Preprint
Review

From On-Premises to Cloud: Crafting Your Pathway for Migration Success

Altmetrics

Downloads

184

Views

118

Comments

0

Submitted:

11 November 2023

Posted:

14 November 2023

You are already at the latest version

Alerts
Abstract
Cloud computing has become a widespread technology due to ICT advancements. It allows businesses to move and take advantage of the pay-as-you-go price model. Enterprises pay for what they use and don't have to buy, setup, or maintain resources. However, outsourcing core resources such as storage, servers, operating systems, and software applications from a third party needs careful decisions to take advantage of cloud facilities. Choice of appropriate service provider, deployment and service model must be aligned with business needs and goals. In this paper, we will present cloud computing benefits, cloud deployment methods, services, state-of-the-art migration methods, tools and techniques and will conclude with the role of SDN in cloud computing.
Keywords: 
Subject: Computer Science and Mathematics  -   Computer Science

1. Introduction

Cloud migration is the process of moving local applications, data, and infrastructure to the cloud [1]. The cloud can provide computing resources on demand without the active management of its users as required software, hardware and even network can be stored on cloud. Users may not need to make requests to the ICT helpdesk to perform certain tasks and waste time waiting for them to revert. Also, the services are made 24/7 available, users may only need to request the services that are needed, which is the On-demand self-service. Some cloud services even offer updates and upgrades of the software available automatically, so that users can easily access the services anytime on the platform [2].
Some of the benefits and characteristics of cloud computing are mentioned below:
  • On-demand self-service model
The On-demand self-service model of cloud computing enables provision of computing resources without going through the cloud provider. Users can use the services as long as there is an internet connection, anytime. Some applications even work offline. For instance, additional storage space and access to the database. One exception is that it is not available during the downtime for maintenance [2]. For instance, typically for Public Clouds, service providers get to control the time and date for the system to be offline, forcing it to be on maintenance. However, users get to control the upgrade and maintenance cycle in Private Clouds. Users can monitor the systems and further prevent any outage from the systems [3]. Despite the exception, it still benefits in the commercial world, especially for an online business platform and global company that have different time zones. They may work at any time as long as there is an internet connection, which increases the work productivity level in the company. Next, it can solve the problem of lack of collaborations between its employees and potential international partners. As potential international partners may have different time zones due to its location, communication at identical timeframes may be difficult. As for employees, especially during the Covid-19 outbreak, work from home is not something new anymore. They are able to exchange and update data like number of sales, and progress of certain development of software on cloud by just a click of hand easily [3].
This is made possible by the broad network access of cloud computing which enables information from around the world to share information through cloud computing services networks. The cloud network bandwidth and latency enabling serving time sensitive manufacturing applications to function efficiently. This characteristic improves the mobility of data sharing such as being accessible on mobile handphones and laptops at home. Employees would be able to work at any location that suites the current trend of working from home after the Covid-19 outbreak. This is well-suited for the business that operates internationally enables the employee from different countries to exchange data. The integration of data will exist, and errors and mistakes in the data recording system could be eliminated as well [4].
b.
Data Security and Backup
Moreover, cloud can solve the problem of unsecured database systems comparatively with ICT infrastructure. This is because most of the databases are handled manually, possible human error might occur and even loss of data. When a hacker kicks in, the data will be lost in seconds, without a back-up protection. In a worst scenario, the hardware could not be used as well [4]. When a user stores the data in the cloud, it will produce a copy of the data as a back-up. The back-up data is stored at another server to prevent any data loss or corruption. Service providers control and manage the data system, thus users must put on trust to the providers. This seems that the service provider owns the data stored thus, the issue of ownership will arise. This is because the service provider has full control of it, and its employees could access the data as well.
c.
Choice of public/private data
The cloud can also solve the problem of which data to be stored in private or open to public. In the ICT infrastructure, it is generally either used by the Private institution or the public institution. With each institution, the data store can be viewed by the employee and accessible to anyone as long as they have the identification number of a particular matter. It is unable to have a hybrid storage device which stores the information privately and another information publicly, in other words, the data stored by the user in the ICT infrastructure are still identifiable, personally.
With Multi-tenancy characteristic of cloud, it enables users to share the same applications without revealing their identities. This means that a single program is provided to serve different user groups. This is just like a tenant in a condominium sharing the same building. This is seen in a Community Cloud, where a group of users that share the common goal can share the cost and expertise between them. Users can choose which data or information to be stored privately or publicly and who can have access over the data stored.
d.
Optimized Resource sharing and allocation
The amount of CPU and memory used by the two departments varied. The resource pool may be utilised to fix the problem, and the management can set one party's CPU share to high and the other party's CPU share to normal, allowing department users to execute automated tests. And the second resource pool, which has fewer CPU and memory resources, is sufficient to fulfil the marketers' reduced burden. When the quality assurance department does not fully utilise its given resources, another department may use them. Management can adjust resource allocation or add, delete, or rearrange resource pools as required. The resource pools are separated from one another and share resources. The change in resource allocation within the resource pool has no unintended consequences for any unconnected resource pools [5]. Moreover, SLA (Service Level Agreements) facility offered by cloud services providers ensures the Quality of Service (QoS)[6].
e.
Meeting changing business needs
The goal of cloud computing is to reap the benefits of distributed resources while also solving the problem of large-scale computational overhead according to changing business needs[7].
Seeking more computer resources to meet the rise in demand as soon as possible can be tackled with rapid elasticity, which allows users to adjust resources up or down at any moment, removing the need to maintain extra infrastructure on hand to accommodate dynamic workload surges. Cloud companies are seen to be more flexible if they can swiftly modify resources to meet your changing needs. Rapid flexibility also aids in avoiding under- and over-provisioning of computer resources. Over-provisioning is purchasing greater capacity than you require. Under-provisioning, on the other hand, happens when you give fewer resources than are required [8]. Over-provisioning costs money, while being under can cause problems. Both problems cause downtime, which can reduce income and customer satisfaction. Rapid elasticity in cloud services minimises the chance of dealing with such difficulties for short-term resource demands such as web traffic spikes and databases backups [9].
When an enterprise firm expands and requires more storage space, computing power, bandwidth, and current user accounts, metered call service can help. By implementing an abstract level metering function appropriate for service type, the cloud system automatically regulates and optimises resource utilisation. Its delivery style in which the utility supplier tracks how many services each customer consumes in a certain time. Measured services offer providers with information on resource use and provide clients with a clear grasp of the invoicing mechanisms for the services they use. The service takes advantage of rising time, repeating dimensions, and smooth indication changes, picks coding and compression methods wisely, enhances data compression ratio, and saves you storage space by pre-reducing accuracy and aggregating previous data [9].
The rest of the paper is organized as follows: Section 2 presents the cloud migration methods, tools and techniques. Section 3 presents cloud deployment and service models, Section 4 gives the overview of the SDN enabled cloud computing, and Section 5 concludes the paper.

