You are on page 1of 5

VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)

ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)

Cloud Computing -AWS


Manish Pandey1, Rishabh Rai2
1
(MCA/Viva Institute of technology / University of Mumbai, India)
2
(MCA/Viva Institute of technology / University of Mumbai, India)

Abstract : Amazon Web Services offers an overall set of global cloud-based products including compute,
storage, databases, analytics, networking, mobile, developer tools, management tools, IoT, security, and business
applications : on-demand, open in seconds, with pay-as-you-go pricing. From data warehousing to deployment
implements, guides to scope delivery, over 200 AWS services are open.[8] New assistance can be provisioned
fast, without the upfront fixed cost. This allows businesses, start-ups, small and medium-sized businesses, and
customers in the public sector to access the formation blocks they need to respond quickly to changing business
needs[7].
Keywords - cloud computing, databases, IT infrastructure, management tools, web services

I. INTRODUCTION

In 2006, Amazon Web Services (AWS) started delivering IT infrastructure benefits to enterprises such
as web-based assistance now known as cloud computing. One of the most important benefits of cloud computing
is the opportunity to change the cost of large infrastructure at low variable costs commensurate with your
business[4]. With the cloud, companies no longer need to design and buy servers and other IT infrastructure weeks
or months in advance. Instead, they can quickly scan hundreds or thousands of servers in minutes and deliver
results quickly. Today, AWS delivers a positively trustworthy, adaptable, low-cost cloud forum that certifies
thousands of companies in 190 countries around the world. Cloud computing implies an invention via which data
and undertakings can be put out and brought to without the need for knowledge banks at the client terminal. NIST
describes broadcasted computing as "a standard for permitting helpful, on-request network admittance to a
transferred pool of configurable registering assets that can be fast provided and returned with minor professional
co-op contact"[1].
NIST can be a very important innovation for people with restricted assets and associations with bigger
computational requirements. It is a cycle of "financial and rapid comparisons with human waste disposal and
information acquisition strategies" and related management.
AWS (Amazon Web Services) is a cloud computing stage and cloud storage service that allows
companies, governments, and individuals to store their data and offers API (Application Programming Interface).
The API is part of Amazon, with its own visible global data centers. API is preferable by most customers due to
its efficiency to have advantages. As instructed, "Amazon asserts about 50% of the public-cloud framework
market worth over $32 billion”. Amazon Web Services serves thousands of customers in more than 190 countries.
Another major characteristic that makes AWS the prior choice is that its users are very cheap in comparison to
other providers. Given the broader market presence and corporate prominence, exploring the topic area in the
AWS context can facilitate the development of readily available acquisitions.
Cloud computing is a required delivery of computing power, website, storage, applications, and other IT
services through a cloud-based online services platform with billing rates as you go. Whether you use photo-
sharing applications with millions of mobile users or support important business activities, the cloud services
platform provides instant access to flexible and affordable IT services[2]. With cloud computing, you do not need
to invest huge amounts of money in advance and spend a lot of time on complex hardware management. Instead,
you can provide the right type and size of computer resources you need to enable your new bright idea or use your
IT department. You can access many of the services you need, almost immediately, and pay for only what you
use. Cloud computing provides an easy way to access servers, storage, websites, and a comprehensive set of online
application services[3].

F-220
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)

II. AMAZON WEB SERVICES CLOUD

AWS contains many cloud resources that you can use in combinations that fit your business or
organizational needs. This section presents the main resources of AWS in stages. To access resources, you can
use the AWS Management Console, AWS CLI, or Software Development Kits (SDKs)[5].

