Cloud Deployment Models Project Plan Paper


This week you need to select the type of cloud deployment model(s) you will use for your case study project (Information resource security). Develop a deployment plan and describe the elements of your plan in your report.

Your report should be at least 2 pages and follow proper APA format. Cite any outside sources used in an APA-style reference Note: Attached is my Previous week Work

Intersession 2 Final Project Projection: Develop Your Business Case and an Enterprise Cloud
Rakesh Angadipeta
March 24, 2019
Cloud hosting technology refers to the procurement of computing resources over the
cloud platform through a cloud service provider. It is a secure, cheap and sure solution to data
storage, management, and backup. Numerous benefits come with cloud computing gearing
companies to make a gradual move towards this recent computing tread. A cloud migration
entails movement of data resources and data applications from an already established cloud
platform to another or from one provider to another provider. This model is referred to as cloudto-cloud service migration, and it aims at providing more secure services in most cases (AlAqrabi, Hill & Antonopoulos, 2015).
The business in question needs cloud services so that it can Manage the storage and
sharing of information resources, Secure the state of information resources, Enjoy the many
benefits that come with cloud hosting and Keep up with the technology paradigm and be in line
with other competing forms
Important elements to consider when implementing cloud technology
o SaaS model
An important aspect that will best suit the business enterprise is the SaaS model. Security as
a service is the most appropriate model of the cloud to migrate to as it is the most advanced. This
model provides functionalities which solve user problems for individual clients and
organizations as per the need of the company. Security as a service provider operates through
application software which allows users to get access to resources provided over the platform.
Users may not be able to manage the cloud infrastructure under this model or operate the
platform where the applications run from. This helps the issue of having to re-install software
applications and managing them from the user end thus simplifying the maintenance aspect.

ASP model
An important model to complement the cloud hoist is an Application service provider. This
business model will provide customers with computer services over a network platform. This
may include software application like standard protocol HTTP. ASP technology has advanced as
the costs for specialized software rises day by day far exceeding the cost range of medium-sized
computer services businesses. There are many application of ASP technology today. It has
revolutionized the business world with the business process becoming service oriented. The
importance of ASP technology in the computer service marketplace can be indicated by its everexpanding size. It is estimated that the ASP market in the United States ranged between 1.5 and
4.0 billion dollars. Consumers of ASP services are mostly businesses organizations, government
bodies, membership organizations, and non-profits organization (Tao, 2001).

The type of cloud migration
There are different ways of cloud migrations that our enterprise can make depending on the
need and technical position of the enterprise. One of the best and mostly used model is the
transfer of data resources and data applications from local centers to a public cloud
infrastructure. A cloud migration, however, entails movement of data resources and data
applications from an already established cloud platform to another or from one provider to
another provider. This model is referred to as cloud-to-cloud service migration, and it aims at
providing more secure services in most cases. The third type of cloud migration could be the
process of un-clouding popularly known as de-clouding or reverse cloud migration where data
resources or data applications are removed off from the cloud environment back to the local data
reserves. The latter process is a very rare process in the current computing paradigm, and it may
only happen when the organization feels very insecure in the current state of information privacy
and feels that the data they clouded is very sensitive and therefore requires to be confiscated
from the cloud environment. Compliance is the most dominant issues as far as migration is
concerned. Depending on the type and need of migrating to the cloud, an organization may
choose to have its application hosted on the cloud environment with no modifications on it in
what is referred to as the lift-and-shift model migration. The organization may also find it
necessary to make changes to the architecture of the application before migrating it to the cloud.

Information resource security
With the alarming cases and sophistication security attacks on the cloud, paramount attention
is needed to safeguard sensitive organizational and personal data. The cloud technology comes
with advantages and disadvantages. The hoisting of information resources in the cloud is an
issue that requires paramount consideration as attacks can happen at any moment of the day
(Pemberton, 2015). Security should, therefore, be a paramount consideration. All data store on
the cloud should be encrypted for safety.
In case of a data resource transfers from local data reserves to public cloud platforms, an
organization may choose between several options which include the public internet utilization,
offline transfer or private network connection where the organization uploads all of its local data
to a physical appliance device and physically moves that device to the public cloud provider who
then uploads the resource to the cloud environment. The method of migration chosen whether
offline or online depends on the type and volume of data intended to be move, and how fast it
requires to be migrated.
Al-Aqrabi, H., Liu, L., Hill, R., & Antonopoulos, N. (2015). Cloud BI: Future of business
intelligence in the Cloud. Journal of Computer and System Sciences, 81(1), 85-96.
Pemberton L. (2015). Principles of resilience in cybersecurity.
Tao, L. (2001). Shifting paradigms with the application service provider
model. Computer, 34(10), 32-39.

Purchase answer to see full

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.