Main Menu

My Account
Online Free Samples
   Free sample   Cloud computing assignment business continuity plan for regional gardens

Cloud Computing Assignment: Business Continuity Plan for Regional Gardens

Question

Task: You have been engaged to provide a report for Regional Gardens in their planned move to a Cloud and Micro services strategy.

Your task is to prepare a report on cloud computing assignment for Regional Gardens that discusses the following:

  • Describe the Cloud architectures you would employ to assist Regional Gardens to meet the Board’s cloud strategy?
  • Should Regional Gardens adopt a hybrid Cloud approach, particularly for its data sets? What are the benefits and issues that would arise from this approach?
  • Describe each of the architectures that you would use to meet the Board’s hybrid cloud strategy, along with your reasons for deploying them.
  • Describe the benefits, critical points and issues that would be the likely result of the deployment of these architectures.
  • Describe the major Information Security risks that you see associated with the move to this Microservices strategy for Web Services. You should name and describe each risk that you identify, estimate its likelihood and consequence and then describe a possible control for the risk. This should be presented in a tabular form.
  • Discuss what you would recommend should be included in Regional Gardens' BCP as a result of their adoption of a Cloud and Microservices approach. You will need to consider, as a minimum, the issues of application resilience, backup and disaster recovery in a Hybrid Cloud environment.

Answer

1. Description of the Cloud Architectures that can be implemented on the Regional Gardens for meeting the “Board’s Cloud Strategy”

1.1 Listing out the Cloud Architecture that is needed for Regional Gardens
Cloud architecture is a term of database and software system which will help to resolve any kind of problem in business. Regional Gardens is a gardening enterprise that sells plants and garden supplies to the public. Through cloud computing, the regional gardens are trying to improve their strategy.

a. One of the main features of cloud architecture is combining edge, fog in cloud computing. This database will handle the data complexity and it will make also helps to work better without any obstacles. This architecture is an end to end application, uniting the data applications. This will help in retaining the data workflows(Hernandez, Cao, and Wachowicz, 2017). This is a 3tier architectural program that will manage the data stream and it is original real-time transportation. This will help with decreasing the risk of losing the data.

b. Cloud computing is another way to remain the data safe. It is an important facility that will save data integrity, privacy, and also protect the data. This can also help to protect the data while sharing in the organization(Albugmi et al., 2016). To save the data a third-party cloud can be created. Highly sensitive data should not store in any public cloud service.

1.2 Role of Cloud Architectures for meeting the “Board’s Cloud Strategy”

Sl. No.

The demand of the Board Cloud Strategy

Relevant Architectures for meeting the demands

 1

Demand for retaining the data

Data remain is one of the features of cloud architecture(Hernandez, Cao, and Wachowicz, 2017). The 3tier data structure has been used which is an end-to-end system and it reduces the data loss.

2

Implementation of IaaS instance for providing high availability of data

IaaS instance has a major role in the implementation of a red hat enterprise that provides high availability of data and improves the flexibility of the network(Nguyen et al., 2020).

3

Implementation of Multi-cloud strategy

A multi-cloud strategy is can help to compile large data and it is used as a private cloud service. It can provide data services and security to save the data.

4

Implementation of Microservices Model

The Microservice model is highly maintainable and it is going to organized the business individually.

5

Implementations of Garden Design LoB

Garden designing can help in designing the project creatively(Kratzke, 2018). To improve data flexibility, the Iaas and PaaS application can help.

8

Changing Cloud-based ICT infrastructure

Cloud computing is an important part and it will save sensitive data from leaking(Albugmi et al., 2016).

9

The strategy of the BCP plan

BCP would secure and save the data in a strategic way and also save the organization's highly sensitive data.

2. Adoption of the "Hybrid Cloud Approach" on the data sets and mentioning the benefits and issues
2.1 Adopting the “Hybrid Cloud Approach” for the data sets

Hybrid Cloud combines private and public clouds and it helps to communicate between them. It is a software that helps to compute and store the data. This service will help to flexible the workload between both clouds(Butt et al., 2018). The hybrid cloud approach will handle both public and private clouds. This will help the organization to choose the best cloud to implement in the data service. The hybrid cloud approach can save valuable data and it can control data security.

The database or data sets on the “Hybrid Cloud Approach” must be encrypted so that it can results in providing effective services in the processes. The approach of “Hybrid Cloud approach” results in building effective systems on the regional gardens. As a result, it can upgrade the system of database in the organization.

2.2 Issues and benefits that can evolve from the approach
2.2.1 Issues that can evolve from the approach

The main issues or risk can one organization face while approaching the hybrid cloud are:
a) Data Leakage- The data are the main aspect of any organization. The private clouding can secure any highly sensible data. But in hybrid clouding if the data is managing at the same time it has more risks than highly sensitive data can get leaked and that makes it critical for the organization(Sun et al., 2020). The problem becomes magnified when the private data leaked in the public domain. So, security is one of the issues in this approach.

b) Complex Integration-The complex integration is one of the issues that need to be resolved to secure the cloud infrastructure. Comparability is one of the main issues when approaching integration. Most of the highly qualified technicians can’t handle this tough system that is why the infrastructure should be created easily and should not involve many applications because this will make the integration complex.

c) Scale complication-The scale complications are an issue that should revise time to time. It should not overshoot the infrastructure. Load testing is also important for data limits(Mahmoud et al., 2018). The infrastructure should build in a way that would help in the long term and it would help in future computing.

d) Networking- In cloud computing the networking should impact the individual approach and the network should manage the public and private clouds and the network should secure different types of data so that's why networking should be done in a high-level way to prevent data loss.

2.2.2 Benefits that can evolve from the approach
a) Cost effective-The hybrid cloud service will save the cost of any organization. It is a fast-moving business transformation. Mostly two types of agendas approach these hybrid cloud benefits. One is the IT agenda and another one is the business transformation agenda(Liu et al., 2018). The IT agenda tends to save money whereas the business agenda try to make money by investing.

b) Public and Private Cloud Approaching-As there are two types of hybrid cloud approaches public and private. The public cloud has on-demand cloud resources and it will take lower capital spending.

In a private data cloud, the organization needs a third-party service where the organization can hold the data in off-premise. As it is a private data clouding the data and applications should remain private means the organization can only access the data(Varghese & Buyya, 2018). This can save any sensitive data from leakage.

c) Data modifying-This data cloud has control over modifying the data as well as it can move the less sensitive data to public clouds and secure the highly sensitive data from loss.

3. Description and Evaluating the architectures that can meet the “Board’s Hybrid Cloud Strategy”
3.1 Describing the detail of Cloud architectures that can meet the “Board’s Hybrid Cloud Strategy”

Cloud architecture in terms of database which resolve any kind of business-related obstacles. Cloud architecture with edge computing can significantly reduce the risk of data leakage and also resolve the issue with bandwidth. It also allows us to work if networks are disrupted. Private and public architecture clouds manage different types of nodes and also manage the device workloads and secure the sensitive data which is in private clouds. Edge computing benefits: Performance- This computing can increase the performance of analytics and also it will communicate very fast and the user can run the program rapidly.

System availability- The complex system can damage the communication flow and multiple network nodes can also risk the security of applicants. That's why edge computing can resolve the obstacles and elevate the availability in the system.

Security of data- In edge computing the data can be secured in any physical area. When securing the data, the edge nodes should primarily secure which will make it informal and made the data secure.

Other benefits can be getting by edge computing are:
Scale Management-This benefits also come with challenges like in this scale management if the work location is a shift at the time of edge computing it can change the architectural tools of the scale. To resolve this problem new types of tools and support teams should be required(Mahmoud et al., 2018).