2. Cloud Migration Methods

Online migration is the migration of systems that provide services online from one location to another, with no downtime and no disruption to services, and is transparent to users. The process is similar to encapsulating a virtual machine in a file and running the configuration and memory running state of the business environment on another physical machine over the network, maintaining the original running state all the time, and eventually migrating the source host physical host to the destination host on the cloud.
Offline migration is now more commonly used and is often referred to as regular migration, where the host must be shut down before migration, and the system state is copied to the destination host via storage or the network. The system state is then reconfigured on the target host on the cloud, and the system is powered back on. This migration method is simple and straightforward, but there must be a clear procedure for stopping the virtual machine, and it is acceptable for the user to be unable to provide business services for a period of time, so it is suitable for low business requirements.

2.1. Cloud Migration Scenarios

Companies can migrate their businesses processes to cloud migration in two ways: partial migration and overall migration.
a.
Partial migration
Partial migration means that users divide all data into two parts, which are migrated to the cloud platform and retained locally. The local server and cloud platform cooperate and share to achieve utility.
b.
Overall migration
Overall migration is when users move all their data and content to a single cloud platform at the same time in one step. The comparison of the two is shown in Table 1:

2.2. Cloud Migration tools and services

This section presents some popular cloud migration tools and techniques.
  • PlateSpin Migrate
PlateSpin migrate is a powerful workload portability migration tool developed by Novell, which provides secure and reliable migration capabilities between data centres. This tool is designed to meet the application requirements of users migrating their old server systems (including operating systems, application software and business data) to various server models of different manufacturers without putting the original physical server offline [10]. It is the most versatile and best performing migration tool of its kind. A powerful migration tool to assist users with the workflow Plate spin migrate can support physical to virtual, virtual to mirror, mirror to physical and more. Also, Plate spin migrate can easily migrate physical machines to any virtual machine environment. Further, modifications can even be synchronized to maintain the virtual copy up to date while the actual copy is still in production. It automates the process of transferring physical or virtual servers to enterprise cloud platforms across the network [11]. Figure 1 shows the automatic server workload migration over the network using PlateSpin migrate tool.
b.
AWS Migration Services
Amazon, the industry leader in public clouds, provides a number of extremely well-linked cloud migration services. This includes the AWS Migration Hub, the Snow series of offline data transfer devices, the AWS Database Migration Service, as well as the AWS Server Migration Service. If the business is an AWS customer, most services are free, but these tools only support the AWS cloud platform. Clients can utilise AWS Inc.'s services, which are collections of actual hardware, to transmit data to its data centre. Companies are putting equipment in their own data centre, send the equipment data to AWS, and then load more equipment [12].
Microsoft is providing a whole service called Azure Migrate, a database migration service, including its data box hardware enabling offline data transmission for clients moving workloads to Azure. Initially, it was launched as a VMware vSphere-specific migration tool but gradually transformed as "the migration tool" for every aspect of Azure to migrate any kind of workload to the Azure cloud. It supports no other cloud service providers, but like other public cloud providers, it offers most of the migration services at no cost. For Windows and other Microsoft software, these solutions are especially well suited [13]. Figure 2 shows the overview of Azure Migrate-Hub for datacentre migration.
c.
Google Migration Services /Velostrata
Google just purchased Velostrata, a start-up whose cloud migration skills have been much improved. The technology of Velostrata can ten-fold the rate of movement. Many of Google's migration services are free, just like those of other public cloud providers, but they exclusively support the Google Cloud Platform [13]. As shown in Figure3 a VPN or Cloud Interconnect link between the on-premises data centre and GCP, as well as a Virtual Private Cloud (VPC) in GCP, are also needed. Velostrata Management Server monitors the migration process and can be deployed in the source data centre or to the recipient end i.e. the google cloud platform. The cloud edge components of Velostrata are established in the VPC subnets.
Figure 3. Velostrata deployment overview [15].
Figure 3. Velostrata deployment overview [15].
Preprints 90277 g003

