THANGLNGCS18608 Unit 16. Assignment 02
THANGLNGCS18608 Unit 16. Assignment 02
THANGLNGCS18608 Unit 16. Assignment 02
Submission Format:
LO4 Analyse the technical challenges for cloud applications and assess their risks
Task 1
Base on the scenario and architecture design in the first assignment provide the implementation. Because
of the time constraint of the assignment, the implementation just provides some demo functions of the
scenario. The implementation includes two parts:
Task 2
The table of contents in your security manual (which should be 500–700 words) should be as follows:
LO4 Analyse the technical challenges for cloud applications and assess their
risks
P7 Analyse the most common M4 Discuss how to overcome these D3 Critically discuss how an
problems which arise in a Cloud security issues when building a organisation should protect their
Computing platform and discuss secure cloud platform. data when they migrate to a cloud
appropriate solutions to these solution.
problems.
P8 Assess the most common
security issues in cloud
environments.
ASSIGNMENT 2 FRONT SHEET
GCS0706PPT – Cloud
Class Assessor name Ho Nguyen Phu Bao
Computing
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P5 P6 P7 P8 M3 M4 D2 D3
❒ Summative Feedback: ❒ Resubmission Feedback:
P5 Configure a Cloud Computing platform with a cloud service provider’s framework. & P6 Implement a cloud platform using open source tools. 8
P7 Analyse the most common problems which arise in a Cloud Computing platform and discuss appropriate solutions to these problems..........25
Inability to deliver and maintain a cloud solution under one umbrella with various brands.....................................................................................27
Downtime.................................................................................................................................................................................................................. 29
Attack threat.............................................................................................................................................................................................................. 31
Lock-in Vendor........................................................................................................................................................................................................... 31
Concerns on expense................................................................................................................................................................................................. 32
Advantages:............................................................................................................................................................................................................... 39
Obstacles:.................................................................................................................................................................................................................. 40
Completion................................................................................................................................................................................................................ 44
References................................................................................................................................................................................................................. 45
LO3 Develop Cloud Computing solutions using service provider’s
frameworks and open source tools
P5 Configure a Cloud Computing platform with a cloud service provider’s framework.
& P6 Implement a cloud platform using open source tools.
- First I’m create a folder to contain my project.
I’m using git to get my code that I was post on github.
There are also internal processes and workflows involved with a cloud sector.
Everything so many suppliers of services get their minds around. They have
They know that they have immense infrastructure at their hands in the cloud, but not everyone knows what to sell or how to
advertise and sell a cloud service. Because of this, they are grappling with problems such as is there any automated cloud-based
technology available that lets organizations simplify their distribution processes or what is the best marketing automation platform
In other examples, they do not have the requisite workforce skills or the staff are unable to adjust to the techno-commercial
mentality that any cloud organization requires. Some still struggle with automation. They don't understand how their overheads are
Cloud infrastructure is a subscription model, allowing its consumers the option to scale services up or down, ensuring that CSPs need
to charge their end consumers on a pay-per-use basis. There are also different ways to purchase on-demand, prepaid, dedicated
space, and corporate arrangements for cloud services every month, and this trend is apparently going to intensify over time.
The price of the cloud is very complicated, because unlike the billing process used in the conventional buy-sell model, it's billing.
Often, pricing models for SaaS, IaaS or PaaS differ greatly. The need for an integrated invoicing tool for CSPs has spawned this
uncertainty. There are, however, many third-party tools currently on the market to support service providers, but finding the best
The Cloud is a thriving business, no wonder. Cloud applications are now in demand with benefits such as scalability, accessibility, and
convenience, and demand will certainly spiral in the future. This has and would contribute to accelerated migration of and analysis
of more sensitive data. It is also the sole duty of the CSP to safeguard consumer records.
Security is also regarded as the shared responsibility of both the cloud for several occasions
The provider and the consumer. The management of servers, infrastructure and networking is definitely the responsibility of the
The user is definitely responsible for software , operating systems, identity and access control, and network traffic security. So,
cloud service, providers need to focus as feverishly on their security requirements as they are working to improve their technical
capabilities.
The blurred lines find it difficult to solve security concerns and issues in cloud computing, but identifying role-based user control and
granting permissions at the ground level will definitely benefit both sides.
Inability to deliver and maintain a cloud solution under one umbrella with various brands
This is one of the greatest problems of cloud computing. The client now is an a deal in the driver's seat. They are seeking to step
away from yesterday's architecture to move to quickly configurable structures that are the solution to the problems they face in
industry. Customers are still searching for such CSPs who will provide them with a completely application-aware 'business-ready' IT
service management cloud network and help them clear a stable road to sustained innovation. Ironically, while an advantage, it is
another obstacle for CSPs to develop the ability to construct and deliver the sort of multi-cloud services that their clients want.
