 4
(Editorial, 2021)
Conclusion
The security of your migration will rely upon the kind of cloud you pick, the supplier, and the
particular advances you take. Incorporate security into your migration technique. Subsequent
to migrating, effectively screen your frameworks to guarantee that your information is
remained careful. You can likewise exploit the security instruments and assets accessible to
you.
The accepted procedures that suppliers set up depend on their own skill and the encounters of
different clients. Taking some additional time beforehand to consider security can save you
time, exertion, and guarantee client trust down the line.
Gantt chart
Harvard Reference
Azure.microsoft.com. 2021. What Is Cloud Computing? A Beginner’S Guide | Microsoft
Azure. [online] Available at: < https://azure.microsoft.com/en-us/overview/what-is-cloud-
computing/ > [Accessed 24 January 2021].
Editorial, H., 2021. Seven Tips For Protecting Your Data During A Cloud Migration. [online]
Horizon. Available at: <https://www.horizontechnology.com/news/seven-tips-for-protecting-
your-data-during-a-cloud-migration/>
[Accessed 19 January 2021].
Dashow, J., 2021. Top Reasons To Move To The Cloud. [online] Loffler.com. Available at: <
https://www.loffler.com/blog/top-reasons-to-move-to-the-cloud >
[Accessed 24 January 2021].
Hackernoon.com. 2021. 7 Effective Tips To Secure Your Data In The Cloud | Hacker Noon.
[online] Available at: < https://hackernoon.com/7-effective-tips-to-secure-your-data-in-the-
cloud-820bfe438d2 >
[Accessed 24 January 2021].
SaM Solutions. 2021. 4 Best Cloud Deployment Models [An Overview] | Sam Solutions.
[online] Available at: < https://www.sam-solutions.com/blog/four-best-cloud-deployment-
models-you-need-to-know/ >
[Accessed 24 January 2021].
PhoenixNAP Global IT Services. 2021. 30 Cloud Monitoring Tools: The Definitive Guide
For 2021. [online] Available at: < https://phoenixnap.com/blog/cloud-monitoring-tools >
[Accessed 24 January 2021].
Duc, H., 2021. Top 7 Cloud Security Issues And How To Overcome Them By Gilad David
Maayan. [online] Hakin9 - IT Security Magazine. Available at: < https://hakin9.org/top-7-
cloud-security-issues-and-how-to-overcome-them/ > [
Accessed 24 January 2021].
Roomi, M. and Roomi, M., 2021. 6 Advantages And Disadvantages Of Private Cloud |
Limitations & Benefits Of Private Cloud. [online] HitechWhizz - The Ultimate Tech
Experience. Available at: < https://www.hitechwhizz.com/2020/05/6-advantages-and-
disadvantages-risks-benefits-of-private-cloud.html >
[Accessed 24 January 2021].
Editorial, H., 2021. Seven Tips For Protecting Your Data During A Cloud Migration. [online]
Horizon. Available at: https://www.horizontechnology.com/news/seven-tips-for-protecting-
your-data-during-a-cloud-migration/
[Accessed 24 January 2021]