2.3. Cloud Migration test, implementation, and validation

With a clear migration solution and migration tool, you need to deploy the business environment and migration tool in the cloud platform environment for migration testing, implementation, and verification. Test the service migration server, test the service migration tool, Complete service data synchronization, consistency check, and data switchover. Acceptance. Evaluate the system after migration and evaluate whether the migration goal has been achieved.
  • Migration test
According to the migration scheme, test the scheme with appropriate testing environment, follow the correctness, consistency and availability in technology and process, verify the migration scheme, refine, and improve it, and form the final migration scheme. Simulate the real situation of customers as much as possible, test the feasibility of solutions and tools in various scenarios, output test reports, communicate with customers after review, communicate again about downtime and risk points in the migration process, especially in the backward compatibility verification and rollback test, what changes need to be tested, how to change gradually, and execute necessary scripts in the migration process. In this way, test cases and scenarios can cover the entire migration process, and ultimately work with users to refine and output migration test reports that need to be modified in the migration solution [16].
b.
Migration implementation and verification
Including service migration, data synchronization and consistency check; Select an idle period for traffic switchover within the available service cycle. Before the system traffic switch, ensure that the system data is updated in real time, and the difference time window of the data between the source system and the target system is within the acceptable range; Choose to suspend the business of the source system, switch the target network with differential data, test and verify the function and data consistency of the business system by the business personnel, optimize the results and monitor the process problems, and sign the industry acceptance report, so that the target system meets the requirements of system migration and deployment. In particular, when migrating the Linux system, it is necessary to consider the changes of network hardware devices, the kernel does not support some virtual devices, the window needs to be reconfigured, the changes of the network environment, the changes of the CPU extension instruction set, and many other factors will affect the implementation of migration and the reliability of the verification [17].

3. Cloud Computing Deployment and Service Models

3.1. Cloud Computing Service Models

The main service models of cloud computing are Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). As shown in Figure 4, IaaS is the foundation of all cloud services that provide computing, networking, storage, and database facilities through the Internet. All IaaS services are based on virtualization, and users can acquire virtual machines from the service providers instead of provisioning physical hardware. A virtual machine (VM) mimics the behavior of an actual machine by utilizing its own virtual resources such as operating system, storage, RAM, and CPU[18].
  • Software as a Service (SaaS)
SaaS offers cloud users comprehensive software, including email, social network services, online calendars, and pretty much any other programs that are hosted in the cloud. Customers using SaaS service model have no control over any infrastructure resources such as storage, CPU, or operating system [20].
b.
Platform as a Service (PaaS)
The platform resources offered by clouds can be used by application developers through PaaS, this includes different utilities and libraries. Customers using PaaS service model can fully control the deployed application without any control on other resources like operating system or storage.
c.
Infrastructure as a Service (IaaS)
The third and most basic cloud service model is IaaS, which gives cloud users access to virtual machine servers and accompanying infrastructure. Customers can use the infrastructure for any purpose, such as establishing their own platforms or creating software that runs on virtual machines. Unlike the other two models, IaaS offers the highest level of control over some resources such as operating system storage and applications. Following are some of the benefits of IaaS[21].
  • Cost Saving
A major benefit of using IaaS would be cost savings. With IaaS, the company would not need to set up servers in every office they have. Staff outside of the main office with the data centre can just access resources such as VMs via the private cloud [22]. Additionally, the company would not need to provide devices for each employee to use as they can perform desktop virtualization and employees can use these virtual desktops to do their work from any device with an internet connection.
b.
Scalability
Additionally, scalability is another benefit of IaaS. IaaS would allow the company to provide resources to their employees and other users based on their current needs. This means that they can scale up or down the resources that they allocate to various departments depending on their workloads at the time [22]. This additionally leads to better Return on investment (ROI) as it ensures most of the resources are being utilised instead of being wasted.
c.
Centralised management
Centralised management is a main characteristic of the IaaS service model. Since the company will be using a private IaaS solution, they only need to manage their single data centre only. This means that instead of performing maintenance and upgrading many different data centres across their different offices, they only need to maintain and upgrade one. This significantly reduces work related to datacentre management. Additionally, since employees will be accessing the company's resources via virtual machines from their personal devices, updates only need to be performed on the VMs instead of many different physical devices which also contributes to reduced management workload.
d.
Business Continuity
Finally, IaaS would contribute to business continuity. In the event that one of the company’s offices face a power outage, employees can still continue their work on their personal devices at home. This minimises downtime, leading to less of an impact on business operations [23]. If every office had their own servers, a power outage would result in disruptions in business operations.

