Implementing the application in cloud environment

Assignment Help Basic Computer Science
Reference no: EM13732560

The cloud can facilitate users to have simple and easy maintenance, no capitalinvestment, provide infinite computing power and high volume of data storage for their application needs. In spite of these advantages of cloud some sensitive applications havevarious specific challenges, during cloud implementation, such as security, privacy, accountability, auditability, and transparency for their transferred/stored data in the cloud.

In this assignment you are required to select any one of the following application and present the challenges in implementing the application in cloud environment based on the referred research papers.

Each member in a team is required to refer at least 1 journal paper or 2 conference papers. Therefore, a team will have to refer at least 2 journal papers or 4 conference papers.

The list of applications is given below:

- Enterprise Resource Planning (any modules) application

To avoid repeated selection of same application among various teams - the selection will be restricted to number of teams in the class. There is no specific number - your lecture/tutor will advise you through Moodle announcement and/or in the tutorials.

Research Papers:

The referred conference research paper should be from IEEE, ACM digital library or from Google Scholar and the length of the paper should not be less than 6 pages. A journal paper can be from IEEE, ACM, Elsevier and Springer and the length of the paper should not be less than 10 pages. The aim of this assignment is to understand the challenges involved in implementing the cloud for certain applications. Therefore, all the referred paper should be relevant to the selected application. If you are not sure about the selected research papers, before preparing your presentation,consult with your lecture/tutor about the selected research papers and the relevant application.

Presentation:

Each team should present their work in the Week 11 during lecture time. Each presentation is expected to take between 15 to 20 minutes - this includes Q&A session at the end of your presentation. You will be stopped after 20 minutes, so please time your presentation accordingly so that you have allocated adequate time for your Q&A.

Your presentation should be presented as a collective effort, not a series of referred research papers presented by various team members. Check the criteria for assessment/marking guidelines below for the presentation - it is important is to get the all the referred materials relevant to the application and combine them coherentlyto satisfy the criteria for assessment.

Reference no: EM13732560

Questions Cloud

What do the foreign policies have in common : What do the foreign policies have in common.
Compare the various experiences and acceptance of irish : Using your knowledge from previous chapters that discussed minority groups, compare the various experiences and acceptance of Irish by 1840.
Write analysis report about papa johns international inc : Write analysis report about PAPA JOHN's international inc
One kind of gain from specialization is that : One kind of gain from specialization is that
Implementing the application in cloud environment : Application and present the challenges in implementing the application in cloud environment based on the referred research papers - Enterprise Resource Planning application
According to the law of increasing opportunity cost : According to the law of increasing opportunity cost,
How might each profile make you a better manager : How might each profile make you a better manager and Compare and contrast your DISC and MBTI profiles. Which one do you think represents you better? Which one do you think is more useful
How does starbucks motivate any of its major stakeholders : How does Starbucks motivate any three of its major stakeholders? Using one content, one process, and one reinforcement theory, how does Starbucks build and maintain morale in its business
Conduct an internal assessment using swot analysis : Conduct an internal assessment using SWOT analysis and Evaluate the company's business strategy and global competitiveness plan

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create an entity-relationship diagram with the database

Consider a problem (document) that can be solved creating a database. Identify all elements related to it, and separate the entities with their attributes, making sure that you have functional dependencies.

  Write the algorithm/logic for computing following problem

Given the dimensions of a crate (side 1, side 2, and side 3), find the largest surface area it can provide when used as a table.

  Entity relationship modeling

Entity Relationship Modeling

  Manual park button and the application accurately

As an application tester, I want to press the manual park button and the application accurately records the location of the intended vehicle. The ratio of successes to failures will be recorded to report to the development team.

  Identify occasions when you might insert pictures

1) Identify occasions when you might insert pictures into a Word document. Provide specific examples. 2) Identify occasions when you might use a table in a Word document. Provide specific examples.

  What are some of the drawbacks in using passwords

what are some of the drawbacks in using passwords to limit access to a computer system?

  The device consists of three lights lined up in a row

A friend would like you to build an "electronic eye" for use as a fake security device. The device consists of three lights lined up in a row, controlled by the outputs Left, Middle, and Right, which, if asserted, indicate that a light should b..

  Use any method to prove the following either true or false

any method to prove the following either true or false. you must show all work: YZ+XYZ'+X'Y'Z'=XY+X'Z

  Create a web page online reservation system

create a web page online reservation system. (feedback page and package pake )

  Determine maximum number of telephones end office support

With mean call duration of six minutes. Ten percent of calls are long distance. Determine the maximum number of telephones an end office can support?

  Mips uses word alignment

MIPS uses word alignment, so all words are stored in memory on word boundaries; this means that address bits A[1:0] are always 00. How many and which address bits would be allocated for the set index?

  Describe the necessity of secure architecture

Describe the necessity of secure architecture in information systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd