DT - Example 4
DT - Example 4
2021–2022
Student Number:
This proposal focuses on benefits and challenges related to cloud computing technologies
with a migration case study, which will focus on Aspire supported living CIC.
Aspire Supported living CIC are a Community Interest Company dedicated to making a
difference to the lives of disadvantaged citizens in Birmingham. They work alongside
Birmingham councils in providing housing services for ex-offenders and other individuals
which struggle to obtain accommodation through normal means. Services include, arranging
bill payment solutions for people with mental health related problems and rehabilitation. At Commented [LMD1]: Advice, just proof read before
present their office based in Birmingham has 30 staff members and the site has physical IT submission 😊
infrastructure. The CEO Raja Khan has expressed his desire to consider cloud services, as
Commented [AR2R1]: done
part of their growth strategy and remote working. The business also intends to enhance their
data storage and would like to mitigate the chances of security breaches , which would
improve their compliance issues.
ii
Acknowledgements
Firstly, I would like to acknowledge my supervisor Liam Matthews-Dibbins for his dedication Commented [LMD3]: Name check 😊
and guidance towards myself throughout my final year project at Birmingham City University.
Commented [AR4R3]: Done
Liam was very approachable and transparent which encouraged me to become more
motivated and dedicated. In doing so, I was able to overcome project obstacles. Liam helped
me to define and amend my dissertation which resulted in enhanced structure and greater
depth of detail. His suggestions and careful critique during all stages of this dissertation were
indispensable to the creation of this document. My gratitude goes out to Ryan Daniels, as a
fellow student and a friend, he has been inspirational as his detailed understanding of the
topic has given me guidance in achieving high standards within This work. Lastly , my wife
has inspired me to never give up and keep striving through good and bad.
iii
Commented [LMD5]: Good
Glossary
Glossary Description
SME Small medium enterprises
CC Cloud Computing
CT Cloud technologies
CS Cloud services
ACIC Aspire supported living CIC
VPC Virtual private cloud
EC2 Amazon elastic Compute
RDS Relational database service
S3- BUCKET File storage service
AWS Amazon web services
iv
List of Figures
Figure Description
Figure 1 Search Methodology Microsoft Word
Figure 2 Cloud Stack
Figure 3 Waterfall Methodology Microsoft word
Figure 4 IAAS Migration
Figure 5 Network Topology Cisco packet tracer
Figure 6 IaaS migration Architecture
Figure 7 Web server design
Figure 8 File server design
Figure 9 AWS VPC
Figure 10 AWS security Group
Figure 11 AWS inbound Rules
Figure 12 AWS Subnet
Figure 13 AWS MySQL database
Figure 14-15 AWS Autoscaling
Figure 16 AWS data backup
Figure 17 AWS static webpage
Figure 18 AWS Bucket
Figure 19 Bucket security
Figure 20 Encryption
Figure 21 AWS user creation
Figure 22 AWS permission levels
Figure 23 S3 browser
Figure 24 Account set up
Figure 25 Directory + permissions
Figure 26 TNT drive
Figure 27 Command line
Figure 28 Data Synchronisation
Figure 29 Synchronisation & configuration
Figure 30-32 Data synchronisation
v
Figure 33-34 AWS Autoscaling
Figure 35 AWS VPC selection
Figure 36 AWS autoscaling group sizes
Figure 37 Group sizes
Figure 38 EC2 Autoscaling
Figure 39 EC2 termination
Figure 40 Autoscaling Log
Figure 41 Scaling policy
Figure 42 EC2 connections
Figure 43 EC2 connection
Figure 44 CPU load graph
Figure 45 EC2 scaling
Figure 46 Implementation error PHP file
Figure 47-48 Table Input Error
Figure 49-53 Questionnaire data
Figure 54-60 Web server setup
Figure 61 AWS accessibility test
Figure 62 AWS IAM user accessibility test
Figure 63 AWS accessibility test
Figure 64 AWS response test
Figure 65 AWS bandwidth response test
Figure 66 Load test
Figure 67 Network test
vi
Introduction
This project will focus on cloud computing technologies and its adoption within SME’s. The
project will pay a greater focus on risks and challenges associated with cloud technologies
adoption with an inclusion of adoption case study. The project will commence by defining the
problem , which will be followed by illustration of the scope and aims. The second chapter
will be the literature review, which will collect data on the chosen subject to support the aims
and objectives of the project. Chapter three will disclose This chosen method for the project,
while data will be provided to disclose the implementation of the solution. An evaluation will Commented [LMD6]: Should be An
be conducted on the overall data of the project, which will lead me to conclude the project.
Commented [AR7R6]: Done
Commented [LMD8]: Lead me? Should be third person
1.1 Problem Definition anyway
Commented [AR9R8]: done
Cloud technologies allow users various benefits as well as challenges. Being able to
optimize virtual infrastructure within a shorter time frame is a resource which has gained vast
popularity in recent times. Equally security measures have been enhanced but remain a
concern for users. For successful cloud adoption , users must have extent knowledge and all
parties must be aligned. The problem identified is whether such claims and arguments are
valid for SME’s, there for this project will collect supporting evidence on cloud adoption risks
and challenges towards SME’s, in hope to collate data which answers most arguments
within This project. There is clear evidence of the existing gap in knowledge for SME owners
on cloud technology, there for this project will plan, design, and build a cloud solution for
Aspire supported living CIC. This project will provide extensive supporting research literature Commented [LMD10]: Should be the project… third
to answer This project title. person throughout
Commented [AR11R10]: done
1.2 Scope
This project will focus on the Cloud computing adoption within SME’s and in my case the
case study will be Aspire supported living CIC. Currently there is mixed views on cloud
technologies and their suitability and adoptability within SME’s. From security concerns to
possible shorter infrastructure upload times, therefor this project will provide data which will Commented [LMD12]: Therefore
enhance the end user’s knowledge on CC and related topics. By obtaining key knowledge
Commented [AR13R12]: Done
on CC , end users will learn on benefits and associated challenges towards the adoptability,
which can aid them in learning best practises for CC adoption within SME’s. Quantitative and
qualitative data will be applied to support case study findings on key objectives within the
project and by doing so will enhance the validity of the overall evidence. This project has
commenced during September 2021 and will finish May 2022.
Costs for this project will be limited as the sponsor Aspire CIC will have zero contribution.
There for effective planning and time management skills will be used to ensure the project
doesn’t exceed the defined budget. Secondly , the project needs to be completed on time as
defined by the stakeholders as any delays could have a negative impact towards
consideration. Resources are limited for the solution implementation as the budget is limited
and in the event of a pandemic, a contingency plan will be followed to ensure the project is
1
completed on time. Lastly, the project will follow the waterfall methodology as it is well
structured, with clear steps that suit this project. Commented [LMD14]: Remember scope should also
cover what isn’t included in the project for time/cost/other
reasons
1.3 Rationale Commented [AR15R14]: done
There is clear evidence of an existing gap in knowledge for SME owners, specifically linked
to cloud technology, there for this project will plan, design, and build a cloud solution for
Aspire supported living CIC. This project will provide extensive supporting research literature
to answer the project title and will provide key arguments on related benefits and risks from
CC. By considering both sides of the chosen subject, the output will be more balanced,
resulting in literature and data which has more balance and validity.
Cloud technologies has mixed opinions on its suitability towards end users and often
because of these mixed opinions, users often avoid such technologies. In some cases,
adoption of CT fails to meet business requirements, and this can be due to many reasons,
including lack of experience, support, and planning. There for this project will enable
business owners and all related stakeholders to gain and build knowledge on the adoption of
cloud technology and its benefits and risks towards small medium enterprises. Commented [LMD16]: Good
The key aim of this project is to collate primary and secondary on cloud adoption benefits Commented [LMD18]: Double check formatting – text
and challenges towards SME’s, with the inclusion of a case study to enhance the readers above seems to have double spacing vs this text!
understanding on the chosen subject. Commented [AR19R18]: done
The objectives are defined below for this project.
• Critically examine cloud computing services and their suitability towards SME’s
• Evaluate critical success factors and their importance towards successful cloud
adoption
• Evaluate Cloud computing adoption benefits & challenges to SME’s
• Design & implement the migration Solution
• Test & evaluate the overall migration client’s requirements
This project will focus on the concepts of CC and related services directly related towards
SME’s. The project will disclose challenges and potential benefits from CC adoption and in
this case the case study will be an SME in the name of Aspire supported living CIC. ACIC
specialise in housing services for vulnerable people and are based within the west midlands.
They currently have over 350 employees , with 50 based within the Birmingham office. The
purpose of this project is to provide key data on CT for the owner of ACIC , Raja Khan,
allowing him to gain insights into CC and their potential offerings to his company. The project
will assess the current infrastructure of ACIC and select the most suitable service model for
deployment, which will be based on the business requirements. Information on current
infrastructure, services and processes will be documented and used against the proposal.
The purpose of the case study and supporting research is to educate SMEs such as ACIC
and others on CC adoption. The project will provide key literature on best practises and
2
mitigations on CC adoption, which should aid CC adoption for potential prospects within the
future.