3.2. Cloud Computing Deployment Models

In this context, "cloud" offers multiple deployment models involving private clouds, public clouds, community cloud or hybrid clouds as shown in Figure 5 [24].
  • Public Cloud
The cloud provider owns, manages, and maintains the infrastructure, which is located in the public cloud on its premises. The cloud provider could be a corporate, public entity, or a mix of these. The public cloud can be used by anyone to seek the resources they require.
b.
Private Cloud
Private cloud owns by a single entity. When using a public cloud, the user has no control over the compliance which can be a problem as businesses may need to comply with certain laws related to data privacy. Private clouds on the other hand are under full ownership of the user organisation and can be deployed with the necessary compliance regulations[25]. While cost may be a big drawback of the private cloud (and an advantage of public clouds), it is a necessary trade-off for stronger security and control. Considering this companies has seen a surge in business activity, they will likely be bigger targets for hackers to steal data from to sell for a high price. The private cloud will in turn help make the company more resilient to data breaches. Additionally, considering the company is already popular and is seeing a recent surge in business, they should be able to afford to implement a private cloud.
Following are some of the benefits of private cloud over other cloud deployment models.
i.
Maintenance & System Logs
Additionally, another benefit of using a private cloud solution would be the level of control you have over it. In a public cloud, an issue that may arise is that users may not have control over various aspects of the cloud such as audit logs and maintenance. Hence, by deploying a private cloud model businesses can have better control over their resources which allows them to perform maintenance and system upgrades whenever they deem appropriate and have full access to audit logs [26].
ii.
Geographical access
Geographical access is also another benefit of private clouds. Most cloud service providers who offer public cloud solutions have a set amount of availability zones around the world. While most major service providers like AWS and GCP have availability zones in most regions around the world. With a private cloud, the company can assure that their employees will always have stable connection and they can also tailor their compliance requirements to that which is required in the location they are setting up their offices[25].
iii.
Security & Privacy
Finally, a private cloud offers good security and privacy. In a private cloud, all the data is stored on the system of the user organisation. This would mean that the company will have greater control over the data and the access rights. This ensures that only those within the organisation can access the data, which leads to strong data privacy and as a result reduces the risk of data leaks and unauthorised individuals from accessing critical data [25]. In a public cloud, the data would have been stored on the servers of the cloud service provider, which would compromise data privacy.
c.
Community Cloud
This model is intended for a certain class, category, or demographic of people with high security needs. Only members of the party or culture have access to resources.
d.
Hybrid Cloud
A hybrid cloud combines two or more deployment models, but each remains an independent entity, linked by standard or proprietary technology that allows data and application portability. The hybrid approach enables a company to deploy less sensitive software and data to the public cloud, making use of the scalability and cost-effectiveness of the public cloud.

4. SDN-enabled cloud computing

Cloud service providers maintain several data centres spanning many geolocations with virtualized resource allocation to give dynamic service to their clients. Thousands of switches interconnect tens of thousands of servers in large data centres. Using virtualization technology, and as per available capacity each server handle numerous application requests from various users by allocating different virtual machines (VM). [27]. In a traditional network, multiple switches and routers connect these VMs to the Internet and VM traffic is efficiently transferred via the data centre network (DCN). The DCN connects tens of thousands of servers, making it complicated and challenging to operate and scale in classical networks, as each switch has its own control mechanism depending on neighbouring switch information. Hence, in a cloud data centre with a high server population and several VMs that dynamically change, the typical network method is not suitable. To address the drawbacks of traditional networks, cloud data centres started implementing software-defined networking (SDN) into their DCNs. SDN centrally controls the network which makes it agile and flexible[28]. The SDN controller efficiently adjusts network flow that fits the dynamic cloud service in context of automation, virtualization, and security. With centrally acquired information, the controller can make quicker choices and transmit it onto data plane switches smoothly and dynamically. For network security the controller can easily program control logic and transmit SDN control packets to switches and block the malicious traffic. Thus, networking behaviour is extremely configurable [29]. The major cloud service providers such as Google, and AWS deploy SDN in their datacentres for better network manageability and scalability[30].
Cloud computing plays a vital role in business growth in various sectors, including health, IoT, wireless sensor networks, AI, Sports, etc. [31,32,33,34,35,36]. The current era of application is completely shifting toward cloud-based solutions for better management and access [37,38,39,40,41,42,43,44,45], which extends from smart cities to smart home applications [46,47,48,49,50,51,52]. Small startup and companies can easily start their services with the help of Cloud computing solutions at a lower cost [53,54,55,56,57,58,59]. It is easy to manage and access the services and provide services 24/7 [60,61,62,63,64,65,66]. Initially, Cloud solutions were introduced mainly for storage purposes. However, now that it is expanding beyond that. However, migrating from on-premises to the cloud is still a huge challenge that still requires max attention.

