USE AS A REFERENCE FOR PROJECT PHASE 3 ASSIGNMENT
PROJECT PHASE 2
Jerry L. Quarles
School of Engineering & Computer Science, Liberty University
Jerry L. Quarles
I have no known conflict of interest to disclose.
Correspondence concerning this article should be addressed to Jerry L. Quarles.
Email: [email protected]
Table of Contents
The Ultihub cloud technology architecture, as defined by Red Hat, offers stability for the safeguarding of apps, security, and privacy in IT networks that includes workload mobility, coordination, and administration across different IT environments (Yeluri & Castro-Leon, 2014). Red Hat defines hybrid cloud security. The ISO/IEC 17788-20144 standard defines a hybrid cloud as one that uses at least two different cloud deployment methodologies. According to Gartner, a leading IT research and analytics firm, 90 percent of organizations will employ hybrid infrastructure as a sole computing architecture by 2020. Private IT, often known as on-premises IT, requires an extension of secure enterprise infrastructure. Mixed IT is rapidly being used to update legacy infrastructure. In addition, this advancement is aided by the digital operating platform for deploying applications.
Modern computing infrastructure topologies incorporate cloud-hosted infrastructure or platform services such as containers and massive computing. Integrating public cloud infrastructure and traditional IT systems is known as hybrid IT or cloud computing. Confidentiality is still a big concern despite the many benefits of a cloud service delivery strategy, necessitating engineering technologies to assist with development, synchronization, and operation. You can have a private cloud and one hosted by a public cloud provider with hybrid cloud architecture. The urgent concern that needs to be addressed is how to connect public cloud infrastructure to private infrastructure effectively. Cloud computing is becoming increasingly well-known and highly marketed, increasing the number of Internet-based service providers. 2013 (Shin). Individual clients are less security conscious than corporate customers when using ULTIHUB services. According to the study’s results, Europe, specifically Germany, has a low adoption rate for public cloud services for corporate uses. Two of the most significant factors are security and privacy concerns. Client information and company documents that can’t be hacked should never be stored on the cloud. Furthermore, the poll discovered that private cloud computing operations are overwhelmingly positive, with 83 percent reporting positive results. The organizational structure plays a vital role in cloud computing operations and substantially impacts it.
Hybrid Cloud applications differ from physical and virtualized technologies in that they provide a combination computing environment (Luo et al., 2012, July). It’s vital to be aware of both the restrictions and the potential while building solutions for a hybrid cloud environment. As a result, architects will have to reconsider their methods. Cloud computing, on the other hand, has both benefits and drawbacks. Earlier studies have missed that cloud computing adoption is a transformational process requiring two stages: dismantling the old IT infrastructure and accepting the new, improved cloud computing technologies. System compatibility offers insight into researching the significant areas and concerns required for effective IT migration as the primary factor of value comparability between the enterprise and the new IT improvements. Furthermore, several cloud computing architectures enable enterprises to integrate legacy IT and cloud computing at various levels. As a result, we propose that system compatibility is a critical aspect of cloud values. As you plan for a public/private, hybrid cloud implementation, we’ve given a list of things to bear in mind.
First, Reconstruct a functional design for the Hybrid multilayer cloud-based solution, including the necessary underlying systems components.
The operational model for the different cloud system’s functional components.
Determine the computer resources needed for the system’s network.
Evaluate your backup and recovery requirements.
Have a disaster recovery plan in place.
Establish the system’s operational needs.
Define the scalability and high availability specifications for each component.
For each functional component, identify the performance requirements, the most likely blockages, the most likely failure points, and outage procedures.
It’s necessary to perform a fit-gap assessment of the functional components vs. the anticipated cloud environment. The requirements for a multilayer cloud system must be converted from ULTIHUB assets, which may need expertise with Relative server Performance Estimate two, values, or related standards. To identify resources that may not be suitable for cloud environments at this time, such as significant CPU and storage requirements. The findings of the Steps above demand that the solution and the deployment strategy be refactored to meet the sustainability and mission-critical criteria identified in the previous steps. This may need a multi-site deployment technique that is two-dimensional, synchronous, and customizable. Both functional and non-functional variables should be validated against the design concept.
It’s necessary to figure out how much it’ll cost to operate and maintain the solution.