Various resources will be used for data gathering and these will include databases such as
Google Scholar, IEEE Explore , BCU library, Scopus Library and Science Direct. The
search terms being considered for this report are shown below:
Cloud Computing
Cloud Adoption
Cloud Migration strategies
Cloud service models
Exact search phrases will be used to gather data which further supports the report. These
are shown below:
Other sources
• Questionaires feedback
• interview data
Literature Review
A literature review will be carried out to enhance understanding of the chosen area of study.
As the project will consist of a migration case study which focuses on the migration to a
cloud service. It is important to carry out research which supports the objectives of the
subject and the project. Literature review allows to build evidence which supports the area of
study, while focusing on any inconsistencies and gaps within the research, (LibGuides:
Literature Review: Purpose of a Literature Review, 2022).
1.6.1 Critically examine cloud computing services and their suitability within
SME’s
SaaS is regarded as the oldest service being provided to consumers with vendors such as
Salesforce. The service consists of a complete solution, delivered as a service, resulting in
3
minimal configuration from the end user. The vendor handles all configuration and
manageability, and examples of such solutions include ERP and CRM. PaaS is regarded as
the least mature service and offers services which have been integrated within a platform
and accessibility is via API’s, such examples include Microsoft Azure, (Kavis,2014). IaaS
services focus on visualization by enabling consumers to obtain resources for deployment,
such service vendors include Amazon Web services . The client does not manage or control
the underlying cloud infrastructure but has control over operating systems, storage, and
deployed applications.
Each service model provides a level of abstraction and according to Kavis, (2014) , certain
models can reduce the efforts required by the service consumer to build and deploy
systems, for example ERP systems as a SaaS solution, (Kavis, 2014). Kavis argues that
while SaaS solutions reduces efforts, being a top layer service within the open stack (figure
2), means it carries higher risks, outages and disruption to services carry more severe
impacts and flexibility is reduced as often solutions are premade. In such cases the
suitability of such services is determined by the business needs, and this is reiterated by
Yang and Tate, who argue cloud adoption and suitability requires deep understanding of the
business needs coupled with multi domain expertise as this will allow better designing of
cloud solutions which are in line with business processes, (Yang, Tate, 2009).
(Figure 2, Cloud Stack, (Kavis, n.d.)) Commented [LMD22]: Needs citation for source here
Commented [AR23R22]: done
All cloud service models can be deployed within a given business, however the success and
its impact can be determined by various key factors , for example Kavis argues that an
architect should be used to gain an insight into companies, via the Why, Who, What, Where,
When, and How theory, (Kavis, 2014). By using an architecture, organizations, especially
larger ones can identify current goals, business needs and timelines and the current state of
the business, all which can enhance decision making on service model suitability.
Organizations which seek minimizing infrastructure costs and maintenance by removing
hardware such as servers and storage can consider IaaS services, by outsourcing the full
responsibilities to vendors such as Amazon Web services, (Sosinski 2011, 14). Sosinski
further supports the adoption of IaaS by stating that IaaS services can be well suited for
SME’s, especially which require virtual machines, storage, and virtual infrastructure,
(Sosinski 2011, 14). Kavis also supports Sosinski’s views, however he does express
potential risks associated with IaaS, one being the footprint which it carries,(Kavis,2014).
According to Modi, many cloud providers like Google, Amazon and Salesforce hide many Commented [LMD24]: Not Harvard style
parameters of the full proposed SLA to be clearly for users that data is safety preserved.
Commented [AR25R24]: done
PaaS services offers virtual resources as well as development frameworks, which includes
transactions and control structures. Most of this service is maintained by the service
providers , however clients are still able to install and deploy applications. Some of the well-
known providers include Google AppEngine and Go Grid, (Sosinski 2011). According Kavis ,
4
Flexibility within PaaS service model is an issue as legacy vendors can become restricted on
the adoption of multiple languages. This trend has improved as more languages and stacks
have been adopted by service providers, which makes it more suitable for businesses
especially SMEs as the functionalities are acceptable, (Kavis,2014).
Yugal Joshi, vice president of digital and cloud application services from Everest Group
states that organizations are seeking the holy trinity from cloud computing service models
and the adoption is considered when costs and quality are equally balanced, (sellakumar,
2021). In such cases, IaaS may be well suited as the service is very competitive especially
after Amazon web services price reduction, (Kavis , 2014). A two-factory theory consisting of
35 IT consultants was applied by Lee, Chae, and Cho (2013). The study looked at key
adopters and barriers to cloud adoption. PEST analysis was used which indicated the most
important factor for cloud adoption and suitability as being economics, while the barriers
remained social and political for SaaS Adoption.
The suitability of cloud services is dependent on the business requirements. There is no one
right answer to any problem. Businesses have various options within cloud computing,
management, architects, product managers, and developers need to understand the
different deployment models as well as the service models before concluding their suitability.
1.7.1 Review
Cloud computing technologies and services have been clearly defined which meets the
objectives of this report. While Sosinski further states that Iaas services can be well suited
for SME’s, especially which require virtual machines, storage, and virtual infrastructure,
6
(Sosinski 2011, 14). The argument provided by Sosinski lacks depth as no further reasoning
is given on suitability, for examples case studies with added statistics reflecting suitability
can be provided to enhance the support for the arguments. The same arguments can be
made against Sosinski on his statement on SME’s which deploy inhouse applications can be
well supported by cloud technologies as they can acquire infrastructure via large providers
such as Amazon web services and Google, (Sosinski 2011, 14).
A two-factor theory conducted by Lee, Chae and Cho in 2013 supports cloud adoption
suitability within SMEs. The theory is fundamentally strong as it consisted of 35 IT
consultants, where PEST analysis was used which indicated the most important factor for
cloud adoption being economic, while the barriers remained social and political for SaaS
Adoption. Benefits and challenges have been clearly defined by Marston who supports
Cloud and its positive impacts on reducing carbon footprints, (Priyadarshinee, Raut, Jha and
Kamble, 2017). Contrasting views on this topic have also been added, to give the report a
more balanced outlook, for example kim, kim and lee all argued that cloud adoption does not
reduce carbon footprint. Arguments from both researchers lack depth as they are opinions
and further data to support their arguments is required. While both researchers lacked data ,
a Forrester survey showed that most SME IT workers believe that the efficient use of energy
and recycling IT resources are important issues which should be handled efficiently. We can
argue this concept supports the adoption of cloud computing as cloud technologies have
better control of energy use , for example auto scalability options within AWS allows clients Commented [LMD28]: Should be capitals, or AWS
to scale resources upon demand. Also, less use of physical resources means less recycling.
Commented [AR29R28]: Done
Literature used to support risks associated with cloud adoption includes handling of data.
Timberg and Gallen express their concerns by outlining the risks associated with third party
handling of data and use NSA case study to support their arguments, (Timberg & Gellman
2013).
While the concerns have been outlined, timberg & Gillman go further to disclose on methods
which have been implemented to combat such risks by stating that service providers have
been implementing strategies to mitigate such risks, for example encryption keys via AWS.
Based on this we can see the transition of development within the associated risk. A
multiframework case study concluded reasons to lack of adoption as lack of industry-specific
standards, the paucity of technology readiness, un-awareness about potential benefits of
this technology, unsatisfactory quality of cloud services, and the incompatibility between
initial expectations and real experience, (Alshamaila, Papagiannidis and Li, 2013). While the
study adds credibility, not enough information has been provided on how the study has been
measured, and this can reduce its depth. Furthermore, the study was conducted in 2013 and
since technology has advanced which can further invalidate the results from the framework
study.
1.8 Summary
This literature review includes key aims and objectives with applied themes, all which are
pivotal for data gathering. The gathered data has allowed me to establish that cloud
computing technologies has various applications and benefits and with development, risks
are being mitigated. More importantly, its service models are compatible for all business
sizes. However, the compatibility does depend on the business needs and requirements, for
example larger businesses with larger capital may spend more on innovation, example
includes SaaS solution more multi department integration. Smaller companies may be less
comfortable with taking heavy risks on innovation; however, they are more influenced by top
7
management which can aid IT innovation. The next chapter is design and methods which will
advance the project from literature review stage.
8
Commented [AR31R30]: done
Method and Implementation
1.9 Introduction
Design and methods chapter will focus on different methodology approaches used within this
project. This chapter will define the design specification and user requirements for the
solution. A concept solution design will be created, and evidence will be provided which will
consist of topology designs and network and cloud diagram for each given stage for the
migration. Furthermore, each theme discussed within the literature review will be explored
further for solution implementation considerations. Testing strategies will be discussed and
agreed upon and evidence for testing will be provided. Lastly, a summary and conclusion will
be carried out to complete the chapter.