5. Conclusion

Cloud computing (CC) is a popular web service-providing technology that uses a pay-per-use approach. The cloud user and customers can lease the facilities like storage, deployment, web applications, and services without any hassle and spending on physical infrastructures. However, choosing suitable service provider along with service and deployment model is an important step of cloud migration. Cloud computing is heavily based on virtualization technology. Hence, cloud computing along with SDN enabled environment, can be extremely beneficial in the virtualization of modern networks because of SDN controller’s centralized control over network.

References

  1. S. Ali et al., “Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based,” IEEE Access, vol. 8, pp. 148007–148020, 2020. [CrossRef]
  2. “What is On-Demand Self Service? - Definition from Techopedia.”. https://www.techopedia.com/definition/27915/on-demand-self-service (accessed on 24 July 2023).
  3. H. Biswas, V. Sarkar, P. Sen, and D. Sarddar, “Smart city development: Theft handling of public vehicles using image analysis and cloud network,” Recent Trends Comput. Intell. Enabled Res. Theor. Found. Appl., pp. 155–169, Jan. 2021. [CrossRef]
  4. “What Is Broad Network Access? Definition, Key Components, and Best Practices - Spiceworks.”. https://www.spiceworks.com/tech/cloud/articles/what-is-broad-network-access/ (accessed on 24 July 2023).
  5. “Why Use Resource Pools?”. https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.resmgmt.doc/GUID-AA95D1D1-55C0-419D-9E1A-C523C138CC65.html (accessed on 24 July 2023).
  6. Q. W. Ahmed et al., “AI-Based Resource Allocation Techniques in Wireless Sensor Internet of Things Networks in Energy Efficiency with Data Optimization,” Electron., vol. 11, no. 13, 2022. [CrossRef]
  7. Z. A. Almusaylim and N. Jhanjhi, “Comprehensive Review: Privacy Protection of User in Location-Aware Services of Mobile Cloud Computing,” Wirel. Pers. Commun., vol. 111, no. 1, pp. 541–564, 2020. [CrossRef]
  8. “Rapid Elasticity in Cloud Computing: On-Demand Scaling for Business I am running a few minutes late; my previous meeting is running over. Synopsys Cloud.”. https://www.synopsys.com/cloud/insights/rapid-elasticity-in-cloud-computing-on-demand-scaling-for-business.html (accessed on 24 July 2023).
  9. “What is Measured Service in Cloud Computing? - Definition from Techopedia.”. https://www.techopedia.com/definition/14469/measured-service-cloud-computing (accessed on 24 July 2023).
  10. “PlateSpin Migrate I am running a few minutes late; my previous meeting is running over. Server Migration Use Cases | Micro Focus.”. https://www.microfocus.com/en-us/use-case/platespin-migrate (accessed on 24 July 2023).
  11. “PlateSpin Migrate | OpenText.”. https://www.microfocus.com/en-us/products/platespin-migrate/overview (accessed on 24 July 2023).
  12. R. Pothecary, Running Microsoft Workloads on AWS. 2021. [CrossRef]
  13. “What is Cloud Migration? Strategy, Process, and Tools.”. https://bluexp.netapp.com/blog/cloud-migration-strategy-challenges-and-steps (accessed on 24 July 2023).
  14. “An introduction to Azure Migrate.”. https://www.bdrsuite.com/blog/azure-migrate-introduction/ (accessed on 24 July 2023).
  15. “Web Hosting | Google Cloud.” . https://cloud.google.com/solutions/web-hosting/?utm_source=bing&utm_medium=cpc&utm_campaign=japac-MY-all-en-dr-bkws-all-pkws-trial-b-dr-1009882&utm_content=text-ad-none-none-DEV_c-CRE_-ADGP_Hybrid %7C BKWS - PHR %7C Txt ~ Application Modernization ~ Web Hosting_hosting-web hosting-KWID_43700071941269965-kwd-74904499601926%3Aloc-112&userloc_158630-network_o&utm_term=KW_google cloud web hosting&gclid=d7201923ab5814fd729b7d9ded3d791c&gclsrc=3p.ds (accessed on 24 July 2023).
  16. P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud Migration Research: A Systematic Review,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 142–157, 2013. [CrossRef]
  17. Good, T.; Between, P.; Linthicum, D.S. Cloud-Native Applications and Cloud Migration. 2000, 12–14. [CrossRef]