Today, CSPs still fall short of effectively combining multiple cloud technologies from different vendors and offering bundled solutions
There are numerous cloud applications available today in the cloud industry , providing consumers simple choices while creating a
In this crowd, provider to distinguish and stand out. CSPs need to present their goods in a special way, to market them, with the
As per the figures below, the total amount of years a consumer spends with the main supplier is 3.2. So, you need to create a long-
Downtime
Downtime is often cited as one of cloud computing 's greatest drawbacks. Service outages are still an unpleasant probability and can
arise for any cause, because cloud storage networks are internet-based. Will your organization bear the consequences of an outage
or a slowdown? In 2017, an outage on Amazon Web Sites cost up to $ 150 million dollars for publicly traded firms. Unfortunately, no
organization, particularly when vital business processes do not afford to be disturbed, is safe. A wide number of industries and
networks is struck by outages in June and July of 2019, including Cloudflare (a major supplier of online services), Google , Amazon,
Shopify, Reddit, Verizon, and Spectrum.
Although cloud service providers adopt the latest security practices and industry certifications, the storage of data and essential
It still brings up risks for suppliers. Security and privacy, particularly when it comes to handling confidential data, must be discussed
in any discourse concerning data. We do not ignore what happened at Code Space and the hacking of their AWS EC2 console,
leading to the deletion of data and the company's eventual shutdown. Their dependency on cloud-based remote computing meant
Of necessity, maintaining and safeguarding the underlying hardware architecture of a deployment is required for every cloud service
provider. Your duties, though, lie in the area of user access control, and it is up to you to consider all the risk scenarios carefully.
While recent credit card data attacks and user login passwords are still fresh on the public's minds, measures have been taken to
ensure data protection. The General Data Protection Rule (GDPR), which was recently implemented in the European Union to allow
consumers greater power of their data, is one such example. Nevertheless, you always have to be mindful of your tasks and obey
best standards.
Attack threat
Any part is online in cloud computing, which shows potential vulnerabilities. From time to time, even the strongest teams experience
extreme threats and data violations. Since cloud infrastructure is designed as a public utility, before you learn to walk, it's simple to
run. After all, before issuing you an account, no one at a cloud provider tests your administration skills: all it takes to get started is
As the service provider fully controls, operates and tracks the cloud assets, it passes limited power to the user. Cloud users can find
that they have less control over the functioning and execution of services within a cloud-hosted infrastructure to varying degrees
(EULA) and management policies can place limitations to what their implementations may do for clients. Customers maintain
ownership of their software, records, and facilities, but their backend infrastructure may not have the same degree of control.
Lock-in Vendor
A further potential downside in cloud storage is vendor lock-in. Fast switching between cloud providers is a service that has not
matured entirely yet, and it can be difficult for companies to move their services from one provider to another. Differences between
provider systems will cause problems in switching from one cloud platform to another, which may be equal to added costs and
nuances of setup. Gaps or compromises made during migration may also expose the data to additional flaws in security and privacy.
Concerns on expense
It can be viewed as costly to implement cloud solutions on a small scale only for short-term initiatives. In terms of IT cost savings,
however, the most critical cloud computing advantage is. More simplicity and lower hardware costs can be offered by pay-as-you-go
cloud providers, but the average price tag could end up being higher than you anticipated. If you are confident of what would fit well
for you, playing with a range of offerings is a smart idea. Cost calculators made available by providers such as Amazon Web Services
Recognize the different interests, expectations and desires of all workers and take an educated approach to the transition of
Required and how it can be generated along with the consequences it can offer. Have good contact beforehand, gather the best
skills and competencies, outline how both business success and individual departments will benefit from technologically trained
workers. CXOs must now wholeheartedly embrace digitalization and experiment using powerful new instruments and cloud
technologies. They need to take time to think about them and the impact they can have on corporate operations and the quality of
services. The key thing of interest in order to exploit the cloud is that cloud computing service providers should first consider the
best technologies they should have in place to ease enterprise cloud management.
CSPs should figure out who has the right cloud billing approach that suits their expectations in order to solve cloud billing problems.
They should follow a versatile cloud subscription billing management framework after considering the pros and cons of a cloud
billing software that can help them handle ongoing cloud billing and also assist them with minimal hassles in upselling and cross-
Create a framework that gives the visibility of your billing staff and your clients into service billing from a central location. This will
allow you to handle your billing efficiently, while accountability and self-sufficiency will be appreciated by clients. Ultimately, you can
To maintain protection, enforcement is important. In their offerings, CSPs can design security. They should be more specific on what
is permitted to go where, and under what kind of protection. A CSP wants a cloud storage system that satisfies regulatory
compliance for best consumer data security and enables CSPs to set permissions and stringent access controls for this purpose. CSPs
should ensure that, regardless of where it exists and with whom it is communicated, they have access and influence over the data.
Inability to deliver and maintain a cloud solution under one umbrella with various brands
CSPs need an overarching architecture built to operate seamlessly from hardware to software in the multi-cloud world to meet this
current collection of specifications. CSPs can use an extensible architecture for the distribution of cloud applications that enables
them to easily install new services with much fewer operating restrictions and efficiently interact with various systems and
technologies.
Second, create a basic and transparent product portfolio based on your customers' desires and then learn about branch-specific
product portfolios in order to become more unique in the industry. Pick a marketplace and product presentation site that helps you,
under every price model, to sell anything and anything to your clients.
From utilities.
- If the services have a poor failure threshold, recommend multi-region implementations with automatic failover to ensure the best
- Developing and executing a disaster recovery strategy that includes the lowest possible recovery time (RTO ) and recovery point
- Expect the implementation of dedicated connections such as AWS Direct Link, Azure ExpressRoute or Dedicated Interconnect or
Partner from Google Cloud Interconnect. Link. Such networks provide a dedicated network connection between you and the point of
presence of the cloud provider. This will decrease sensitivity to the possibility of public internet market disruption.
- On your Service Level Agreement ( SLA), read the fine print. Will you have 99.9 percent uptime promised or even better? That 0.1%
- Know who should have access to each resource and facility and restrict access to the minimal right. You will like their effect to be as
limited as possible if an employee goes wild and gets access to the deployment.
- Ensure that the talents of the staff are up to the challenge. A brilliant report to learn how to minimize security and privacy issues in
- Take a risk-based approach to protecting cloud-based infrastructure and applying security to computers.
- Encryption, cryptography, encryption. Wherever you can comfortably win, turn on encryption on object storage such as Amazon S3
or Azure Blob Storage where consumer data mostly remains. In July 2019, the simple act of turning on encryption on S3 may have
stopped the Capital One data breach that leaked the knowledge of 100 million people.
- Ensuring that security protocols and practices are tested and revised periodically.
- Delete keys to passwords from accounts that do not have to log on to services.
- Use best practices and compliance for any open source program that you are
Of. Used.
These activities will help the company track sensitive data disclosure and movement, secure critical networks from attack and
compromise, and authenticate access to resources and data to safeguard against additional threats.
P8 Assess the most common security issues in cloud
environments.
The business community is really involved in cloud computing. This article offers some basic background on security and security, as
well as the deployment of enterprises and businesses using cloud computing technologies. General presentation on cloud computing
Only in recent years has the term Cloud Computing emerged. Amazon fostered Cloud Computing research and implementation in
mid-2007. Shortly thereafter, cloud computing was forced to expand stronger and stronger with the inclusion of major corporations
More and more enterprises are interested in creating software for cloud computing, such as Microsoft , Google, Intel, IBM, etc. That
has generated a huge application market. Cloud networking, allowing people and companies who want to "cloud" their software and
data more options. In the future, cloud infrastructure growth will concentrate on three key issues, according to experts, including:
interoperability (federated), automation (automated) and terminal identity client (aware ware). There are also new approaches to
the automation of information technology that enable users to respond in a faster, more reliable and cost-effective way to user
requests. Related clouds will allow resources to be organized more easily, while endpoint-aware clouds will optimally take advantage
In cloud infrastructure, all information technology-related possibilities are offered in the form of 'Services,' where consumers access
technology services from a given provider. "In the cloud," without being worried with the technology's server resources. Software as
a Service (SaaS), Infrastructure as a Service (IaaS) and Application as a Service ( PaaS) are the three most basic frameworks widely
Advantages:
- Low investment costs: users require time and capital to develop plans, invest in facilities, spend equipment and management
according to the conventional model to acquire facilities, machinery and human capital .... In the cloud computing model with the
slogan "Pay as you use" (users only have to pay for what they have used), these problems can be addressed in the cloud computing
model with the slogan "Pay as you use" (users only have to pay for what they have used). This expense is not minimal and it is often
not used properly, for example, does not satisfy the demand or does not use maximum power during use.
- High processing speed, no longer reliant on the platform and geographical location: enables users to access and use the system
anywhere and on any device (such as a PC or mobile device ...) via web browser.
- Easy to extend and update: Customers only need to send a request to the service provider instead of needing to spend in new or
revamped infrastructure , applications, management staff ... to expand or upgrade the system with cloud storage.
Obstacles:
- Privacy: data about users and data stored on the cloud is not guaranteed to be confidential and can be used for other uses as well.
- Availability: cloud storage centers or network networks can have difficulties, causing cloud servers to "hang" suddenly, meaning
that at some time periods, customers can not access their services and data.
- Data failure capability: some cloud online data storage systems suddenly stop operating or stop delivering services, including, for
some reason, information in some situations. The customer is missing and is unable to be recovered
- Protection ability: the issue of concentrating data on the cloud is an affected wat to increase security, but on the other hand it is
the concern of cloud computing services customers that all data can be taken over if the cloud is attacked or compromised.
Classification in cloud computing:
Cloud computing can essentially be categorized as follows:
- Public Cloud: public cloud software, computing and other services are made open to the public by an open service provider. Those
facilities are free of charge or paid for (pay-per-usage) by use. User data in the public cloud will typically be maintained in the cloud
- Private Cloud: a cloud storage infrastructure that only exists with a single person, whether managed, stored internally (internal) or
by an external third party. Users will be assured of better data protection with the private cloud, which is ideal for users who have
- Hybrid Cloud: a part of two or more clouds (private and public cloud) that remain the only organizations but unite them, offering
the advantages of several models of implementation. Companies and individuals can manage mistakes by using the "Hybrid cloud"
architecture, paired with instant on-site usability without relying on an internet connection.
Layer 1: A single-time password (OTP) authentication layer is a widely deployed method for users using cloud storage. Highly secure
networks can need both user and vendor authentication, but only one-way authentication for free cloud services (Figure 3).
Layer 2: By an encryption algorithm, this layer guarantees data security (Data Encryption), data integrity (Data Integrity) and user
The data security model uses VPN Cloud to ensure that the data on the channel is protected, to encrypt the path between private
clouds with each other and between users, people use VPN cloud (VPN Cloud). The Cloud. For organisations with high data
protection requirements, the enterprise cloud computing model (Private Cloud Computing) is often preferred when implemented.
The communication between users and the cloud as well as the connection between private clouds would be secured and protected
Recently, in addition to supplying companies with cloud infrastructure models and services, providers are seeking to bring their
cloud technologies and services to developed countries' state administrative agencies. Famous cloud providers such as Amazon EC2,
Microsoft Azure, IBM have Smart Cloud Business, Google offers App Engine, Redhat offers Redhat's Openshift, VMware has Cloud
Foundry, Vietnam's Information and Digital Content Industry Institute has iDragon Clouds ... Google Cloud, Redhat's Openshift,
VMware Cloud Foundry, and NISCI iDragon Clouds are PaaS open source, allowing deployment on a lo lo lo lo According to several
analysts, by 2020 , the number of public cloud users would reach 1 billion. It is estimated that about 1 billion users typically use
Microsoft Office, OpenOffice or LibreOffice, Microsoft Exchange or Sharepoint, IBM Lotus Notes in the world in 2012, and that
technology. The introduction of cloud computing has not only been applied for small to medium-sized businesses or sole customers,
but for major enterprises and state agencies. The concern is whether the use of cloud storage is always secure for the safety of
users, honesty of records, confidentiality.... This is still a problem that in the future needs to be explored.
References.
[1]. Jadoun, M., 2020. Biggest Cloud Computing Challenges For Service Providers In 2020. [online] RackNap Blog - A Guide to
Automate Web Hosting and Cloud Business. Available at: [Accessed 24 October 2020].
[2]. Cloud Academy. 2020. Disadvantages Of Cloud Computing - Cloud Academy Blog. [online] [Accessed 24 October 2020].
[4]. Golden, B., 2020. 3 Key Issues For Secure Virtualization. [online] CSO Online. [Accessed 24 October 2020].
[5]. Default. 2020. Network Security Basics - Definition, Threats And Solutions | Computer Network | Comptia. [online] [Accessed 24
October 2020].
[7] Book – Cloud Computing Concepts, Technology & Architecture – Cloud Computing 2020, University of Greenwich (Alliance
with Vietnam FPT Education), United Kingdom.
[8] Heroku.com. (2020). Platform as a Service | Heroku. [online] Available at: https://www.heroku.com/platform [Accessed 24
October. 2020].
[10] SearchCloudComputing. (2020). Five open source tools for building and managing clouds. [online] Available at:
https://searchcloudcomputing.techtarget.com/tip/Five-open-source-tools-for-building-and-managing-clouds [Accessed 24 October.
2020].