1.10 Methodology
This project will follow the waterfall methodology as it follows a simple approach which is
well constructed and organised. The approach clearly defines the requirements and scope
which assists in calculating budget. Furthermore, the approach is structured, resulting into
better measurement methods for completing tasks. Unlike agile, the waterfall approach
struggles to adopt to new changes, however most often the scope and requirements remain
unchanged and new developers can join the project and get up to speed via the
requirements and progress documents. The waterfall approach consists of five key stages,
which are illustrated below in figure 3, (Waterfall Methodology - A Complete Guide | Adobe
Workfront, 2022). Commented [LMD32]: Good
Requirements
Design
Implementation
Testing
(Figure 3, Waterfall methodology, Waterfall Methodology - A Complete Guide | Adobe Commented [LMD33]: As above, use in-text citation here
in the Figure note
Workfront, 2022).
Commented [AR34R33]: done
9
1.11 Limitations and Options
Business readiness processes are essential for successful migration for any given business,
(Kavis,2014). However, this will be a limitation, my experience in conducting such
procedures is low. In most cases a cloud architect would carry out such procedures,
however costs limitations do not make this option feasible. To overcome limitations, I have
the option to use extensive tools for migration strategies from highly respected vendors, for Commented [LMD35]: Avoid third parties
example Amazon web services offer evaluator tools for assessing business readiness.
10
Extensive resources will be used which focusing on best practises and methods for IaaS
service model adoption.
11
1.12 Aspire Supported Living CIC
Aspire supported living CIC employees over 350 staff with 50 based at their Birmingham
office. They currently have the following IT equipment within their Birmingham office.
Equipment Usage Importance Risk mitigation Cost
Dell 17inch HD Monitors are Medium Ensure £2000 total
monitors x 25 used alongside monitors are
computers to plugged
conduct daily correctly and
duties. wires are safe.
Ensure each
monitor is
regulated by the
correct
regulating body.
Dell computer Conduct all High Ensure £3000 total
towers. business computer
4GB RAM operations, towers are
60GB Hard from admin correctly placed
drive tasks to email and configured.
2ghz processor comms. Ensure each
x25 machine is
compliant and
regulated.
Sharp MX- Carry out all Low Ensure service £38ppm (3-year
C407F printer printing is regularly contract) option
requests from carried out. to purchase
the business
employees
Server Act as the point High Ensure it is £1500
for file and serviced
storage, DNS , regularly.
DHCP , web Monitor
server. performance
and pre plan for
any down time.
Switches x1 Control and Medium Ensure it is £500
manage data correctly
flow within the configured and
network. serviced.
Routers To carry out Low Ensure it is Free
data packet correctly
transmission configured and
serviced.
Laptops x4 To conduct Medium Ensure laptops £800
business duties are used in line
by the senior with business
employees policies and
services
regularly. Use
anti-virus
software and
report all
12
suspicious
activities.
Total cost
£9168
13
Receptionist The data can Medium Damages to 3 Ensure all
has the role be the employees carry
of compromised company, out ethical
answering if the financial processes and
all desk computer is losses and work in line with
queries compromised. loss of business policies.
which vendors
includes and
making suppliers as
reservations well as
, bookings customers.
for services
provided by
aspire CIC.
Senior Data can get Medium High impact 3 Ensure laptop is
manager lost or on positioned safely
delegates compromised company and always
tasks and due to using ethics , secured. Add
oversees white boards. reputation, passwords to all
the Laptop can and loss of computers.
employees be trust within
within the compromised the
office. or stolen, leadership.
Laptop is resulting in
used for loss of key
checking data.
emails and
electronic
tasks, while
whiteboards
are used for
checking
progress of
KPI’s.
Manging If computer High This risk 4 Ensure multiple
director gets can security
oversees compromised, damage the processes are
the whole key info can company placed on key
staff and get leaked. reputation machines.
primarily and Consider
engages possible backups of
with senior fines as systems and
managers. data is case recovery points.
sensitive.
Loss of
revenue
and
contracts
can lead to
staff
leaving.
14
H.R Admin Data must Low This risk 2 Apply passwords
looks after remain
can and ensure data
employee’s secure on the
payroll H.R admins damage the is backed up. Commented [LMD38]: Good – could you include
queries laptop as something about project risk too?
company
which are data on Commented [AR39R38]: done
handled by contracts of reputation
a 3rd party. employees Commented [AR40R38]: check risk table below related to
Recruitment can get project
is done by disclosed.
the H.R
team.
15
1.13 Design Specification/User Requirements
Below are details on the design specification and user requirements for the Cloud migration
proposal of Aspire supported living CIC. All factors related to the migration proposal will be
presented here and assessed before commencement of the solution. The design has been
influenced after gaining the information from the business owner.
Customer The migration design proposal will be for
Aspire supported living CIC and their
employees.
Hardware Requirements Keep all existing hardware. No further
hardware requirements.
Software Requirements Windows operating systems/ windows
servers
Internet connectivity
Amazon Web services application
Costs All costs related to the design are related to
individual services within Amazon web
services. The design and implementation
costs will be covered through AWS student
account. Aspire CIC has an allocated Commented [LMD41]: How will this budget translate to
budget of £10,000 per annum. The budget what the business want?
should allow the business to cover costs for Commented [AR42R41]: done
the cloud resources being implemented.
The business should be able to have a
dedicated storage service , with backup
capabilities. A web server application
should be created which migrates the
website to the cloud.
Environmental considerations The migration proposal will be in line with
the countries laws and regulations including
GDPR. Access to AWS will be allowed via
internet connectivity and access levels will
be provided to enhance security.
Safety/ security Safety procedures will be incorporated as
the end user deals with sensitive data.
Security protocols will be added, such as
root users access levels.
Purpose The purpose of the design proposal is to
educate the director and decision makers of
Aspire supported living on cloud computing
adoption. Furthermore, the proposal will
give an insight to IaaS migration strategies.
Manufacturing The implementation of the migration will
commence on 1/2/2022 until 12/04/2022.
16
1.14 Selection of appropriate vendor
Before commencing with the solution, market research was conducted which helped gaining
information on top vendors. As these vendors have similar products and services, the
determining factor would be costs and these are illustrated below in the costs table.
Cloud computing cost table with service level agreements. Service level agreements allow Commented [LMD43]: What does that mean for the end
users to measure the performance of the solution. If service levels are not met or drop below user?
the agreed levels than , users can claim compensation. More importantly these service Commented [AR44R43]: done
levels will help in comparing with the existing levels.
AWS product Requirements Service level Cost monthly
EC2 instance x3 Microsoft server 99.9999% 340 USD
with SQL server 4080 USD
web
Storage amount
30gb
S3 storage for web 1TB monthly 99.9999% 28.70 USD
hosting and storage. storage 342 USD Yearly cost
DT Inbound: Internet
(10 GB per month),
DT Outbound: Internet
(10 GB per month).
Application load N/A 99.9999% 25.44USD each
balancer 305 USD each
Amazon Elastic IP N/A 99.9999% No charge
(Allows users to mask
the failure of an
instance or software
by rapidly remapping
the address to another
instance in your
account).
17
GCP product Requirements Service level Cost monthly
Compute engine x 3 Microsoft server 99.9999% 348 USD
with operating 4176 yearly
system + license
Standard storage 1tb monthly 99.9999% 368 USD
storage 4416 yearly
Load Balancer N/A 99.9999% 22 USD
264 yearly
Lamp Stack 2gb memory + 99.9999% 12USD
VCPU 144 yearly
Total Cost $9000 yearly
£6879 Commented [LMD45]: I make it £8000+?
Based on the above cost estimations, the chosen vendor is AWS. The reason for this is Commented [AR46R45]: 6879. done
linked to its suitability, ease of use and costs , which are significantly lower than its
competitor. Further I have good level of experience in using AWS platform, which makes this
project more feasible.
A mixture of waterfall and data collection methodologies will be applied. Data collection will
be used primarily for gathering data which supports the literature review, while waterfall
method will be applied as it best fits step by step framework. The concept solution will have
five phases which are:
• Phase 1: Define business needs
• Phase 2: Assess & analyse current systems
• Phase 3: Plan Topology designs
• Phase 4: Implementation
• Phase 5: Test & Evaluate
Figure four illustrates key stages within the IaaS migration process.
Test &
Implement evaluate
the solution the
Plan solution
topology
Assess & designs
Analyse
current
Define System
business
needs
18
1.15.1 Phase 1 &2
Business needs and assessment of current systems will be gathered via multiple methods.
Firstly, meetings will be held to gather data on business needs, and this will be done via the
senior employees of Aspire supported living. The assessment of the business will be done
via a risk assessment form and for this data will be collected from multiple departments. The
purpose of such processes is to gain a better insight into the companies’ current state and
goals.
1.15.2 Phase 3
This stage will require designing topologies to illustrate network configuration and cloud
architecture (see figure five below). Cisco packet tracer and Visio will be used within this
stage for design works.
Architecture design for the IaaS service model migration is shown below in figure six.
Figure illustrates Aspire supported living infrastructure which has a single server containing
multiple hypervisor servers. The infrastructure migration strategy being used is called lift and
shift strategy. EC2 instances will be used for server roles with web server being placed
within a public subnet. Application and database servers will be placed within private
subnets to enhance security. Each instance will be protected by an inbuilt firewall and three
availability zones will be used to improve availability. All instances will be connected via a
router which will communicate with an internet gateway, resulting in network communication.