This year, ULTIHUB polled 3,190 information systems assessments from firms with two or more employees in the following countries: Australia, Brazil, Canada, China, France, Germany, India, New Zealand, and the United Kingdom, and the United States. ULTIHUB Corporation Technographics provides information on the objectives, projects, and customer experience for technical and business planning and employees worldwide.
ULTIHUB collects data insights from authorized responders in ten countries around the world. One possibility in a hybrid cloud solution is to use a set of standard APIs that can be accessed by both cloud services (Dillon et al., 2010, April). These standard APIs for cloud applications provide a second layer of security. The ULTIHUB APIs can then be used to build applications that can now be hosted in either a public or private cloud environment, with the ability to migrate them across architectures as needed.
In a Hybrid Cloud Architecture for a vast area network (WAN), a broadband link, connects public and private clouds, enabling applications and data to be connected and managed as part of a shared IT architecture. Hybrid cloud infrastructure is perfect for businesses because it allows them to migrate between a private and public cloud when their applications need to improve and return if they no longer need it. The most widely used public IaaS providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Key Cloud Technologies in Cloud computing is a broad word that makes hosted services available over the internet. ULTIHUB is a cloud computing service provider that offers three primary services: infrastructure, platform, and applications (SaaS). There are two types of clouds: private and public, along with hybrid clouds and multiclouds. Anyone with an internet connection can buy public cloud services. Who can access the private cloud and strictly regulate what they’re doing with the data in a private cloud environment or data center? Cloud computing makes computing resources and IT services more accessible and adaptable, whether private or public.
Cloud-based Security and regulatory compliance are critical to ULTIHUB. Cloud privacy and security are not solely the responsibility of one company, and defining a clear line between the two can be challenging. Cloud security and compliance are shared duties between cloud service providers (CSPs) and their clients. Under the Shared Responsibility Model, the CSP is responsible for “cloud security,” including the equipment, programming, networking, and facilities used by cloud services. Organizations (the CSP’s clients) are exclusively responsible for their configuration and use of the CSP’s benefits regarding “security in the cloud.”
In the DevOps approach, there really is no longer a “hierarchically structured” separation between development and it operations. By combining these two teams, engineers can develop various abilities that are not limited by a single function in the product development lifecycle, from development and testing through installation and operational support. Throughout the application lifetime of ULTIHUB, several DevOps approaches incorporate more structured quality assurance and security teams. A DevOps environment where security is an essential priority for all team members is called DevSecOps. These teams use strategies to speed up and automate previously onerous and time-consuming processes. These teams use methods to speed up and automate previously cumbersome and time-consuming processes. They can design and deploy new applications rapidly and reliably with the correct technical stack and tools. They also allow engineers to accomplish tasks (such as deploying code or supplying infrastructure) without the help of other teams, resulting in even higher team velocity.
The “Zero Trust” approach to cybersecurity removes all implicit trust in digital interactions and verifies each step. Zero Trust, a security solution that employs secure authentication techniques, regulation of cognitive processes, lateral organization avoidance, and Layer 7 security solutions to keep hackers at bay, is all about “never trust, always verify.” Zero Trust was created to provide a higher security methodology for the modern era due to outdated calculations in earlier encryption algorithms. Users, especially hostile insiders and threat actors can travel across the system and access or obtain critical data due to a lack of robust security measures on the network. As the digital revolution accelerates, with the expansion of heterogeneous workforces, continued cloud migrations, and the change of security services, taking a Zero Trust posture has never been more vital.
This is the finalized architectural design, which considers the project study’s overall business objectives. Using a cloud-based hybrid algorithm, a vital feature of the ULTIHUB architecture was to include elements that would assure data integrity and capabilities for remote access to data and operations (Subashini & Kavitha, 2011). The hybrid cloud computing installation was rated a success based on the analyzed quality measures. In addition to the current redundancy in the design, a second network operating system with in-network functionality, various servers, and database mirroring were added to improve service availability in the cloud infrastructure. Mobile devices can access and process data more easily with the support of a server array, especially for tasks that might otherwise be handled by limited computing capacity.
A new approach to hybrid cloud computing architecture is presented in the form of a cloud bus. One or more third-party cloud resources can be used by the system (Zou et al., 2013, December). In both private and public clouds, cloud-based applications, cloud computing, the cloud transport layer, and the cloud application layer are all the same. The storage and management facilities are saidenticalIt provides several virtual services to sustain the upper layers centered on infrastructure and virtualization. On the cloud platform, APIs are used to execute Web applications and services and design and integrate applications. A control bus, node buses, and adapters are needed to monitor and manage the cloud’s numerous benefits (Birman et al., 2011, April). On the platform level, hosting infrastructure is being established. This environment’s open platform layer enables application-specific implementation and evolution, allowing web apps and services to be deployed in minutes. A computational engine and a service layer make up the platform layer in PaaS systems.
The following sections provide an overview of the public cloud security design concepts. The way security patterns are implemented differs significantly from one provider to the next, but the fundamentals remain the same.
Prepare for security issues (IaC, DevSecOps) (Threat response)
Make it feasible to track things back (monitoring)
Sent and received data must be safeguarded and kept safe while (encryption)
Establish a strong brand image
The principles of security outlined above serve as the foundation for a strong security posture. Various service providers focus varying levels of attention on the most fundamental security concepts. Basic security patterns are typically provided by cloud service providers, which must be customized for specific workloads (Fehling et al., 2014). When it comes to cloud computing, security is always a top issue, and securing the customer’s network is always a requirement.
System Analysis Explanation
Use case descriptions
Activity Diagram 1
Activity Diagram 2
Class diagram 1
Class Diagram 2
System sequence diagrams
Cloud vendors can employ the cloud-based architecture idea described in this article to secure the privacy and security of their clients (Jadeja & Modi, 2012, March). Section II compares and contrasts the three types of cloud that SaaS businesses can use: private, public, and hybrid. Building your private cloud is among the most restrictive and costly solutions. Small and medium-sized businesses (SMBs) are likely to be suffering from a solution that consumes a significant amount of extra resources. SaaS vendors like the public cloud method as long as there are no information security or threats. The public cloud architecture provides lower costs, a speedier time to launch, and better scalability than any other choice for the private end design.
Because of their low upfront costs and high reliability, public cloud services are ideal for small businesses. For a variety of reasons, multilayered cloud technology is an excellent choice. There are a few things to keep in mind while contemplating this option for small and medium-sized businesses (SMBs). Consumers have legitimate concerns about cloud SaaS privacy and security, and the prototype demonstrates how the suggested hybrid design might help alleviate such issues (Pearson, 2013). Customers’ key concerns have been addressed in terms of data, privacy, and security.
Birman, K. P., Ganesh, L., & Van Renesse, R. (2011, April). Running innovative grid control
software on cloud computing architectures. In Workshop Computational Needs for the Next-Generation Electric Grid. Cornell University (pp. 1-33).
Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In 2010
24th IEEE international conference on advanced information networking and applications (pp. 27-33). Ieee.
Fehling, C., Leymann, F., Retter, R., Schupeck, W., & Arbitter, P. (2014). Cloud computing
patterns: fundamentals to design, build, and manage cloud applications. Springer Science & Business Media.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing concepts, architecture, and challenges.
In 2012 international conference on computing, electronics, and electrical technologies (ICCEET) (pp. 877-880). IEEE.
Pearson, S. (2013). Privacy, security, and trust in cloud computing. In Privacy and security for
cloud computing (pp. 3-42). Springer, London.
Luo, F., Dong, Z. Y., Chen, Y., Xu, Y., Meng, K., & Wong, K. P. (2012, July). Hybrid cloud
computing platform: The next generation IT backbone for smart grid. In 2012 IEEE Power and Energy Society General Meeting (pp. 1-7). IEEE.
Shin, D. H. (2013). User-centric cloud service model in public sectors: Policy implications of
cloud services. Government Information Quarterly, 30(2), 194-203.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of
cloud computing. Journal of network and computer applications, 34(1), 1-11.
Yeluri, R., & Castro-Leon, E. (2014). I am building the Infrastructure for Cloud Security: A
Solutions View (p. 244). Springer Nature.
Zou, C., Deng, H., & Qiu, Q. (2013, December). Design and implementation of hybrid cloud
computing architecture based on cloud bus. In 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks (pp. 289-293). IEEE.