Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Written Assignment 1 Write a research paper based on the following scenario. As a cloud architect and engineer, design a secure cloud computing architecture that
Written Assignment
Write a research paper based on the following scenario.
As a cloud architect and engineer, design a secure cloud computing architecture that will support a big data lake platform that collects data through APIs millions of events per minute scripted database queries thousands of records per second and file transfers hundreds of gigabyte files per minute; processes the collected data in collective zones; and makes the data available to business intelligence users, data scientists, and site reliability engineers within a minute after it reaches the platform.
The cloud environment cannot be maintained by vendors so the purchasing of proprietary services like AWS and Google Cloud platform is not an option. You need to consider data access based on the previously mentioned roles, the tools that the users will use to access the data, the platforms ability to send data to other systems, and cloud systems. What will your cloud design look like? What tools will you use? How will you provision users to access data on your platform? How will you address the security issues of the cloud to ensure that it is not vulnerable to attacks by hackers.
Your paper should be to doublespaced pages to words and should use a point font. Include at least one diagram and six academic andor engineering sources, three of which should be published within the last three years.
Guidelines:
You provide a comprehensive introduction that effectively introduces the purpose and goal of your paper.
You provide a comprehensive and effective description of what your cloud design will look like.
You accurately and thoroughly explain what tools you will use.
You clearly and effectively explain how you will enable users to access data on your platform.
You clearly address the security issues of the cloud to ensure that it is not vulnerable to attacks by hackers.
You effectively fulfill the length requirement for the assignment, thoroughly address all required topics, and fully develop and explore concepts.
You gather and effectively present information from highly reliable sources; you exceed stated requirements in terms of references or meet requirements but treat the references with exceptional skill.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started