Full design development details are shown in appendix three.
19
1.15.3 Phase 4
Implementation of the solution will be done and for this stage Amazon Web services will be
used. The implementation will show lift and shift migration strategy which focuses on
migrating existing data to a public cloud platform.
1.15.4 Phase 5
Testing and evaluation will be done to determine the efficiency of the cloud solution. see
testing strategies.
No further changes have been applied to the initial design. The final design is as illustrated
above in figure 6 above. The web server design is illustrated below in figure 7.
The webserver will use an EC2 instance which will run virtual computing machine , in this
case as the server. The EC2 will be placed within the public subnet and will be configured to
interact with the RDS, which will contain PHP and database storage. The database will be
placed within a private subnet as this will enhance the overall security. Internet gateway will
be applied to allow communication between the internet and internal network. The file server
storage design has been finalised and is illustrated below in figure 8.
The file server will link on premise computers storage to AWS S3 bucket as well as amazon
glacier. SSL will be used to uploading and evidence of this will be provided for successful
implementation. Lastly auto scaling and load balancing tools will be applied to measure the
performance, redundancy and availability of the solution
20
1.17 Solution Implementation
Below is the evidence for the IaaS cloud solution implementation for Aspire CIC.
(Figure 9, VPC)
21
(Figure 11)
Inbound rules control traffic flow as they allow certain traffic to come into to network while
blocking certain traffic, resulting in an enhanced network.
1.17.1.2 Subnet creation
Below in figure 12 is the evidence for subnet creation. As defined in the final design, the
solution will contain a public subnet where the EC2 instance will be placed. The private
subnet will have the database and the website file.
22
1.17.1.4 Autoscaling
To improve the redundancy and the availability of the solution I applied autoscaling on the
instance, which is being used for the web server, there for in the event of the instance going
down, a standby instance is in place, resulting in improved system availability. Figure 14
illustrates autoscaling web server instance.
The same tool has been applied for the storage which is linked to the web server. Figure 15
illustrates this below.
23
(Figure 17, Static webpage)
Aspire CIC currently store data on their computer hard drives which is regularly backed into
their server , which acts as a single point of recovery. There for, this solution looked at
various data storage solutions including AWS workdocs, S3 bucket and iCloud. As aspire
CIC have licensed Microsoft suite, the best solution was to implement S3 bucket storage,
there for the screenshots below illustrate the implementation of file and storage server using
AWS S3 bucket. This solution will allow the employees of Aspire to save files onto their
computer machines which will get automatically synchronised onto AWS bucket storage and
backed into cloud.
The first step required creating AWS buckets, which act as storage containers within AWS.
Figure eighteen illustrates the creation of a bucket within AWS.
To enhance the security within the AWS bucket, all public access was blocked as shown
below in figure nineteen. By blocking public access, we add extra layer of security .
24
(Figure 19. Bucket security)
Server-side encryption has been applied to further add a layer of security. By enabling
encryption, all new objects within the bucket will be encrypted. After creating the AWS
bucket, the next process was to create users with permission levels who can have access to
the AWS bucket. Figure twenty-one illustrates user creation, while twenty-two shows
permission levels.
Permission levels gives an added layer of security as certain users are allowed access to
AWS bucket.
AWS bucket allows you to store files , however the process is inefficient on its own, because
it requires access to AWS console upon each storage request, which can be disruptive
especially for businesses which are short on process times. To overcome this matter , I
installed an extension called S3 browser version 10.3.1. This software works alongside AWS
and creates a bridge, enabling synchronisation of data. Figure twenty-three illustrates S3
browser version software.
25
(Figure 23, S3 browser version)
New account had to be set up within the S3 browser as this allowed synchronisation
between the host and the target. The aim was to allow employees of Aspire to save files
locally which can be transmitted automatically to AWS bucket. Figure twenty-four illustrates
setting up account within S3 browser.
Correct name was assigned which matched
the details within AWS bucket. Access key
was created and assigned to S3 browser. A
password key was assigned to enhance
security.
The next step was to create directory folders for Aspire CIC, and these will store data of the
organisation. Permission levels were also configured, and this is illustrated below in figure
twenty-five. The permission levels have been set to full for the owner of Aspire CIC, while
the remaining AWS users have read only access. These can be changed at any time,
however at present are best suited as they enhance overall security of the solution, by
mitigating risks associated with data theft etc.
26
The synchronisation was successful ; however, it was manually processed meaning low
level efficiency. To overcome this, I installed another software known as TNT drive and
figure twenty-six illustrates the installation.
Next step was to run some commands via command line interface. The purpose of this
process was to synch the local host to the bucket in AWS. Figure twenty-seven illustrates
command line code.
After setting up the command line and the relevant tools, I synchronised the process where
data on the local host of aspire CIC would transmit across to AWS console every 5 minutes.
These settings can be amended accordingly but for test purposes suit the requirements.
Figure twenty-eight illustrates synchronisation.
27
(Figure 29, synchronisation configuration)
1.18.1 Testing the file storage Commented [LMD47]: This is all good. I would create a
separate main heading for testing to clearly define the
For testing purposes , I created a few files which were saved on the local host storage for sections.
the AWS storage. The next process was for auto synchronisation from the local host to the
Commented [AR48R47]: Has been done in the testing
S3 browser and from the browser to the AWS bucket. The images below successful chapter 3.3
implementation of file storage system. Figure thirty shows successful folder synch .
Commented [AR49R47]:
Figures thirty-one and two show successful synchronisation of the file customer copy from
S3 browser to AWS bucket.
28
1.18.2 Autoscaling servers
Autoscaling is considered as an efficient method towards having a solution which has
elasticity. This project used autoscaling tools, consisting of cloud watch and autoscaling to
increase and decrease EC2 instances, which in this case are Web and storage servers, the
purpose of this was to scale resources up and down according to Aspire CIC’s requirements.
This should aid in better control and manageability over costs and resource usage. The
evidence below in figure thirty-three(2022), shows the typology design for autoscaling after
an extra EC2 is launched from the dedicated tools.
Below is the evidence of the autoscaling setup for the solution. free tier products were
chosen for this illustration and figure thirty-four illustrates the creation of autoscaling groups.
The next step was to select and assign the VPC and this is shown below in figure thirty-five.
29
The next stage was to configure the group size and scaling policies, and this is illustrated
below in figure thirty-six. For this example, I kept the desired capacity to three , while
minimum was two and maximum to four.
With AWS autoscaling configuration a replacement EC2 should launch immediately after the
original goes down, resulting in lower downtime and this is illustrated below in figure thirty-
nine.
Based on figure thirty-eight we can see an EC2 instance was terminated causing downtime ,
however autoscaling launched a replacement EC2 within minutes and this is shown below in
figure forty, the event log.
30
(Figure 40, Autoscaling log)
As shown above, the first step was to create a scaling policy. The next step was to amend
the group sizes for the instances as we wanted a minimum of two instances running when
CPU threshold fell below 50%. The results are shown below in figure forty-two.
(Figure 42)
Stress test was conducted to determine whether autoscaling was successful on when CPU Commented [AR51R50]: DONE
exceeded 50% usage. This would enhance business performance and continuity. For this I
had to connect to the EC2 instance as shown below in figure forty-three.
31
(Figure 43, ec2 connection)
The next step was to launch the following command(sudo yum install stress -y). This
command will install the stress utility. This was followed by (stress -c8) command, which
adds large number of processes to the CPU’s. figure forty-four shows CPU increase and
forty-five shows the policy as successful.
1.18.3 Recommendations
While the above solution is just one option for file and data storage , there are various other
options for considerations, such as Amazon S3 glacier which has lower costs. Another
option for consideration is Amazon Workdocs which is a fully managed, secure content
creation, storage, and collaboration service. This tool will allow an easy method to create,
share and store data from any dedicated machine. The data is secure within the AWS cloud
and file accessibility is available on demand, meaning faster accessibility to applications and
files. Commented [LMD52]: Good – for the presentation, I
would focus on security features you have included.
32
1.19 Errors During Implementation
During the implementation , I ran into various errors, which caused a slight delay in
completion. However, I managed to overcome these errors and the evidence is illustrated
below in figure forty-six, seven and eight.
Terminal problem was faced which
didn’t recognise the PHP file.
However, I managed to overcome
this by configuring the correct
settings within the Linux terminal.
(Figure 46)
(Figure 47)
To overcome this, a thorough investigation was carried out and amendments were made to
the code within the PHP file. The error was resolved, and the evidence is shown below.
(Figure 48)
As we can see when data is inserted within the name and address fields, it gets stored on
the webserver database as illustrated above.
33
1.20 Testing strategies Commented [LMD53]: Good. This will be a discussion
point for the presentation, I think!
Testing strategies have defined (see appendix 2). Testing will be done after the
implementation stage and the feedback will be used within analysis and evaluation. Users
will have access to a computer with internet and this will allow testing to commence via AWS
platform. Testing criteria has been illustrated in the below table.
Test Type Reasoning for test Expected result
Application Accessibility To ensure Root users have Successful access to AWS
test access to AWS console. root user.
Systems Accessibility test To ensure all employees of Successful systems access
Aspire supported living have to employees of Aspire
access to new integrated supported living.
systems
Response time To ensure system is System response time is
performing to expected SLA. within agreed
measurements.
Soak Test Soak testing measures the System should continue to
performance of a system operate with increase of
when exposed to heavy traffic.
traffic.
Memory To measure scalability of Successful archive of data
the memory and ensure within cloud storage.
data is saved securely.
CPU Usage To measure performance of Scale up should increase
CPU and the new systems, CPU usage, while scale
especially when scaling up down should decrease CPU
and down during peak usage.
times.
Network Usage To ensure network can Network should be able to
deliver optimized accommodate system
performance from the new demands at busy periods.
solution
Security To ensure all functions and Security tools such as
resources including data are encryption and keys should
secure and in line with secure business processes
vendors SLA. and data.
Disaster recovery To ensure a disaster Recovery plan should allow
recovery plan is available in recovery of data etc.
the event of failure.
User experience Measure user experience of Data collected on user
new integrated solution. experience will give an
insight to the system.
Updates Ensure all updates are Updates and automation
uploaded efficiently and on should work successfully.
time.
34
1.21 Summary and Conclusions
The waterfall methodology has been used for this project. The information gathered from the
literature review and design methods has allowed me to gain a direction towards the
development of the migration case study. Primary research and other data will be used to
aid the development of the AWS solution. The waterfall methodology will allow me to
construct the project into smaller tasks and offer more direction. Furthermore, each key
objective can be structured carefully through this approach which can enhance the overall
success of the project.
Evaluation
Evaluation methodologies will be used to measure the success of the solution against the
set objectives. Quantitative and qualitative methods will be applied to support the project
objects on Cloud computing adoption and its associated risks and benefits towards adoption.
The solution will be tested on its performance, functionality, availability, usability, and
security. The solution will also be compared against the client’s current solution and its
service level agreements, which should aid towards more conclusive arguments on the
effectiveness of cloud adoption. A variety of testing methods will allow me to gain a more
balanced data, which should give more balance to the project. Furthermore, testing has
been carried out a maximum of three key personnel. The reason for this is due to time
constraints and availability. Testing has been carried out by three stakeholders, of which
one is the managing director of Aspire CIC. Certain parts of the solution will also be tested
by third party software. The findings from testing the solution should allow me to determine
whether the solution was a success or a failure.
35
1.23 Testing
Testing has been carried out by Myself on the key elements of the solution, which includes
usability , performance, and functionality of the web server. The web server should be able
to successfully show the web site for Aspire CIC, secondly allow input of data which should
be saved to the attached database. The file storage is the second key aspect of the solution
which will be tested. This core area should successfully allow users to create and store files
within the AWS cloud. Security tests will also be carried out on the solution to validate its
redundancy. Below is the table which illustrates the testing which has been carried out by
me . Commented [LMD54]: Make it clear that the first stage is
your own testing as you have developed the system
Test Type Reasoning Expected result Actual Result Future Commented [AR55R54]: Done in the first line
for test improvements
Application To ensure Successful Root users have N/A
Accessibility Root users access to AWS been applied
test have access root user. successfully,(see
to AWS appendix 2)
console.
Systems To ensure all Successful Iam users have N/A
Accessibility employees of systems access been created which
test Aspire to employees of allows users to gain
supported Aspire access to the
living have supported living. application. (See
access to appendix 2).
new
integrated
systems
System To ensure An EC2 should The test was As this test is
availability test EC2 automatically carried out and the basic, we can
instances are launch in the result was as consider a
available in event of current expected,(See more detailed
the event of one being 3.9.1.5 and test which
downtime or terminated or 3.19.2.1). captured
failure. To going of line. greater
ensure the The new EC2 evidence ,
webpage should have the enhancing the
application same security overall test.
continues to group policies.
be available.
Response To ensure AWS System The result was a Consider using
time system is response time is success as all Amazon cloud
performing to within agreed system response front which can
expected measurements. times were deliver web
SLA. Furthermore, performing to the content to web
the web server expected SLA, (see application
should load appendix 2). while
correctly and decreasing
efficiently. Data end-user
storage backups latency. This is
should be done achieved by
efficiently. leveraging
networks of
36
global data
centres .
Soak Test Soak testing System should Soak test was To gain more
measures the continue to conducted on the in-depth data,
performance operate with web server and the we can
of a system increase of results gained were consider
when traffic. good, (see increasing the
exposed to appendix 2). For file traffic flow.
heavy traffic. and storage This can
evidence (see present
3.10.2.2.1). extensive data,
resulting in
enhanced
project.
Memory To measure Successful This test returned We can
scalability of archive of data positive results as consider
the memory within cloud data was saved multiple
and ensure storage. securely and applications for
data is saved efficiently onto the data storage
securely. cloud. such as
amazon glacier
or achieve.
This should
allow better
organisation
for storing data
and may
enhance
overall transfer
rates and
costs.
CPU Usage To measure Scale up should This test was We can
performance increase CPU conducted by consider
of CPU and usage, while testing autoscaling, increasing the
the new scale down and load balancing number of ec2
systems, should decrease and the results instances to
especially CPU usage. have been shown increase the
when scaling within the depth of the
up and down implementation,(see solution. we
during peak 3.10.1,2 and3). can improve
times. the policies for
the load
balancing, e.g.,
decrease
balance after a
particular time.
Network To ensure Network should This test was N/A
Usage network can be able to successful, see
deliver accommodate appendix 2.
optimized system
performance demands at
from the new busy periods.
solution
37
Security To ensure all Security tools Security features Consider
functions and such as including key pairs, adding MFA
resources encryption and IAM roles for Root authentication
including data keys should users, permissions for AWS users.
are secure secure business and encryption Cloud trail
and in line processes and have been applied. could also be
with vendors data. Security groups considered.
SLA. defining inbound
and outbound rules
have been applied
within firewall (see
3.9.1.1).
Disaster To ensure a Recovery plan This test was Consider
recovery disaster should allow conducted and both enhancing
recovery plan backup and web server and file backup
is available in recovery of data server were backed methods by
the event of in the event of up, (see 3.9.1.5) using AWS
failure. failure. tools which are
in higher in
costs.
1.24 Results
The overall result of the implementation meets the overall project objectives. The evidence
provided within the implementation section illustrates successful implementation of the web
server along with file and storage services. furthermore, security features have been applied
to ensure the solution is efficient in combating potential security threats. The key aim of this
project was to collate primary and secondary research which supports cloud adoption and
its benefits and challenges towards SME’s. furthermore, an inclusion of a case study was
included to enhance the readers understanding on the chosen subject. Based on the above
aim, it is fair to say that the aim has been met, however the scope for enhancements
remains open as there is an opportunity to expand on research as well as the
implementation. Section 3.9 to 3.10 show clear evidence on the implementation, while the
literature review chapter supports cloud adoption and its associated risks and challenges. Commented [LMD56]: Can we have a clear mapping of
objectives/client requirements to outputs?
The client Aspire CIC currently has a dedicated inhouse server which handles their storage Commented [AR57R56]: Completed , please see second
requirements as well as web application needs. The requirements within this project were to paragraph and project deliverables
adopt the same concept using cloud technologies. Furthermore, the managing director
reiterated on his desire to gain knowledge on the benefits and associated risks on the
adoption of such technologies. This project consisted of 5 objectives, three were related to
research and knowledge on the benefits of cloud computing adoption, while the remaining
focused on the implementation of the solution. All the aims have been met as the output
from the project, allows Aspire CIC to enhance their knowledge on Cloud Computing, while
understanding best practises and associated risks on adoption of such technologies. The
implementation of the solution has allowed Aspire CIC to consider Cloud technologies. The
data output from the solution has allowed Aspire CIC to compare their current infrastructure
to cloud with a serious consideration of migration within the future. Aspire CIC have been
able to gain a better understanding on the running costs of cloud technologies which has
given them a better understanding on the technology’s suitability.
38
Below are the project deliverables :
• The project has clearly been able to define key cloud service models and their
suitability’s towards SMEs.
• The project outlines clear benefits and risks associated to adoption of cloud
technologies, which is supported by quantitative and qualitative data. This has
allowed Aspire CIC to enhance their understanding of cloud computing technologies.
• Critical success factors related to adoption of cloud have been defined and evaluated
, enabling Aspire CIC to understand best practises on adoption.
• The IaaS solution has been completed using AWS , enabling Aspire CIC to consider
such technologies within the future.
The project aim was divided into 5 core objectives. The first objective Critically examined
cloud computing services and their suitability towards SME’s. The objective has been met as
extensive research data has been provided within the literature review chapter, which
focuses on cloud computing technologies. Data has been used from various researchers
and institutions, including qualitative and quantitative to support all arguments on cloud
technology and suitability towards SME’s. By meeting this objective, it has allowed the
reader of this project to gain a better understanding on Cloud computing and its suitability.