  18. Alyas, T.; Mugees, M.; Security, A.; Machine, V. Cloud Computing To cite this version : Security Strategy for Virtual Machine Allocation in Cloud. 2022.
  19. “7 Different Types of Cloud Computing Structures | UniPrint.net.”. https://www.uniprint.net/en/7-types-cloud-computing-structures/ (accessed on 25 July 2023).
  20. L. Chen, M. Xian, J. Liu, and H. Wang, “Research on Virtualization Security in Cloud Computing,” IOP Conf. Ser. Mater. Sci. Eng., vol. 806, no. 1, 2020. [CrossRef]
  21. D. A. Shafiq, N. Z. Jhanjhi, A. Abdullah, and M. A. Alzain, “A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications,” IEEE Access, vol. 9, pp. 41731–41744, 2021. [CrossRef]
  22. “What is IaaS? Infrastructure as a Service | Microsoft Azure.”. https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-iaas/ (accessed on 26 July 2023).
  23. “Benefits of IaaS | Infrastructure as a Service | Dataprise.” . https://www.dataprise.com/resources/blog/iaas-benefits/ (accessed on 24 July 2023).
  24. Y. S. Abdulsalam and M. Hedabou, “Security and privacy in cloud computing: Technical review,” Futur. Internet, vol. 14, no. 1, 2022. [CrossRef]
  25. “7 benefits of choosing a private cloud solution - Syneto.”. https://preview.syneto.eu/benefits-of-choosing-private-cloud/ (accessed on 24 July 2023).
  26. “Private Cloud - javatpoint.”. https://www.javatpoint.com/private-cloud (accessed on 24 July 2023).
  27. Son, J.; Buyya, R. A taxonomy of software-defined networking (SDN)-enabled cloud computing. ACM Comput. Surv. 2018, 51. [Google Scholar] [CrossRef]
  28. Muzafar, S.; Jhanjhi, N. DDoS Attacks on Software Defined Network: Challenges and Issues,” 2022 Int. Conf. Bus. Anal. Technol. Secur. ICBATS 2022, vol. 2022-Janua, 2022. [CrossRef]
  29. Muzafar, S.; Jhanjhi, N.Z.; Khan, N.A.; Ashfaq, F. “DDoS Attack Detection Approaches in on Software Defined Network,” 14th Int. Conf. Math. Actuar. Sci. Comput. Sci. Stat. MACS 2022, 2022. [Google Scholar] [CrossRef]
  30. Vahdat, A.; Clark, D.; Rexford, J. “A purpose-built Global network: Google’s move to SDN,” Commun. ACM 2016, 59, 46–54. [Google Scholar] [CrossRef]
  31. Priyadarshini, I.; Chatterjee, J.M.; Sujatha, R.; Jhanjhi, N.; Karime, A.; Masud, M. Exploring internet meme activity during COVID-19 lockdown using Artificial Intelligence techniques. Applied Artificial Intelligence 2022, 36, 2014218. [Google Scholar] [CrossRef]
  32. Muzammal, S.M.; Murugesan, R.K.; Jhanjhi, N.Z.; Hossain, M.S.; Yassine, A. Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. Sensors 2022, 22, 6215. [Google Scholar] [CrossRef]
  33. Basavaraju, P.H.; Lokesh, G.H.; Mohan, G.; Jhanjhi, N.Z.; Flammini, F. Statistical channel model and systematic random linear network coding based qos oriented and energy efficient uwsn routing protocol. Electronics 2022, 11, 2590. [Google Scholar] [CrossRef]
  34. Muthukkumar, R.; Garg, L.; Maharajan, K.; Jayalakshmi, M.; Jhanjhi, N.; Parthiban, S.; Saritha, G. A genetic algorithm-based energy-aware multi-hop clustering scheme for heterogeneous wireless sensor networks. PeerJ Computer Science 2022, 8, e1029. [Google Scholar] [CrossRef]
  35. Sharma, U.; Nand, P.; Chatterjee, J.M.; Jain, V.; Jhanjhi, N.Z.; Sujatha, R. (Eds.) Cyber-Physical Systems: Foundations and Techniques. John Wiley & Sons: 2022.
  36. Anandan, R.; Gopalakrishnan, S.; Pal, S.; Zaman, N. (Eds.) Industrial Internet of Things (IIoT): Intelligent Analytics for Predictive Maintenance. John Wiley & Sons: 2022.
  37. Zaman, N.; Gaur, L.; Humayun, M. (Eds.) . Approaches and Applications of Deep Learning in Virtual Medical Care. IGI Global: 2022. [CrossRef]
  38. Gandam, A.; Sidhu, J.S.; Verma, S.; Jhanjhi, N.Z.; Nayyar, A.; Abouhawwash, M.; Nam, Y. An efficient post-processing adaptive filtering technique to rectifying the flickering effects. PLoS One 2021, 16, e0250959. [Google Scholar] [CrossRef] [PubMed]
  39. Talwani, S.; Singla, J.; Mathur, G.; Malik, N.; Jhanjhi, N.Z.; Masud, M.; Aljahdali, S. Machine-Learning-Based Approach for Virtual Machine Allocation and Migration. Electronics 2022, 11, 3249. [Google Scholar] [CrossRef]