2.1 Global Infrastructure


AWS serves more than one million active customers in more than 240 countries and regions. We are
gradually expanding global infrastructure to help our customers achieve lower latency and higher performance,
and to ensure that their data stays only in the AWS Region we specify. As our customers grow their businesses,
AWS will continue to provide the infrastructure that meets their global needs. AWS Cloud infrastructure is located
near AWS regions and Available Areas. The AWS region is the most visible region in the world where it has
many places to be found. Available Locations include one or more data centers, each with idle power, network,
and communication, stored in separate locations. These Available Domains give you the ability to use production
applications and websites that are more accessible, more tolerant, and more efficient than a single data center[9].
AWS Cloud operates in more than 80 Available Areas among the 25 regions of the world, with
announced plans for additional access points and regions. For more information on AWS Cloud Acquisitions and
Districts, see AWS International Infrastructure. Each Amazon region is designed to be completely separate from
the rest of the Amazon region. This achieves greater error tolerance and stability. Each Availability Zone is
isolated, but Available Zones in the Region are connected by low-delay links. AWS provides you with flexibility
in setting and storing data between multiple geographical regions and in all of the many available locations within
each AWS Region. Per Availability Zone is created as an autonomous loss area. This means that the Available
Areas are physically subdivided within the metropolitan area and are located in areas with a low risk of flooding
(certain sections of the flood area vary according to the AWS Region). In addition to providing uninterruptible
power supply (UPS) and local backup production facilities, data centers located in the various Available Areas
are designed to be provided with private channels to minimize event risk on more than one Available Power Grid.
Available Locations are all ineffectively connected to multiple tier-1 transportation providers.
2.2 Security and Compliance
Cloud security at AWS is very important. As an AWS customer, you will benefit from a data center and network
structure designed to meet the needs of organizations that are most sensitive to security. Cloud protection is like
security in your local data centers — except for the cost of maintaining buildings and hardware. In the cloud,
you do not need to manage portable servers or storage devices. Instead, you use software-based security tools to
monitor and protect the flow of information to and from your cloud services[6]. The advantage of AWS Cloud is
that it allows you to measure and establish while maintaining a secure environment and paying only for the
services you use. This means that you can have the protection you need at a lower cost than in the local area.
As an AWS customer, you inherit all of AWS's advanced policy processes, structures, and operating systems
designed to meet the needs of our most sensitive customers. Get the flexibility and simplicity you need in the
security controls. AWS Cloud enables a shared responsibility model. While AWS manages cloud security, you
are responsible for cloud security. This means that you keep control of the security you choose to use to protect
your content, platform, applications, systems, and networks differently than you would in a data center on the
site. AWS supplies you with recommendations and expertise via online help, staff, and associates. AWS gives
you advice on current issues, and you have the opportunity to work with AWS when you encounter security
issues. You get access to hundreds of tools and features to help you meet your security goals. AWS provides
security-related tools and features for network-wide security, configuration management, access control, and
data encryption. Finally, AWS sites are constantly being researched, with certificates from accredited
organizations in all areas and specific locations. In the AWS environment, you can use default inventory tools as
well as privileged access reporting.

F-221
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)

2.3 Compatibility
AWS Cloud Compliance allows you to understand the strict controls available at AWS to maintain data security
and protection in the cloud. As the systems are built on AWS Cloud infrastructure, compliance obligations will
be allocated. By combining governance-focused features, access to effective research, and compliance or research
standards, AWS Compliance providers build on standard systems. This helps customers to establish and operate
AWS security controls.
The IT infrastructure provided by AWS to its customers is designed and managed by state-of-the-art security
procedures and a variety of IT security standards. The following is a list of AWS compliance assurance programs:
● SOC 1 / ISAE 3402, SOC 2, SOC 3
● FISMA, DIACAP, and FedRAMP
● PCI DSS Level 1
● ISO 9001, ISO 27001, ISO 27017, ISO 27018
AWS provides customers with a wide range of information about its IT regulatory environment in white papers,
reports, certificates, accreditation, and other external credentials. More information is available at the Risk and
Compliance whitepaper and AWS Security Center.

2.4 AWS Security Building Blocks


Amazon Web Services (AWS) provides many security services to help its customers protect their cloud-
based data assets from loss, damage or hijacking. These services are the building blocks of any data protection
strategy, such as role-based access control, user verification, event monitoring, traffic, logs and alerts, and so on.
As application structures become more complex and large amounts of data continue to rise sharply,
security blocks are often insufficient to obtain possible information on system performance and security status.
The speed and variability of alerts and data transmission from monitoring and logging services can make it
difficult for IT teams to understand the causes of failure or risk in real-time. This makes it difficult to fix them
quickly — or even to free them — from them.