While it may not completely enable readers to carry out full strategic migrations, there is
substantial data on technology and related services to guide the reader towards adoption
which may have better chances of success.
The second objective was to evaluate critical success factors and their importance towards
successful cloud adoption. This objective was also met by collecting data through multiple
types of data including research papers and questionnaires which were given completed by
multiple types of participants including cloud engineers, architects, university lecturers and
current undergraduate students. The evidence gathered was substantial, however it did lack
depth in certain parts, for example some participants within the questionnaire lacked overall
knowledge. Furthermore, the success factors were generic and lacked case studies which
backed the researchers’ arguments, which reduced the depth of this project. Due to time
constraints, group sessions and discussions were limited, and this stopped me from
capturing data from focus groups, which again was a limitation towards achieving this
objective.
The third objective was arguably one of the most important which evaluated Cloud
computing adoption benefits & challenges to SME’s. like the first objective, this was
achieved through the literature review and via primary research including interviews with
multiple industry experts. Data received from the questionnaire and interview supplemented
by literature review and added depth to the overall project. Furthermore, this objective has
allowed readers to gain a better understanding on the associated risks and challenges
towards cloud technologies and its associated services. in doing so they can avoid such
areas, which may improve their strategy towards cloud adoption.
The next objective was to design and implement the solution. Multiple topology designs were
created to aid the design process, (see 3.5). User requirements were also defined which
were critical in selecting the appropriate service. A risk assessment was carried out on
Aspire CIC, which allowed me to gain a better understanding of current processes and Commented [LMD58]: Proof read
infrastructure. A breakdown of appropriate vendors was discussed and evaluated. Costs
Commented [AR59R58]: Amended
were gathered within a table to aid selection, and this led towards making a decision,(see
3.4 ,5). Software such as Cisco packet tracer , along with Microsoft Visio and Microsoft word
were used to create topology designs supporting this objective. By carrying out such tasks
the design stage was completed with great level of detail, enabling a smoother transition into
the implementation. The implementation was successful as AWS console was used to
create the actual solution. various software was used to support the application, along with
39
various tools including firewalls, autoscaling and load balancing. In doing so, the objective
was met.
Test & evaluate was objective 5 and this has been met. Various tests were carried out by
multiple people including myself to measure the solutions consistency, (see 4.3). soak tests
and response tests were conducted to determine the solutions consistency and the results
were in line with the greed SLAs of AWS. At current stage the solution is basic and requires
further enhancements , but due to budget limitation and time constraints, I was limited to free
tier products within AWS console. External third-party software was used to carry out various
tests for the web server application and the results are in the appendix 2. It would be
interesting to analyse the current solution against another vendor such as GCP, as this
would allow me to compare both service providers.
1.25 Discussion
The project derived from my curiosity and passion towards the concept of cloud computing. I Commented [LMD60]: Avoid ‘I/Me’. Talk about any
was always intrigued by the mixed perspectives towards the technology and its services and unusual findings.
wanted to take a deeper insight into its concepts. As a result of mixed views, a clear gap was Commented [AR61R60]: done
present for potential adopters of technology and this prompted me to take up this project,
which would allow myself and other readers to gain and enhance knowledge on cloud
computing. Furthermore, I wanted to research on whether cloud computing is suitable for
SMEs as there is mixed views on this. The scope for this project was broken down into key
areas, focusing on the risks , challenges of cloud computing towards SMEs. Furthermore,
critical success factors on adoption were also researched and the data was presented within
the literature review. Quantitative and qualitative research was applied to enhance research
findings and the results of these will be discussed below. Lastly the implementation was
designed and completed using various tools and methods , considering the user friendliness
for the client.
To accomplish the project aim, the objectives had to be met. As I was going to implement a
solution , I was required to examine the services of cloud computing. In this case it was to
critically examine services which would lead me to gaining better knowledge on their
suitability towards SMEs. The purpose of this objective was to aid me towards selecting the
appropriate service for the implementation. Various data was gathered from multiple
researchers and the data was inputted within the literature review, for example Kavis argued
that SaaS is ideal for clients who are looking for a complete solution, as it requires minimal
configuration and maintenance. Furthermore, Kavis also believed that those clients who
required instant resources without having the need to purchase, then IAAS would be a
consideration, (Kavis, 2014). Ultimately all services carried risks, and this was reiterated by
Kavis who mentioned that certain services have greater risks, for example SAAS as it is a
top layer service meaning disruption to service can have greater risks. Ultimately suitability
on services is dependent on the needs of the business and this was emphasised by multiple
researchers including (Yang and Tate, 2009). Kavis went one step further to state the
requirements of an architect as it would aid in gaining a better insight into companies, via the
Why, Who, What, Where, When, and How theory, (Kavis, 2014). Multiple researchers have
shared their thoughts on cloud suitability towards SME’s and the data gathered has given
arguments on both sides on suitability, which has resulted in balanced research. However ,
it must be stated that the researchers’ arguments are slightly subjective and bias , as some
lack data or studies which support their arguments. However, the data captured is sufficient
and invaluable for the project as it helps in meeting defined objectives.
Sosinski’s arguments helped in meeting this objective, for example Sosinski argues that
IaaS services can be well suited for SME’s, especially which require virtual machines,
40
storage, and virtual infrastructure, (Sosinski 2011, 14). To support Sosinski’s argument,
participant two within the qualitative data agreed towards cloud computing and its suitability
for all business sizes, including SME’s. Participant two argued that the benefits of having no
upfront costs makes it suitable for smaller businesses, however, his views on suitability to all
businesses was disagreed upon. Interviewee one argued that cloud technologies is not
suitable for the banking sector, as it was holding key sensitive data. He also stated that
certain banks were very hesitant to place their data within cloud but were becoming more
acceptable towards hybrid solutions as it enhanced data security.
The suitability of cloud technology is dependent on the business readiness and their needs.
The application of certain questions within the questionnaire supported data which would
help in meeting the first objective , for example 97% of the participants wither answered yes
or maybe towards cloud computing suitability and its suitability towards all sizes of
businesses. Furthermore, 48.5% agreed towards its suitability to small medium enterprises,
while 37% answered as being neutral. Figure forty nine and fifty below illustrate the
questionnaire data. For full data see appendix 9.1.1.4.
Based on the above data from primary and secondary sources, a strong argument can be
made that cloud computing is well suited and is able to offer services to businesses of all
sizes. Equally it is important to note that the suitability of services is dependent on the end
users’ requirements.
The next objective was to critically evaluate factors which aid success cloud computing
adoption. The sole purpose of this objective was to gather data which would give a greater
insight into successful steps towards cloud adoption. There was a common theme when
searching through case studies as most researchers had similar views on success factors,
for example having a management which carried good level of experience was identified as
the key success factor. Potter et al , argued that top management can help in ensuring the
availability of resources for implementation of new technology adoption (Annukka, 2008;
Premkumar & Potter, 1995). Hassan also supports top management support as a pivotal
factor for cloud adoption, (Hassan, 2017). Potters and Hassan’s statements help to identify
critical success factors; however, they do lack depth as arguments could be enhanced
through the application of case studies looking at skilled management v nonskilled
management.
The data gathered from the interviews support the arguments above as both interviewees
agree that top management is pivotal for successful adoption of cloud. Participant two
argues that expert management have the skills to be better prepared for change and have
the required knowledge to overcome any potential setbacks, while participant one has
similar arguments. The data from the questionnaire shown below in figure forty-nine also
supports the above arguments as 13% of participants answered either disagree or strongly
41
disagree to whether business management with higher skill set are better equipped for cloud
adoption. This symbolises a strong trend which indicates that management with string skill
set are a key success factor towards cloud adoption. Commented [LMD62]: Excellent analysis in this section
(Figure 51)
It must be stated that the data for supporting the critical success factors can be further
enhanced, for example case studies can be included to add more depth to the overall data,
which would enhance the overall project research and make the research more balanced.
The next objective was to evaluate the benefits and challenges related to the adoption of
cloud technologies, paying a particular focus towards SMEs. This objective was important for
the project as it enabled the reader to gain a better understanding on the benefits and
challenges associated with the adoption of cloud services. furthermore, any associated risks
with the adoption were disclosed within the chapter and the purpose was to collate sufficient
information, enabling the reader to identify trends in best practises on cloud adoption.
Sosinski believes key benefits of cloud technologies include abstraction, virtualization, and
scalability. This argument is very strong and is well supported by both participants from the
interviews, as both state the key benefits as having the ability to scale resources on demand
without worry about heavy upfront costs. Furthermore 31.8% of the participants shown below
in figure fifty-two, also agreed on scalability as being the single main benefits from cloud
technologies adoption within small medium enterprises.
(Figure 52)
To support the above arguments, The literature review gathered data which focused on
resources that supported multi-tenant usage, resulting in enhanced elasticity, for example
EC2 instances, which can be scaled according to client requirements within a shorter
period. Based on this data there is a strong trend which highlights scalability as a key
benefit. To validate this approach, I conducted a test within the implementation which
focused on launch times for EC2 instances. The results captured were in line with AWS
service level agreements, but they exceeded the current levels within Aspire CIC because
on average the instance was ready for launch within 60-90 seconds after setup, (time,
Spodarets, Rotenstein and Kumar, 2022). On the other hand, the average time for a server
set up can range from 1 to 3 months from the time of purchase to deployment. Interviewee
one also emphasised on this point by indicating that the time needed for deployment is
incomparable to purchasing infrastructure, as it is significantly lower, which makes it a good
42
option for business owners. Furthermore, it was mentioned by the interviewee that on
average a server can be ready for use within 4 hours through cloud for their end users which
removes heavy time constraints from the classic in house infrastructure deployment
methods.
Marston arguments support cloud computing and its benefits towards SMEs as he argues it
can reduce costs related to energy consumptions (Priyadarshinee, Raut, Jha and Kamble,
2017). This statement is further supported by a Forrester survey which was conducted
within United Kingdom. The study found similar results as energy consumptions being
positively impacted and beneficial impacts upon the environment. Both arguments enhance
the balance towards the research which differs from the case studies which have been
observed. This is because some researcher’s arguments seem biased to single views which
causes limitations on their balance and validity. To overcome this obstacle , I ensured the
data was used from multiple researchers with contrasting views for example Kim, Kim and
Lee had contrasting views, as they believe cloud adoption does not reduce carbon footprint,
(kim, kim and lee, 2021). By following this method, the overall research has more depth and
greater balance.
Further contrasting views were applied , for example some researchers agreed on cost
savings , however Kim disagreed as he believed costs are not always transparent and often
customisation can lead to further unexpected costs, (Kim et al 2009). Furthermore, security
was identified as a key risk associated with cloud technology. Multiple researchers including
Kavis and Sosinski agreed with this risk and to validate this argument further, the data from
the questionnaire illustrated below in figure fifty-three shows as 43% of the participants
having similar thoughts on the main risk associated with cloud technologies and its adoption.
This qualitative data also supports this as both participants agreed on security as a risk and
an ongoing concern for cloud technology sector which can mitigate adoption.
(Figure 53)
The design and implementation were completed with good level of detail. This objective was
crucial for the project as all the case studies and research which I carried out did not include
any evidence of implementation. The purpose of the objective was to show evidence and
supplement the arguments presented within the literature review along with quantitative and
qualitative data. By applying this approach, the research goes one step further than other
researchers as it gives multiple data types to support arguments. Regular communication
was carried out with the stakeholders during the design and implementation stage, and this
again adds to the importance of supportive management during adoption. Details on current
processes and a risk assessment was carried out which allowed an easier approach towards
the design phase. By comparing suitable vendors , I was able to choose the appropriate
vendor and carry out implementation and this can carry out a multistage approach, which
was part of the waterfall methodology.
Lastly multiple tests have been carried out see(4.3). The purpose of testing was to validate
the implementation of the solution and its relationship with the supporting data arguments.
By testing the solution, I was able to validate its performance, availability, security features
and redundancy. In doing so the testing results were used to validate the arguments
43
presented within the literature review and to the data received from the primary research. By
using this approach, the project can add arguments which are supported by various types of
evidence, and this enhances it from other researchers. I have used multiple types of
research including case studies, articles, questionnaires, and interviews, all which have
given more credibility to the project.
The application of the waterfall methodology allowed me to breakdown large tasks, enhance
organisation and better prepare for each stage. Furthermore, the design and implementation
stage were given a better structure as each task was clearly defined with clear deadlines,
ensuring the project was completed in line with the budget and timescales. A Gant chart has
been utilised to aid with the organisation and completion of each key task required to meet
project objectives, see (appendices 9.1.1.5). The Gant chart has helped in improving
organisation of the project by clearly defining each task with a timeline.
The project has met and, in some respects, exceeded in meeting the objectives. The
purpose of this project was to explore on risks and benefits associated to adoption of cloud
computing technologies and related services. In doing so the projects objective was to
educate and enhance the readers understanding of cloud computing. This has been
achieved as the gathered data and evidence has allowed my client to enhance their
understanding towards cloud computing.
Furthermore, the project was supported by the implementation of the cloud solution for the
client Aspire CIC. The aim of the implementation was to allow the client to compare cloud
technologies to current infrastructure. This has been achieved as the implementation
illustrates evidence which highlights the functionality and capability of cloud computing,
highlighting its strengths and weakness. The client has been able to use the evidence in the
implementation to compare, for example auto scaling and load balancing has provided
substantial evidence to support the technology adoption.
I wanted the project to have balanced evidence which supports all arguments on cloud
computing. This objective has been achieved as the use of various case from multiple
researchers has allowed my project to gain greater depth, resulting in contrasting views,
which have given more validity and balance to the overall data. This met the client’s
requirement because they wanted the overall project to be balanced with arguments
supporting all sides of the technology as this resulted in better understanding of the
technology and its suitability.
To ensure This project was different , the application of primary research, resulted in greater
depth and this was because it was used in conjunction to support certain arguments. An
example includes, Kavis who argues on scalability as being a key benefit via cloud
technologies. Primary data was used to support and argue against such statements, and this
ensured the data in having greater depth.
44
The solution meets the defined objectives, as it clearly lays the foundation of cloud
computing adoption and associated risks and challenges for Aspire CIC. The purpose of the
solution was to create an artefact, which would educate the end user into the adoption of
cloud services, and this has been achieved, for example web server application
implementation was carried out and screenshots were provided to show evidence. The
webserver application used basic PHP webpage, which was sufficient as the purpose was to
show implementation, which was executing its primarily role, which in this case was to make
the website available to end users. The website was linked to a backend server which again
met the objective as it allowed storage of data from the webpage. The evidence of this was
captured and presented to validate the solution. Furthermore, various tests were conducted
which returned positive results and these validated the applications performance and
availability. I do feel the website can be enhanced, however the outline has been applied
which is sufficient for the requirements of this project, as the client and readers are able to
see the functionalities of the application. A comparison was also done on the website’s
performance using third party, which further validates the solution. In doing so, we can
determine whether the solution is more beneficial than the current infrastructure being used
by the Aspire CIC. Commented [LMD65]: Key summary for this section:
I met This aims
I wanted the project to show clear evidence on server implementations and their I met This objectives
performance. This has been achieved as the results from testing clearly illustrates the I met This client requirements
This is what I could have done better
performance and any related constraints, for example the web server shows performance
which is based on five active users. This meets the clients’ requirements because they Commented [AR66R65]: Changed
wanted evidence on functionality of resources within cloud and this has been achieved,
furthermore, the client wanted evidence on the handling of resources within cloud, which
again has been achieved. I can improve this area by using the client’s original webpage for
testing which would allow a more detailed comparison of cloud technology to existing in
house infrastructure. in doing so the client would be able to have more comprehensive data
for comparison, which can result in a better judgement of technologies.
After presenting numerous data which explores cloud computing in greater depths within this
project, it is fair to say that cloud computing can be applied to businesses of all sizes ,
including SMEs. Kavis and Sosinski both support this claim, which is further supported from
the results of the questionnaire. Furthermore, the interview data also highlights the key
benefits as having the options to scale resources within a shorter time frame. All this data
presents a strong hypothesis which indicates the key benefits of cloud technologies. To
further validate this argument , the solution implementation applied scalability tools such as
auto scaling, and the purpose was to identify whether cloud technology can scale resources
at a faster pace. The results indicated strong data which supported the above arguments,
and, on the basis, we can safely state that cloud benefits include the ability to scale
resources. Most arguments used within the literature review are supported by data from the
questionnaire and interview participants and this gives depth to the project, an example
includes management as a critical success factor for successful adoption. In this case
multiple researchers supported this argument and the data from primary research was also
inline, which further enhanced the overall argument.
The use of waterfall methodology complimented this project as I was able to design, plan
and implement all key tasks. I applied the same approach during the implementation which
was the correct choice. Overall, this project can clearly define the best practises for cloud
adoption while outlining the areas to avoid and the solution enhances the overall
understanding.
45
Recommendations for future work
The project has been successful in meeting objectives, however further improvements can
be made in numerous areas, which would make the project more scalable and suited for
higher level of clients. The overall research applied within the literature review can be
enhanced in numerous ways. A consideration for researchers from multiple countries can be
used, resulting in data which is more diverse and balanced. Furthermore, all arguments
being applied can be enhanced if they are backed by case studies research as this makes
the arguments more conclusive which would make this project more balanced.
The use of questionnaire is sufficient ; however, this method can be further enhanced as I
believe it currently has some limitations. The increase in participants would enhance the
overall data, adding more depth. To go one step further, we could consider having
participants from multiple countries completing the questionnaire , as it would enable gaining
data from multiple regions, which would give a greater insight to the overall service levels of
cloud technologies. We would be able to determine whether cloud is consistent in multiple
regions across the cloud , further enhancing on its usability and benefits.
The solution could be enhanced in numerous ways, for example we could consider using an
alternative platform for the solution. By considering an alternative platform, we could
measure the performance from both platforms and compare to in house infrastructure and
this would allow the reader to gain a better understanding on the performance of cloud
technologies. This would also allow the reader on having more options on the appropriate
solution for their adoption. The testing phase could be enhanced for example a higher
number of users on the web application can be considered as this would extend the results
of the testing. Testing could be extended on the storage application, for example we could
test the solution on its performance when it’s faced with a very large file , or even multiple
number of files. In doing so, we could further validate the solution.
The web application can be enhanced in many ways. We could apply the actual web page of
Aspire CIC or a webpage which has multiple features, such as video, audio, and pictures. in
doing so, it would allow us to test the website, which is more complex, which can give data
on the solutions ability to handle more complex websites. We could also consider a dynamic
website , which again could further enhance the solutions performance related to the
website. Security features could also be enhanced within the solution, for example MFA
could be applied.
46
Commented [LMD67]: Double check formatting as should
References be A-Z
Commented [AR68R67]: Done
[8] Modi, C., Patel, D., Borisaniya, B. et al. J Supercomput (2013) 63: 561.
https://doi.org/10.1007/s11227-012-0831-5
Alshamaila, Y., Papagiannidis, S. and Li, F., 2013. Cloud computing adoption by SMEs in
the north east of England. Journal of Enterprise Information Management, 26(3), pp.250-
275.
Benlian, A. and Hess, T., 2011. Opportunities and risks of software-as-a-service: Findings
from a survey of IT executives. Decision Support Systems, 52(1), pp.232-246.
C. Gong, J. Liu, Q. Zhang, H. Chen and Z. Gong, "The Characteristics of Cloud Computing,"
2010 39th International Conference on Parallel Processing Workshops, 2010, pp. 275-279,
Kavis, M., 2014. Architecting the cloud. Hoboken, N.J.: John Wiley & Sons, p.37.
Khayer, A., Talukder, M., Bao, Y. and Hossain, M., 2020. Cloud computing adoption and its
impact on SMEs’ performance for cloud supported operations: A dual-stage analytical
approach. Technology in Society, 60, p.101225.
Priyadarshinee, P., Raut, R., Jha, M. and Kamble, S., 2017. A cloud computing adoption in
Indian SMEs: Scale development and validation approach. The Journal of High Technology
Management Research, 28(2), pp.221-245.
Raut, R., Gardas, B., Jha, M. and Priyadarshinee, P., 2017. Examining the critical success
factors of cloud computing adoption in the MSMEs by using ISM model. The Journal of High
Technology Management Research, 28(2), pp.125-141.
Raut, R., Gardas, B., Jha, M. and Priyadarshinee, P., 2022. Examining the critical success
factors of cloud computing adoption in the MSMEs by using ISM model
47
Sosinski, Barrie (2011), Cloud Computing Bible, Indianapolis: Wiley Publishing, Inc
time, A., Spodarets, D., Rotenstein, J. and Kumar, J., 2022. AWS EC2 Instance starting
time. [online] Stack Overflow. Available at:
<https://stackoverflow.com/questions/49648853/aws-ec2-instance-starting-
time#:~:text=Linux%20instances%20are%20frequently%20ready,run%20code%20on%20fir
st%20startup.> [Accessed 4 April 2022].
Yang, H., and Tate, M. ( 2009), Where are we at with Cloud Computing?: A Descriptive
Literature Review, 20th Australasian Conference on Information Systems; 2-4 Dec 2009;
48
Commented [LMD69]: Good
Appendices
(Figure 54)
The first step after the configuration was to initiate and connect to the EC2 instance, which
is shown in figure fifty-four. Update commands were completed as shown below in figure
fifty-five.
(Figure 55)
(Figure 56)
49
Tested the PHP file and the page loaded correctly. The evidence is shown above. The next
stage was to add the autoloading webserver tool as this can improve overall business
continuity and the code is shown below.
Users were added using Linux commands and this is illustrated below.
(Figure 58)
The next stage was to assign the database to the webserver so it can store the information.
The evidence of this is shown above.
50
(Figure 60 PHP file code)
(Figure 61)
51
(Figure 62)
(Figure 63)
The current response time for the web page of Aspire CIC is between 150-200ms. Whereas
the response time from a cloud solution is 168ms as shown below.
(Figure 65)
52
Based on the above evidence we can see the web page as having good response time and
according to google , a response time between 100ms-200ms is regarded as good, (2022).
We can see that as the load increased for a duration of 20 minutes and the webpage
performed reasonably well with no errors. This is good and again validates the solution.
The network speed was lowest at 30kb per second , while the peak was in the mid forties.
Again this is regarded as average within the industry, which again validates the solutions
capcity to handle heavy network traffic demands.
53
1.25.1.3 Quantitative data
Below is the data which has been obtained from the questionnaire. A total of 67 participants
took part in this process. The end users consisted of professors of universities ,
undergraduate students studying related topics and industry professionals including cloud
engineers and architects. Majority of the participants were located within the United
Kingdom, while some were from the United States.
54
55
56
1.25.1.4 Qualitative data
Below is the evidence from the two interviews which were conducted to support the data
gathering for this project. Both participants were happy to proceed and allowed me to
conduct the interview.
Interview was conducted on the 13th of March 2022. The participant has given consent to
participate and is happy for the data to be used as part of the research for the final year
project.
Easier as often less overheads. Data centres requires heavy maintenance . pay for uptime.
Costs have been reduced significantly. Costs can be controlled through manageability (e.g.,
close database when business is closed)
Must have a good monitor admin staff/ otherwise heavy costs can incur
Customise workloads (auto scaling ) less payments . some Unix machines have heavy
upfront costs.
Dev ops can build servers via code execution (much faster than purchasing infrastructure)
Automation is pivotal
Security vulnerabilities
57
Hybrid clouds are used on such occasions. Apply VPN’s
Cloud computing is well suited for SME’s . less upfront costs . on demand costs are lower
Do you feel Cloud technologies can be better utilized by businesses through increased
product knowledge and awareness?
Business management with higher skillset are better equipped at cloud computing adoption
decisions.
Yes to an extent – however it is very important for someone to manage the tools of cloud .
anyone employed by the business must have diverse skill set. Having knowledge on cloud
technologies better equips the business for overcoming any challenges.
select the Main benefit of cloud technologies towards small medium enterprises.
select the Main Risk related to cloud technologies towards small medium enterprises.
It is important to know knowledge but more important on how the knowledge is used in parrel
to business requirements.
select the Main Risk related to cloud technologies towards small medium enterprises.
Security
what is the biggest factor related to successful adoption of cloud technologies within small
medium enterprises?
Cloud will continue to strive forward . most companies want private cloud with public. Better
security. More companies will move toward public as security measures will be enhanced.
58
Market direction is not advisable, but pricing may well come down as more competitors
come on the market.
This participant has given consent to share his thought for the sole purpose of the research
project, there for is happy to proceed.
This candidate has Expert knowledge within cloud computing as well as cyber security and
believes cloud computing has substantial benefits such as being able to lease or rent
computing resources as appose to purchasing expensive hardware. The interviewee also
believes that Cloud has increased popularity due to changes in people’s thoughts and raise
in awareness along with product and development of services.
People were afraid to begin with – data concerns – poor support – security – political issues
– server hosting have their own rules which can cause constraints towards end users.
Private cloud has reduced such concerns , because security is enhanced , for example data
is more secure.
Do you believe cloud technologies is well suited for all business sizes?
Cloud computing is well suited for all size businesses . prices are cheaper and have come
down considerably there for infrastructure is cheaper. The trend for competitive prices will
continue as more competitors will enter the market to offer their services. this is good for end
users , because potentially cheaper rates.
Cloud computing is well suited for SME- NO infrastructure costs -maintenance. You don’t
need to worry about all the constraints linked to purchasing, setting up and maintaining of
infrastructure.
59
Another benefit of cloud computing is that the service providers must meet their SLA’s, or
they can be sued for example AWS and other providers can be sued.
What do you regard as the single most reason towards a more successful adoption of cloud
?
Management is key to successful adoption; they need to have some knowledge and be
willing to learn. They must not be lazy and be willing to support the organisation during and
after the adoption stage. Management must also support transition. Equally very important to
have skilled staff to continue monitoring services-
Are there any still ongoing security concerns related to cloud technology?
Security has been improved due to encryption and private cloud services.
Cloud benefits include cost mitigation, cheaper as subscription – no purchase costs – better
for start-ups and SME’s . Further benefits include -Access worldwide, which can open better
business avenues and resource options.
Geopolitical threats remain, and one should consider this as it can cause business
disruptions , for example wars.
The interviewee is a professional lecturer working for a well-respected university within the
United Kingdom
60
61
1.25.1.5 GANTT chart Commented [LMD70]: Gantt
Below is the completed GANT chart which has been used for this project. Commented [AR71R70]: DONE
1
2