Applicants need traditional network sites as well as support teams in various environments.
Portable workloads-For proper scaling the workloads should be modified and more transportable. As the work should be movable data should be in limited size otherwise it will affect the computing. The applicants should adopt the life cycle of data moving and also maintain the applicant from the data cloud(Mahmoud et al., 2018). To mitigate this challenge, one should arrange the workload and also watch for the resource of the data and should check the complexity of the current atmosphere. Data Security- Data security is one of the main aspects of the system. Securing data beneficial to the applicant and also to the organization(Mahmoud et al., 2018). This high build security can save highly sensitive data from stealing.

3.2 Listing the reason for deploying the architectures for meeting the “Board’s Hybrid Cloud Strategy”
The Internet of things is becoming the backbone of any organization. But managing the data security and analyzing the huge amount of data from different sources can be a tricky job but through the edge, computing one can secure the data as well as can also work with many bandwidths and other software programs.

Edge computing can new applicants for smart cities and drones and vehicles. In critical situations, edge computing can help to analyze the data and track the data sources rapidly. In this age, edge computing can fall impact on IT infrastructure as well as in any business organization. Data security is one of the main aspects of edge computing. It helps to track the data as well as it also very beneficial because it has end to end security system(Liu et al., 2018). It also secures sensitive data from leaking in the public portal.

Before implementing the Edge-computing organizers must check on the compatibility of the deployments before implanting the edge computing. Edge computing secures the cloud connections which make data travel seamlessly.

The edge computing needs to be in the advanced mode so that the configuration and software package would work without any problems.
When implementing any network architecture, the users should keep in mind that which portion of the software would run the cloud and which portion is needs to be fixed. So, before implementing any kind of network architecture the applicant should plan wisely otherwise it will damage the entire data system.

4. Evaluation of the critical points, benefits, and issues after the deployment of Cloud Architectures
4.1 Listing the critical points after the deployment of Cloud Architectures

The reason for deploying cloud architecture can save the data from stealing from any unauthorized source. The end to end security can help to improve to maintain data security(Butt et al., 2018). Cloud computing can also secure private data from the public leaked.

After deploying the Cloud Architecture, the data security has enhanced which makes the system much more reliable and trustworthy.

Implementation of proper agile methodology can develop the system and it defines the team roles and it will help to start with the right project(Varghese & Buyya, 2018). Agile methodologies can meet the deadline and it is cost and quality factors of the data.

Effective evaluation of psychometric tests can prove the insightful most virtually. It can also be made with interviews rather than using it alone. This psychometric test can evaluate the interviewers, in here through cloud computing the data will be stored correctly and this will resolve the issue.

4.2 Listing the benefits after the deployment of Cloud Architectures
In our daily lifestyle, artificial intelligence and the internet have emerged progressively (Debauche et al., 2020). The "SaaS" deployment provides additional benefits; over the model of the traditional software deployment. These include the scalability, which recommends the addition and subtraction of the users who are using the application. These adding and deleting of users are applied to the demand of their concerns over the final investments in the additional software and hardware. Comparing to the traditional techniques of cloud computing, the recent cloud has more capability. It provides spaces for storage data and more resources for the server which gives encouragements to the power of computing and speed.

4.3 Listing the issues after the deployment of Cloud Architectures
In the modern world, the cloud is an environment that shares computing resources. These are infrastructures that are available in individual's houses, platforms for developments, and software applications(Anitha & Nair, 2016). These infrastructures help in utilizing and accessing computing effectively and efficiently. Reconfiguration dynamically against loads that are variables is done by these computing resources to maximize the utilization of resources.

Issues that are faced because of the deployment of cloud architecture are privacy and security. The apps that are written for the cloud have to be in a secure state as cloud architecture does not grant security compliance automatically to the users who use data or applications. Another issue is the incomprehension of the clients. Some misunderstandings are created about the issues of private and public clouds that are worked in a group. The security of the data is a major problem amongst the services of cloud computing.

5. Description of the “Information Security” Risks that are identified while moving the existing system into a microservices architecture

Sl. No.

Name of the Risk

Description

Likelihood

Consequence

Control Strategy

1

Data leakage from the organization

Data leakage is mainly done through the lack of authentication methods in the organization. It results in the development of a third-party attack in the system(Eftimie et al., 2018). The IT processes get crash down and sometimes, the company have to face severe loss in the organization.

The likelihood is high while upgrading the system from monolithic to microservices.

Loss of confidential information from the organization. As a result, regional gardens can lose the bulk of existing data from its system.

Implementation of security tools and edge computing on the regional gardens will prevent data loss(Eftimie et al., 2018). Moreover, the organization must have a backup plan to retrieve its data if its permanently gets deleted.

2

Complex integration

The integration process is complex as it involves large modules of codes. It will increase the buffer time and thus, the employees can lose interest in retrieving the data(Indu et al., 2018). It will decrease the flexibility rate on the system. The departmental procedures cannot be processed within a short time.

Medium

Engage more time in debugging the modules as the flexibility rate will decrease. The departmental processes will take a great time as the process will change and the employees have less knowledge of the new system(Indu et al., 2018). Thus, the processes will need huge time for execution.

Separating the tasks through the use of agile or scrum methodology. It will process the tasks within a short time(Indu et al., 2018). As a result, the flexibility rate will get increase and the employees will learn basic knowledge on the new system.

3

Scale Complication

The complication in the scalability of the cloud environment. The cloud environment involves an autoscaling mechanism but it is quite tough in the initial stage(Arora et al., 2017). At the beginning phase of microservices architecture in the Regional gardens, it will be tough for scaling the resources on the system.

High

The company will deny using the paid services of microservices architecture. Thus, it will be tough to handle the challenging situation of cloud architecture(Arora et al., 2017). The company will fail to provide proper ease to its customers for gaining popularity in the market.

It can be addressed by building a static cloud environment on the regional gardens. Thus, the microservices will not upgrade its modules over time to time(Arora et al., 2017). It will decrease the occurrence of the challenging situation on the IT processes of the organization. 

4

Barriers in forming the Networking system

Several barriers occurred while changing the existing system into the microservices(Kumar & Balaji, 2018). The networking system will face a great change as the whole modules will get change according to the demand of “Board Cloud Strategy”.

Medium

Regional Gardens will fail to build an effective system as per the demand of “Board Cloud Strategy”. They will be unavailable to link the inner network to the outside network within the same area. The company will thus fail to integrate the functions of their different branches and build a secure network.

“Solar winds Network Performance Monitor” helps in controlling the barriers to forming the networking system(Kumar & Balaji, 2018). Thus, it will help in building effective modules for upgrading the system in the Regional garden.

5

Problems in Rebuilding the events

The several events in the system need to be rebuilt as it has various flaws in the existing system(Abdurachman et al., 2019). The existing system will crash if it is not upgraded from time to time.

Medium

The microservices architecture will fail to build events and upgrade them according to the purpose. Thus, the system will be failed to upgrade its processes according to the changing demand of the “Board Cloud strategy”.

“AWS Cloud Formation” and “AWS Systems Manager” is an effective tool for managing the problems of rebuilding the events in the Cloud Environment(Abdurachman et al., 2019). It will provide high defined security tools for the effective building of the events on the system.

6

Problems in understanding the characteristics of the Psychometric test

The psychometric test helps in evaluating the scalability of the network. However, in the case of regional gardens, it will be difficult as the employees are not enough experienced and skilled to perform the psychometric test on the cloud environment(Akshaya & Padmavathi, 2019).

Medium

The resources cannot be measured and executed according to their scalability. The scalability difference results in increasing the execution time on worst cases. Thus, the administration might face some disturbances in their network.

Implementing “unified cloud-based resource” on the data services for solving the problem of the psychometric test(Akshaya & Padmavathi, 2019). It will help in building effective processes for monitoring the distributed database.

7

Barriers in developing the agile methodology and improving the scalability

Agile methodology helps in dividing into tasks or processes to execute them on specified time. It helps in improving the scalability of the resources that need for upgradation(Mescheryakov et al., 2020). Lack of skilled employee in monitoring the processes results in preventing the adoption of agile methodology.

Low

The risk results in failure on the execution of the task within the specified time. Thus, results in poor scalability of the resources in the system. It will increase the lack of resource on the system and events on the processes.

Recruiting skilled officials for monitoring the agile methodology in the system. It will increase the scalability in the system(Mescheryakov et al., 2020). The new resources can be built for improving the flexibility of the resources on the system.

8

Barriers in increasing the flexibility and stability of the Cloud environment

The stability and flexibility of the Cloud environment play a major role in improving the system of regional gardens. However, flexibility and stability cannot be maintained due to the barriers in the system(Narang, 2017). Barriers like the low grade of security tools on enhancing the system.

Low

The risks result in decreasing the flexibility and stability of the Cloud environment. As a result, it will decrease the working of the processes in the cloud environment.

“ServiceNow” is an “IT service management tool” that helps in increasing the flexibility and stability of the Cloud environment(Narang, 2017).

6. Discussion of recommendation on BCP of Regional Gardens
6.1 Role of "Business Continuity Plan (BCP)" in the adoption of Microservices Approach

Possibilities of changing environments are offered by the microservices from the business continuity standpoint that includes treats and opportunities. The plan of business continuity and strategies regarding this business provides solutions that are effective to Microservices Approach and Multi-cloud (Kumara, n.d.). The approach of microservices helps businesses to improve the continuity of the businesses through machines as well as people across the enterprises. Microservices allows recourse optimizations. With the help of the microservices, one could do multiple works in teams on individual independent services. Also enables a quick deploy. The time of the development is reduced and the code of the team will be more reusable.

Microservices helps in making the waves that are amongst the forward-thinking development applications organizations. Adoption of agile project management, deploy automation with the help of DevOps and the independent delivery of the data with the help of microservices has speedup in a tremendous way for the development of the systems (Sultan, 2020). These microservices help the Regional Garden Ltd company to that of the business in a successful way. They run several related small gardening enterprises. This company particularly recommends microservices to run their business. This company has a Regional Gardens Nursery that sells to the public plants and garden supplies. Garden advises, garden designs, and the consultancy services are provided by the Regional; Garden Planners.

Efficiency and speed needs in software development by which codes are delivered in any gardening company are a vital aspect of getting g success for any project. Microservice based approach is used to implement defined charging and functions of collections (Oliver, Lee, and Sparks, 2020). In any gardening company like Regional Garden, the updates of any orders and order fixations need to be done smoothly and quickly to avoid late delivery and loss of money. Time and delivery loss are related to each other. If a company delays in delivery to the customer and other companies will provide the orders to the customer than there will be a loss of money for the company. Microservice based approach is used to implement defined charging and functions of collections.

Microservice extraction works on finding the entities of the software like the classes, methods etcetera. These software entities should be together in a group as microservice candidates from existing monolithic software. These are responsible for independent evolution and functionality (Jin et al., 2018). The company regional Gardens have started to roam around some of the company's applications and the services that are served to the public cloud. Many technical staffs are concerned about this process as they don't have any experience of the Cloud. This company wants to change its designs by using a monolithic application as an application of microservice.

6.2 Issues on Application resilience in a “Hybrid Cloud Environment”
a) Effects of resilience effects on cloud environment by rebuilding the events-Resilience are capable of the Cloud as the Cloud has a distinct ability. This means that Cloud can rebuild its events in it and that depends upon the events which affect it. In a crisis, a Cloud resilience is used to readapt in away. This way applies to the data and the infrastructure. Mixed computing is as same as a Hybrid Cloud that is also referred to as storage and environment services. These are made up of the infrastructure, a public cloud, and services of private clouds. There is increased attention from the researches across the world towards the theory of resilience (McMillen et al., 2016). These researchers are of discipline those who work on the development of the frameworks and indicator categories.

b) Problems in understanding the characteristics of Psychometric test- Resilience and gardening are deployed recently in a primary stage that includes in the studies of livelihoods in the “Global South” (Jehli?ka, Dan?k, and Vávra, 2019). Also, these are now seeking attention from the “Global North” as well. There is something called the resilience test which is related to resilience applications. These tests are formed from several statements of self-report. These reports are designed to determine the strengths of an individual's traits of personality from their responses. This test provides the current understanding of the characteristics in a much better way and by using possible presentations to promote self-improvements. Another information to this resilience test is that it is a psychometric test.

c) Barriers in developing the agile methodology and improving the scalability- Hybrid cloud is an infrastructure that links between the private cloud that is managed by the user to the public cloud that is managed by the third parties. Connections between public clouds and premises that are on are offered by the hybrid cloud. The Regional Garden company uses this hybrid cloud to provide agile and scalable development and for the developers, they test the situations of the environment. This company employs developers around the world. By using this resilience in a "Hybrid Cloud Environment", they are reaching on top in developing their performances. Some community gardens following the upcoming disasters support community resilience (Shimpo, Wesener, and McWilliam, 2019). Gardens that are established well also provides support to the gardeners socially after the earthquake.

d) Barriers in increasing the flexibility and the stability of the cloud environment- Issues that happens with the application of resilience in a "Hybrid Cloud Environment" are seeking of attention that is the flexibility and stability of focus of the Cloud environment could be measured. Whether the Cloud going low on its physical state or in a mental state could be determined by this resilience application. This resilience helps to sustain and access be positive motions. Native communities have managed their environments actively as people all over the world are using resource diversities and strategies on conversations (Jackley et al., 2016). There are three categories of resilience. Those are the resilience of emotion, resilience of psychology, Physical resilience, and the reliance that are present in the community.

6.3 Issues on “Backup and Disaster Recovery” in a “Hybrid Cloud Environment”
a) Protections on data policy- The backup solutions and “Hybrid Cloud Disaster Recovery” provides multi-cloud and DR cross-cloud to the customers. This solution provides these with the support of comprehensive data policy protections. The guarantee of services are there in a continuity of the services and keeps the data that is critical with a high level of solution reliability. There are certain backup recovery trends for these "Hybrid Cloud Disaster Recovery". During an ongoing disaster the IT services that are the "Information Technology" that the cloud provides, face challenges significantly in maintaining their services (Alshammari et al., 2017). Developments are increasing in a rapid way of the industry of cloud computing. Customer needs are always in an “ever-increasing” position. As a result, organizations of the IT infrastructures of all sizes are placing services at a high rate to the customers into a framework of the cloud.

b) Recovering the Vulnerable attacks by using “Hybrid cloud Environment”-For the developments of suiting the growth strategies of an enterprise they are choosing cloud services. They use these cloud services as they are good at eliminating bottlenecks of the environment. They are cheaper and fully able to gear into the developments that are "ever-changing". Security backups and stability for service systems are always considered as the top of the priority. The majority of vast entrepreneurial ventures want models of online and offline businesses. Several good members would prefer dealings of their own that are occurred strictly on online services (Omoruyi et al., 2017). Disasters like vulnerable attacks or threats such as Viruses, Ransomware, DDOS etcetera are the disasters that are recovered by “Hybrid Cloud Environment”.

c) Discussing the recovery of the benefits of “Hybrid Cloud Disaster”- For any organization’s recovery strategy the approach of a hybrid cloud is advantageous.Both the infrastructures of private cloud management and public cloud are used in businesses. These private and public clouds allow businesses to make both the environments the best. By correct implementation, recovering the hybrid cloud disaster can be used as an option. It provides improved user experience, increases resilience, and provides flexibility. In businesses, the survival of the company depends on backup and disaster recovery. These are very critical to be recovered to run a business smoothly and properly (Kolte & Gade, 2018). During disasters, a business should find its immediate solution. Otherwise, the business system will get down competing with others.

d) Strategies are discussed about data disaster recovery- Storage in Clouds have become accepted storage of data collection model; at a wide rate in recent years (Jun-Feng, Jia-Yao, Rui-Zhong, 2018). It may happen like during the services of providing good storage to the users, there might be a natural disaster or ant damages made by man.This is a high-security risk of cloud storage. Another disaster may happen which is data corruption or loss of data from the storage system. In recent times, a common risk has arisen in the industry of technologies that is the hacking of data, hostile forces, and the intrusions of malware by the hackers or the criminals. For all these risks and drawbacks, every business company needs to keep a recovery backup storage in every system of their institutions.

6.4 Recommendations on BCP in a “Hybrid Cloud Environment”
Recommendations should be given to the Regional Garden company that they should consider the microservice uses as a part of the architect application. This company has a very old image application process that is used by several customers. They upload images of the existing garden for redesigning which is of no use. Some modules of the company are there that needs no development in them as they present stable functions and relative outputs. Gardens that are made by humans are calm gardening sites. These sites are a part of social and ecological systems which are among several modifications that may have early resilience to communities. These are done by providing diversities and reliable resources to access foods.

To aim a time-sensitive service a secure “Cloud-to-Edge” environment for management without any seam of an IoT application is needed (Celesti et al., 2019). For businesses that use the "Cloud-of-Things" services the performance and a secured "Cloud-to-Edge" solution od middleware is very essential. These strategies are to be taken by the Regional Gardening company to serve better services and development of their company.

7. Bibliography
Abdurachman, E., Gaol, F. L., & Soewito, B. (2019). Survey on Threats and Risks in the Cloud Computing Environment. Procedia Computer Science, 161, 1325–1332.

Akshaya, M. S., & Padmavathi, G. (2019). Taxonomy of security attacks and risk assessment of cloud computing. In Advances in big data and cloud computing (pp. 37–59). Springer.

Albugmi, A., Alassafi, M. O., Walters, R., & Wills, G. (2016). Data security in cloud computing. 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT), 55–59.

Alshammari, M. M., Alwan, A. A., Nordin, A., & Al-Shaikhli, I. F. (2017). Disaster recovery in single-cloud and multi-cloud environments: Issues and challenges. 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS), 1–7.

Anitha, K. L., & Nair, T. R. G. (2016). A Smart Cloud architecture to handle security issues and vulnerabilities in cloud. 2016 International Conference on Inventive Computation Technologies (ICICT), 3, 1–6.

Arora, A., Khanna, A., Rastogi, A., & Agarwal, A. (2017). Cloud security ecosystem for data security and privacy. 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence, 288–292.

Butt, T. A., Iqbal, R., Shah, S. C., & Umar, T. (2018). Social Internet of Vehicles: Architecture and enabling technologies. Computers & Electrical Engineering, 69, 68–84.

Celesti, A., Fazio, M., Galletta, A., Carnevale, L., Wan, J., & Villari, M. (2019). An approach for the secure management of hybrid cloud–edge environments. Future Generation Computer Systems, 90, 1–19.

Debauche, O., Mahmoudi, S., Mahmoudi, S. A., Manneback, P., & Lebeau, F. (2020). A new edge architecture for ai-iot services deployment. Procedia Computer Science, 175, 10–19. Eftimie, S., Rogobete, M., & R?cuciu, C. (2018). Quantifying security risks in the cloud environment in the quest for minimizing energy consumption. IOP Conference Series: Earth and Environmental Science, 172(1), 12014.

Hernandez, L., Cao, H., & Wachowicz, M. (2017). Implementing an edge-fog-cloud architecture for stream data management. 2017 IEEE Fog World Congress (FWC), 1–6.

Indu, I., Anand, P. M. R., & Bhaskar, V. (2018). Identity and access management in cloud environment: Mechanisms and challenges. Engineering Science and Technology, an International Journal, 21(4), 574–588.

Jackley, J., Gardner, L., Djunaedi, A. F., & Salomon, A. K. (2016). Ancient clam gardens, traditional management portfolios, and the resilience of coupled human-ocean systems. Ecology and Society, 21(4).

Jehli?ka, P., Dan?k, P., & Vávra, J. (2019). Rethinking resilience: home gardening, food sharing and everyday resistance. Canadian Journal of Development Studies/Revue Canadienne d’études Du Développement, 40(4), 511–527.

Jin, W., Liu, T., Zheng, Q., Cui, D., & Cai, Y. (2018). Functionality-oriented microservice extraction based on execution trace clustering. 2018 IEEE International Conference on Web Services (ICWS), 211–218.

Jun-Feng, T., Jia-Yao, Z., & Rui-Zhong, D. (2018). Date hierarchical storage strategy for data disaster recovery. IEEE Access, 6, 45606–45616.

Kolte, S., & Gade, A. (2018). Real Time Disaster Recovery and Active Backup of Linux Server.

Kratzke, N. (2018). A brief history of cloud application architectures. Applied Sciences, 8(8), 1368.

Kumar, V., & Balaji, B. P. (2018). Information Management in Cloud Environment Risks and Mitigation Strategies. 2018 5th International Symposium on Emerging Trends and Technologies in Libraries and Information Services (ETTLIS), 137–140.

Kumara, A. (n.d.). Business continuity plan.

Liu, Y., Wang, L., & Wang, X. V. (2018). Cloud manufacturing: latest advancements and future trends. Procedia Manufacturing, 25(8), 62–73.

Mahmoud, M. M. E., Rodrigues, J. J. P. C., Ahmed, S. H., Shah, S. C., Al-Muhtadi, J. F., Korotaev, V. V, & De Albuquerque, V. H. C. (2018). Enabling technologies on cloud of things for smart healthcare. IEEE Access, 6, 31950–31967.

McMillen, H., Campbell, L. K., Svendsen, E. S., & Reynolds, R. (2016). Recognizing stewardship practices as indicators of social resilience: In living memorials and in a community garden. Sustainability, 8(8), 775.

Mescheryakov, S., Shchemelinin, D., Izrailov, K., & Pokussov, V. (2020). Digital Cloud Environment: Present Challenges and Future Forecast. Future Internet, 12(5), 82.<

Omoruyi, O., Okokpujie, K. O., Nsikan, N., John, S. N., & Adewale, A. (2017). On issues, strategies and solutions for computer security and disaster recovery in online start-ups. International Journal of Applied Engineering, 12(19), 8009–8015.

Shimpo, N., Wesener, A., & McWilliam, W. (2019). How community gardens may contribute to community resilience following an earthquake. Urban Forestry & Urban Greening, 38, 124–132.

Sultan, M. (2020). Linking Stakeholder Viewpoint Concerns with Microservices. ArXiv Preprint ArXiv:2009.01702.

Sun, L., Jiang, X., Ren, H., & Guo, Y. (2020). Edge-Cloud Computing and Artificial Intelligence in Internet of Medical Things: Architecture, Technology and Application. IEEE Access.

Varghese, B., & Buyya, R. (2018). Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, 79, 849–861.

NEXT SAMPLE

Related Samples

Question Bank

Looking for Your Assignment?

Search Assignment
Plagiarism free Assignment

FREE PARAPHRASING TOOL

PARAPHRASING TOOL
FREE PLAGIARISM CHECKER

FREE PLAGIARISM CHECKER

PLAGIARISM CHECKER
FREE PLAGIARISM CHECKER

FREE ESSAY TYPER TOOL

ESSAY TYPER
FREE WORD COUNT AND PAGE CALCULATOR

FREE WORD COUNT AND PAGE CALCULATOR

WORD PAGE COUNTER



AU ADDRESS
9/1 Pacific Highway, North Sydney, NSW, 2060
US ADDRESS
1 Vista Montana, San Jose, CA, 95134
ESCALATION EMAIL
support@totalassignment
help.com