Fig.1. AWS Security Building Blocks[12]

III. METHODOLOGY

The work presented in this paper addresses an important problem to cloud management solutions that of
providing resources for cloud applications, during the process. The focus is on giving cloud developers the ability

F-222
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)

to express their preference towards resources, resource attributes and define relations between them. These
relations are being defined through the use of policies that dynamic provisioning of virtualized multi-tier
applications raises new challenges not addressed by prior work on provisioning techniques for cloud
environments. We proposed a novel dynamic provisioning technique, which was a hybrid model for a virtualized
multi-tier application in the cloud data center. A constrained non-linear optimization model is employed to
minimize the total number of VMs for the requirement of the customer. Hence the flexibility and efficiency for
resource provisioning were improved in the cloud environment[13].
We considered and determined the implementation of three-tier virtualized applications via simulation
experimentations. Results have demonstrated that beneath fine-grained help provisioning, computing resources
are optimized utilization. In addition, our strategy also suggests that preparing to provide all performance may be
further enhanced while maintaining medium-term response time. Our work can be improved in some ways. First,
we have also integrated the load forecasting system to fit our workload characteristics. Second, we will focus on
expanding the analytics model of the app to fit different cloud environments and servers generated by different
manufacturers.
Third, we accept Service Level Agreement (SLA)-based consultations for key applications to determine
costs and penalties for the level of performance achieved. If the total demand cannot be fulfilled, some virtualized
applications will be impacted by their improved performance time, expanded remaining time, and or raised denial
rate.
IV. TABLE 1: BENEFITS OF AWS SECURITY

Sr.No. Benefits Description

AWS infrastructure puts in place strong protections to help protect your


1 Keep Your Data Safe:
privacy. All data is stored on the most secure AWS data centers.

AWS manages a number of compliance programs for its infrastructure.


2 Meet Compliance Needs
This means that parts of your compliance have been completed.

Reduce costs by using AWS data centers. Maintain a high level of


3 Save Money
security without having to manage your environment.

Security scales for your use of AWS Cloud. No matter the size of your
4 Measure Fast business, AWS infrastructure is built to keep your data safe[10].

V. CONCLUSION

AWS provides building blocks that you can quickly assemble to support almost any project. With AWS, you will
get a complete set of highly accessible services designed to work together to build such complex applications.
You have access to long-term storage, less expensive computers, a more efficient website, management tools, and
much more[11].
All of this is available free of charge, and you only pay for what you use. These services help organizations move
faster, lower IT costs, and scale. AWS is trusted by large businesses and hot springs to enable a wide range of
functions, including web and mobile applications, game development, data processing, asset storage, storage,
archiving, and much more.
ACKNOWLEDGEMENT

We are pleased to present the research paper "Cloud Computing- AWS" as part of the 'Master of Computer Application curriculum. We
express our deepest gratitude to our research paper guide for the patient guidance, enthusiastic encouragement, and useful criticism of this
research work.

F-223
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 5 (2022)
ISSN(Online): 2581-7280
VIVA Institute of Technology
10th National Conference on Role of Engineers in Nation Building – 2022 (NCRENB-2022)

REFERENCES
[1] Awa, H.O., Ojiabo, O.U. and Orokor, L.E., 2017. Integrated technology-organization-environment (TOE) taxonomies for technology
adoption. Journal of Enterprise Information Management.
[2] Bayrak, T., 2013. A decision framework for SME Information Technology (IT) managers: Factors for evaluating whether to outsource
internal applications to Application Service Providers. Technology in Society, 35(1), pp.14-21.
[3] Dutta, P. and Dutta, P., 2019. Comparative Study of Cloud Services Offered by Amazon, Microsoft & Google. International Journal of
Trend in Scientific Research and Development (ijtsrd), 3, pp.981-985.
[4] https://docs.aws.amazon.com/whitepapers/latest/aws-overview/introduction.html
[5] https://docs.aws.amazon.com/whitepapers/latest/aws-overview/aws-overview.pdf#amazon-web-services-cloud-platform
[6] https://mediatemple.net/blog/cloud-hosting/aws-security-services/
[7] https://ieeexplore.ieee.org/abstract/document/6566769
[8] T. Mather, S.Kumaraswamy, Cloud Security and Privacy: An enterprise perspective on Risks and Compliance.
[9] https://www.javatpoint.com/aws-global-infrastructure
[10] https://docs.aws.amazon.com/whitepapers/latest/aws-overview/security-and-compliance.html
[11] https://wa.aws.amazon.com/wellarchitected/2020-07-02T19-33-23/wat.conclusion.wa-conclusion.en.html
[12] https://mediatemple.net/blog/wp-content/uploads/2019/09/AWS-Security-Building-Blocks.png
[13] https://docs.aws.amazon.com/prescriptive-guidance/latest/strategy-application-portfolio-assessment-migration/methodology-
approach.html

F-224
www.viva-technology.org/New/IJRI

You might also like