Wednesday, December 11, 2019

Analysis of systems My Health Record Samples †MyAssignmenthelp.com

Question: Discuss about the Analysis of systems My Health Record. Answer: Introduction: The Commonwealth Government of Australia, has taken the initiative of My health Record. It delivers common people with an integrated platform via Internet. It is useful to view, modify, handle and record the data about health problems. The cloud-based is the term referring to resources, applications, available on the users demand by Internet from the cloud computing providers servers. A project on My Health Record, has been estimated to be created regarding moving their data towards the cloud. In this report the different non-functional needs and benefits review are analyzed. Moreover, the drawbacks of cloud solutions with the SDLC approach are also considered here. The non-functional needs: The non-functional requirements have been the qualities required to be acquired by any system. Here the constraint under which the system has been operating has been also considered. Using the FURPS+ acronym as reference, the non-functional needs are also known as ilities. The reason behind this that most of requirements have been ending with the term ility, such as availability, maintainability, reliability and many more (Botta et al., 2016). The move into the cloud computing has different benefits. It includes the reduction of the operational expenses, capital costs. It helps in raising the support for the distant employees and the mobiles. It also helps in flexibility of the infrastructure. As this cloud services are properly imposed, they will be able to alter the corporate view of the IT of the organization. This would make My Health Record, a core of expense to competitive benefits. This would likewise create positive impact on their top-line revenue. The project undertaken must ensure that the cloud service provider has been giving the services relevant for My Health record, to run their business operations. This is critical to efficiently transfer every services of IT to the cloud (Buyya, Vecchiola Selvi, 2013). To guarantee the appropriate options, various attributes under the requirements that are non-functional are needed to go through during the evaluation of the service provider. Security: One of the fundamental drawbacks in moving into external cloud is the worthless security. Since the cloud service provider has been devoid of the requirements and appropriate security controls, the security becomes compromised. (Wei et al., 2014) As a result of this cloud service providers are to seek to acquire multi-factored authentication built in the companys service with complete encryption in-transit and at-rest for content. Here the centralized security policies to manage the distant or local servers are important. Performance: It has been dealing with the process to suit the cloud architecture well to support the workloads that have been deployed on the rise of workload (Tebaa Hajji, 2014). Reliability: The business-basic administrations are extremely muddled. The business at commonly could not bear to have their administrations of IT decreasing because of the outrage affecting the business viably. The missed calls, online messages, unshared records and deferred quotes could influence top-line revue with the main issue costs. The unwavering quality has been worried about diminishing the likelihood of service outrage (Tebaa Hajji, 2014). The organization ought to look for those service providers who have minimal history of cloud blackouts. Usability: This has been diverse to rely on the recognizable proof of the customers. The customers may be the modelers or engineers, business rulers or the IT professionals. For each situation the organization needs to consider the simple use of the product. They should likewise consider how good the interfaces are outlined. The IT is no longer mystery in the organization. Or maybe, the connecting with frameworks is out there for the outside world (Tebaa Hajji, 2014). The viable planning of the framework has turned out to be more important than the before. Regarding the software interfaces, the reason to link the system and Google Big Table is needed to be established and then retrieve the data. The connection between the system and mobile gadgets deliver the mobile access into the system. Besides, the system is to be integrated with social media such as Facebook and Twitter. There have been two types of user interfaces of the system. First one is the System Administrator interface. Here the administrator gets access to the complete system. Secondly there is the Organization Administrator Interface. Here the administrators could edit and access the complete information of the company they have been controlling (Chen et al., 2015). The members in the member interface have been capable to view and upgrade the personal information. It must also include the profiles and the public pages that have not been belonging to the organization. The project is meant to be worked over Google App Engine. Hence there has been absence of specific interf ace of hardware. Those requirements which have been non-functional should be considered regarding the qualities that My Health Record would need from the information technology system along with those constraints they have been performing on. The My Health Record, would not be able to possess the complete control to do whatever they have been requiring as they move to off-premise cloud (Gai et al., 2016). This cloud is operated by the vendors. However, they are meant to be aligned to the servicing platforms delivered by them. Reviewing the solution to cloud-based: The business specialists have trusted that the pattern of distributed computing would proceed to develop and grow in advance. As this innovation has been without a doubt profitable for organizations of every size, it has not been without drawbacks. The different qualities and shortcomings with respect to the usage of distributed computing have been depicted below. Strengths: Cost effectiveness: Cloud computing is likely the most practical system to use, keeping up and refreshing. Customary desktop programming is costing associations a great deal regarding economy. Counting the licensing charges for different customers could end up being to a great degree expensive for the foundation (Hwang, Dongarra Fox, 2013). The cloud, of course, is open at more affordable rates and consequently, altogether been down the IT expenses of an organization. Additionally, there have been various one-time-installments, the pay-as-you-go and other versatile decisions open that make it especially sensible for the association being alluded to. Unlimited Storages: Securing information within the cloud gives for all intents and purposes the endless limit constrain. Hence, "My Health Record" needs worry more over the storage space shorting or growing the present storage space availability. Recovery and reinforcement: Since all the data is secured in the cloud, storing and restoring the same has been fundamentally less requesting than securing the same over physical gadgets (Hwang, Dongarra Fox, 2013). Additionally, most cloud authority associations are regularly outfitted enough to manage recovery of information. In this manner, this makes the entire methodology of support and recovery generously more clear than other regular systems for data stockpiling. Modified Software Integration: In cloud, the reconciliation of software is typically something that happens actually. This infers that My Health Record, does not need to take additional attempts to change and consolidate the applications as indicated by the inclinations. Straightforward Access to Information: At the point when the people enlist themselves in cloud, they could get to the information from wherever there is an Internet. This profitable component allows moving past time zone and geographic zone issues (Hwang, Dongarra Fox, 2013). Fast Deployment: Above all, the cloud computing delivers the upside of fast deployment. When anybody settles on this technique for working, the entire system could be totally active in a matter of two or three minutes. Clearly, the time taken here would depend on the correct kind of innovation required for My Health Record. Weaknesses: Inclined to attack: The storing of data in cloud could make The My Health Record powerless while dealing with external harms and attacks (Leymann et al., 2014). Security in Cloud: This has been one of the important problems within the cloud. Before adopting this technology, My Health Record should be aware that they could have to surrender all their sensitive information to a third-party cloud service provider. This might place the company in incredible problematic situation. Thus they need to ensure that the going for the most reliable service provider who could store there information protected. Technical Issues: Though the information in cloud could be retrieved at any time and from any place, still sometimes the network could face some break downs. My Health Record needs to be aware of the approach about how this technology has been continuously inclined to breakdowns and other technical problems (Jula, Sundararajan Othman, 2014). The SDLC approach: The SDLC or "System Development Life Cycle" or "Software Development Life Cycle" is the structure characterizing undertakings that has been to be done at each progression within the hybrid cloud computing process. Two sorts of SDLC are examined here. The predictive SDLC: Without a doubt the conspicuous and comprehended predictive approach has been the waterfall model. The term waterfall got transformed into the token predictive system. This has been for debating the advantages of adaptive versus predictive. The nature of the predictive approach has been its accentuation over network. It has been further keeping up a far reaching vision of the resolution space. Its weakness has been the steady thoroughness not yielded (Zhang et al., 2014). However there has been no reason not to procure what has been required from this framework. The adaptive SDLC: Eventually, there have been more than satisfactory in bona fide cases to exhibit that the versatile methods work in the "gigantic." The adaptive SDLC keep running from the Rapid Application Development or the RAD that basically models things into actuality, to Scrum, with its staggering reliance over group collaboration. This proceeds up to XP that takes the adaptive to the outrageous with its capability of adjustment of joined software and steady reviews. These lighter and spry frameworks make cloud computing fast (Kalloniatis et al., 2014). However they do tend to be fairly strategic, as often as possible missing the primary strategic scopes. Recommendations to the SDLC for the present venture: For the current venture the Adaptive approach is proposed. The adaptive philosophy has been otherwise called the agile approach. This is on account of they take after "Agile Manifesto" which is an accumulation of focal standards backing up iterative improvement. The SDLC has been adaptable in using Agile SDLC that has been utilizing the "IBM Rational Unified Process or SCRUM". All of these are outlined like an iterative approach for generating and quickly implement life-cycles. To bring operations on the comparative table, the application of DevOps might be utilized. This must be particularized in the system of the cloud SDLC. Conclusion: Like other field of technology the cloud computing likewise has some upsides with downsides. The advancement could demonstrate an awesome resource for the "My Health Record". However, it could likewise damage if it is abused or not seen legitimately. To put it plainly, the information as put away in big data center everywhere throughout the world, it could become the objective of attackers. Moreover, in such cases it could not be utilized appropriately by the employees of cloud service providers. The experts of "My Health Record" require guaranteeing that cloud computing never turn out to be any system utilized by some of the clients. Like different advancements in todays capitalized world, the technology of cloud has been marketed first. At that point its upsides and downsides should be remembered while implementing. References: Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Buyya, R., Vecchiola, C., Selvi, S. T. (2013).Mastering cloud computing: foundations and applications programming. Newnes. Chen, M., Zhang, Y., Hu, L., Taleb, T., Sheng, Z. (2015). Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies.Mobile Networks and Applications,20(6), 704-712. Choi, C., Choi, J., Kim, P. (2014). Ontology-based access control model for security policy reasoning in cloud computing.The Journal of Supercomputing,67(3), 711-722. Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z. (2016). Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.Journal of Network and Computer Applications,59, 46-54. Grewal, R. K., Pateriya, P. K. (2013). A rule-based approach for effective resource provisioning in hybrid cloud environment. InNew Paradigms in Internet Computing(pp. 41-57). Springer Berlin Heidelberg. Hu, F., Hao, Q., Bao, K. (2014). A survey on software-defined network and openflow: From concept to implementation.IEEE Communications Surveys Tutorials,16(4), 2181-2206. Hwang, K., Dongarra, J., Fox, G. C. (2013).Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann. Jula, A., Sundararajan, E., Othman, Z. (2014). Cloud computing service composition: A systematic literature review.Expert Systems with Applications,41(8), 3809-3824. Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.Computer Standards Interfaces,36(4), 759-775. Leymann, C. F. F., Retter, R., Schupeck, W., Arbitter, P. (2014). Cloud computing patterns.Springer, Wien. doi,10, 978-3. Li, J., Li, Y. K., Chen, X., Lee, P. P., Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication.IEEE Transactions on Parallel and Distributed Systems,26(5), 1206-1216. Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., Du, R. Y. (2013). Applications integration in a hybrid cloud computing environment: Modelling and platform.Enterprise Information Systems,7(3), 237-271. Lu, P., Sun, Q., Wu, K., Zhu, Z. (2015). Distributed online hybrid cloud management for profit-driven multimedia cloud computing.IEEE Transactions on Multimedia,17(8), 1297-1308. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Zhang, H., Jiang, G., Yoshihira, K., Chen, H. (2014). Proactive workload management in hybrid cloud computing.IEEE Transactions on Network and Service Management,11(1), 90-100.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.