  40. Muzammal, S.M.; Murugesan, R.K.; Jhanjhi, N.Z. (2021, March). Introducing mobility metrics in trust-based security of routing protocol for internet of things. In 2021 National Computing Colleges Conference (NCCC) (pp. 1-5). IEEE.
  41. Hafeez, Y.; Ali, S.; Jhanjhi, N.; Humayun, M.; Nayyar, A.; Masud, M. Role of Fuzzy Approach towards Fault Detection for Distributed Components. Computers, Materials & Continua 2021, 67.
  42. Jhanjhi, N. Z., Almusalli, F. A., Brohi, S. N., Abdullah, A. (2018, October). Middleware power saving scheme for mobile applications. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA) (pp. 1-6). IEEE.
  43. Kumar, T.; Pandey, B.; Mussavi SH, A.; Zaman, N. CTHS based energy efficient thermal aware image ALU design on FPGA. Wireless Personal Communications 2015, 85, 671–696. [Google Scholar] [CrossRef]
  44. Adeyemo, V.E.; Abdullah, A.; JhanJhi, N.Z.; Supramaniam, M.; Balogun, A.O. Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. International Journal of Advanced Computer Science and Applications 2019, 10. [Google Scholar]
  45. Khalil, M.I.; Jhanjhi, N.Z.; Humayun, M.; Sivanesan, S.; Masud, M.; Hossain, M.S. Hybrid smart grid with sustainable energy efficient resources for smart cities. sustainable energy technologies and assessments 2021, 46, 101211. [Google Scholar] [CrossRef]
  46. Sennan, S.; Somula, R.; Luhach, A.K.; Deverajan, G.G.; Alnumay, W.; Jhanjhi, N.Z.; Sharma, P. Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm. Transactions on Emerging Telecommunications Technologies 2021, 32, e4171. [Google Scholar] [CrossRef]
  47. Kok, S.H.; Abdullah, A.; Jhanjhi, N.Z. Early detection of crypto-ransomware using pre-encryption detection algorithm. Journal of King Saud University-Computer and Information Sciences 2022, 34, 1984–1999. [Google Scholar] [CrossRef]
  48. Verma, S.; Kaur, S.; Rawat, D.B.; Xi, C.; Alex, L.T.; Jhanjhi, N.Z. Intelligent framework using IoT-based WSNs for wildfire detection. IEEE Access 2021, 9, 48185–48196. [Google Scholar] [CrossRef]
  49. Hussain, K.; Hussain, S.J.; Jhanjhi, N.Z.; Humayun, M. (2019, April). SYN flood attack detection based on bayes estimator (SFADBE) for MANET. In 2019 International Conference on Computer and Information Sciences (ICCIS) (pp. 1-4). IEEE.
  50. Gaur, L.; Afaq, A.; Solanki, A.; Singh, G.; Sharma, S.; Jhanjhi, N.Z.; Hoang, M.; Le, D.N. Capitalizing on big data and revolutionary 5G technology: Extracting and visualizing ratings and reviews of global chain hotels. Computers and Electrical Engineering 2021, 95, 107374. [Google Scholar] [CrossRef]
  51. Gaur, L.; Singh, G.; Solanki, A.; Jhanjhi, N.Z.; Bhatia, U.; Sharma SKim, W. Disposition of youth in predicting sustainable development goals using the neuro-fuzzy and random forest algorithms. Human-Centric Computing and Information Sciences, 2021; 11. [Google Scholar]
  52. Almusaylim, A.Z.; Jhanjhi, N.Z.; Alhumam, A. Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors 2020, 20, 5997. [Google Scholar] [CrossRef] [PubMed]
  53. Alsaade, F.; Zaman, N.; Hassan, M. F.; Abdullah, A. An Improved Software Development Process for Small and Medium Software Development Enterprises Based on Client’s Perspective. Trends in Applied Sciences Research 2014, 9, 254–261. [Google Scholar] [CrossRef]
  54. Hamid, B.; Jhanjhi, N.Z.; Humayun, M. (2020) Digital Governance for Developing Countries Opportunities, Issues, and Challenges in Pakistan. In Employing Recent Technologies for Improved Digital Governance (pp. 36-58). IGI Global.
  55. Sangkaran, T.; Abdullah, A.; JhanJhi, N.Z. Criminal network community detection using graphical analytic methods: A survey. EAI Endorsed Transactions on Energy Web 2020, 7, e5–e5. [Google Scholar] [CrossRef]
  56. Bashir, I.R.A.M.; Hamid, B.U.S.H.R.A.; Jhanjhi, N.Z.; Humayun, M.A.M.O.O.N.A. Systematic literature review and empirical study for success factors: client and vendor perspective. J Eng Sci Technol 2020, 15, 2781–2808. [Google Scholar]
  57. Alayda, S.; Almowaysher, N.A.; Humayun, M.; Jhanjhi, N. A novel hybrid approach for access control in cloud computing. Int. J. Eng. Res. Technol 2020, 13, 3404–3414. [Google Scholar] [CrossRef]
  58. Srivastava, A., Verma, S., Jhanjhi, N. Z., Talib, M. N., Malhotra, A. (2020, December). Analysis of Quality of Service in VANET. In IOP Conference Series: Materials Science and Engineering (Vol. 993, No. 1, p. 012061). IOP Publishing.
  59. Lee, S.; Abdullah, A.; Jhanjhi, N.Z.; Kok, S.H. Honeypot Coupled Machine Learning Model for Botnet Detection and Classification in IoT Smart Factory–An Investigation. MATEC Web of Conferences; EDP Sciences, 2021; Volume 335, p. 04003. [Google Scholar]
  60. Kaur, M.; Singh, A.; Verma, S.; Kavita Jhanjhi, N.Z.; Talib, M.N. FANET: Efficient routing in flying ad hoc networks (FANETs) using firefly algorithm. In Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS 2021; Springer: Singapore, 2021; pp. 483–490. [Google Scholar]
  61. Nawaz, A. Feature engineering based on hybrid features for malware detection over Android framework. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 2021, 12, 2856–2864. [Google Scholar]
  62. Ali AB, A.; Ponnusamy, V.; Sangodiah, A.; Alroobaea, R.; Jhanjhi, N.Z.; Ghosh, U.; Masud, M. Smartphone security using swipe behavior-based authentication. Intelligent Automation & Soft Computing 2021, 29, 571–585. [Google Scholar]
  63. Shanmuganathan, V.; Yesudhas, H.R.; Madasamy, K.; Alaboudi, A.A.; Luhach, A.K.; Jhanjhi, N.Z. AI based forecasting of influenza patterns from twitter information using random forest algorithm. Hum. Cent. Comput. Inf. Sci 2021, 11, 33. [Google Scholar]
  64. Teoh, A.A.; Ghani NB, A.; Ahmad, M.; Jhanjhi, N.; Alzain, M.A.; Masud, M. Organizational Data Breach: Building Conscious Care Behavior in Incident. Organizational data breach: Building conscious care behavior in incident response. Computer Systems Science and Engineering 2022, 40, 505–515. [Google Scholar] [CrossRef]
  65. Hussain, I.; Tahir, S.; Humayun, M.; Almufareh, M.F.; Jhanjhi, N.Z.; Qamar, F. Health monitoring system using internet of things (iot) sensing for elderly people. 2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Novermber 2022; IEEE; pp. 1–5. [Google Scholar]
  66. Jena, K.K.; Bhoi, S.K.; Malik, T.K.; Sahoo, K.S.; Jhanjhi, N.Z.; Bhatia, S.; Amsaad, F. E-Learning Course Recommender System Using Collaborative Filtering Models. Electronics 2022, 12, 157. [Google Scholar] [CrossRef]
Figure 1. PlateSpin Migrate.
Figure 1. PlateSpin Migrate.
Preprints 90277 g001
Figure 2. Azure Migrate-Hub for Datacentre Migration [14].
Figure 2. Azure Migrate-Hub for Datacentre Migration [14].
Preprints 90277 g002
Figure 4. Cloud Service Model[19].
Figure 4. Cloud Service Model[19].
Preprints 90277 g004
Figure 5. Cloud Deployment Models[19].
Figure 5. Cloud Deployment Models[19].
Preprints 90277 g005
Table 1. Comparison of partial migration and overall migration in cloud computing.
Table 1. Comparison of partial migration and overall migration in cloud computing.
Parameters Partial migration Overall migration
Protection of original equipment Use existing equipment effectively Unable to use the original equipment, resulting in the waste of the original equipment investment
Cost of construction The direct construction cost of this project is relatively high, but the overall cost is relatively low considering the expense of resource occupation of cloud platform. The direct construction cost of this project is low, but the overall cost is high considering the expense of cloud platform
Risks to the business Some devices depend on the stability and maturity of the cloud. Therefore, the impact on services and risks are relatively small The entire system depends heavily on the stability and maturity of the cloud. When a fault occurs, the system must be rolled back in time to ensure services.
System Architecture The original system architecture needs to be changed into the functions of central node and sub-node, which may affect the performance and stability of the system. Only a few modifications to the system architecture are needed to migrate to the cloud platform The complexity of project implementation requires cutting over some user data and system architecture adjustment. The project's complexity is high, and the implementation duration is lengthy.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated