What is the best VM migration path provider in the market among the four CSPs?


Please find the attached question and my last week assignment.Make sure 0% Plagiarism and references should be in APA format.Need at least 2-3 pages.
Using the four CSPs you used for the previous week’s assignment, conduct additional research on information they
provide to prospective customers on data security. Specifically look for protection while data is at rest (stored), while
data is being processed, and while data is in transit. If you find that the original concerns still exist, provide an opinion on
why there has been no change. If you find the concerns have been addressed, what contributed to the change? Also
research and discuss encryption used by the CSP. What type do they use?
Lastly, include steps for confirming their data protection practices.
Cloud Service Providers
The four leading public cloud providers in the world include Microsoft, Amazon Web
Services, Google, as well as Rackspace. There are various criteria that these service need to meet
and the comparison takes into account how well each of these cloud service providers meet the
set criteria. The criteria used in comparing the four CSPs are VM migration support,
Autoscaling, as well as network connectivity, among other features. AMS provides its users with
the most flawless VM migration path. It is the best VM migration path provider in the market
and is followed by Microsoft that is not far off behind. Through the use of a graphical device, the
various admin are in a position to manage the Amazon resources via a vCenter also making it
possible to migrate to the public cloud all the VMware VMs(Buyya et al., 2008). Microsoft
doesnt provide a seamless process as is the case with AMS but it enables its users to migrate
VMs to and forth from the local data centers to the Azure. The process is easy although it has
some flaws. Google doesnt allow its users to migrate VMs back or from the Google Compute
Engine Cloud even though it employs the services of third independent parties such as Cohesive
Networks that facilitate the migration of VMs. Rackspace doesnt provide a means of migrating
VMs to or from its cloud.
Another critical aspect is auto scaling that is primarily the ability of the various cloud
providers to allow the available workloads to increase and decrease in regards to the current
demand. With Rackspace, there is aautoscale element that allow the cloud to increase as well as
decrease as in regards to the identified user-defined rules(Kim et al., 2009). Microsoft has
included a scale page that is intended to scale an application or introduce the parameters for
automatic scaling. Google also contains an autoscaler that is in a position to scale the uploaded
workload depending on the current demand; AWS has autoscaling abilities that are applicable on
a group basis.
Network connectivity is a fundamental feature that customers take into consideration
when settling for a cloud provider. The provider should provide the users with numerous
connectivity features to enhance connecting cloud network with the on-premises network. AWS
provides enhanced networking that guarantees the users high-performance networking that
enhance low jitter as well as latency. Rackspace provides the uses with numerous options for
networking to choose from. Google also provides its users with cloud DNS, primary cloud
networking potentials, as well as cloud load balancing (Buyya et al., 2008). Google also has an
interconnect feature with which the customers can directly link with Google or using a VPN.
Microsoft provides an Azure primarily designed to accommodate hybrid clouds. The Azure is
often utilized by users to act as an extension in regards to on-premises network.
With the current increase in CSPs, it is essential for the user to take certain factors into
consideration when settling for a particular CSP. These factors include the companys cost limit,
the required features as well as designs. Other elements that need to be considered in this case
are the VM migration support, Autoscaling, custom image support, network connectivity, VM
migration storage choices, as well as regional support(Wei& Blake, 2010). These elements
determine the quality of services provided by the CSP as through these features and their
analysis, the consumer can determine the CSP that provides all its essential fundamental features.
Wei, Y., & Blake, M. B. (2010). Service-oriented computing and cloud computing: challenges
and opportunities. IEEE Internet Computing, 14(6), 72.
Buyya, R., Yeo, C. S., &Venugopal, S. (2008, September). Market-oriented cloud computing:
Vision, hype, and reality for delivering it services as computing utilities. In High
Performance Computing and Communications, 2008. HPCC’08. 10th IEEE International
Conference on (pp. 5-13). Ieee.
Kim, W., Kim, S. D., Lee, E., & Lee, S. (2009, December). Adoption issues for cloud
computing. In Proceedings of the 7th International Conference on Advances in Mobile
Computing and Multimedia (pp. 2-5). ACM.

Cloud computing has become an indispensable component of modern-day businesses. Due to its convenience and cost-effectiveness, companies are increasingly adopting cloud computing services, making it a booming industry. However, concerns about cloud security have still not been completely addressed even with advanced security measures put in place by Cloud Service Providers (CSPs). As the use of cloud computing increases, it is essential to evaluate the security measures provided by CSPs, which include Microsoft, Amazon Web Services, Google, and Rackspace. In this paper, we will conduct additional research on data security measures provided by the four CSPs especially focusing on data protection while at rest, in transit, and while being processed. Additionally, we will examine the type of encryption each CSP uses and the steps users can take to confirm data protection practices.

Don't use plagiarized sources. Get Your Custom Essay on
What is the best VM migration path provider in the market among the four CSPs?
Just from $13/Page
Order Essay

The CSPs are entrusted with the protection of their clients’ data, making it of utmost importance to enhance their data security measures. In this paper, we found that the four CSPs used measures such as VM migration support, autoscaling, and network connectivity to secure data stored in the cloud. They all have advanced security measures such as two-factor authentication, firewall protection, and access control to prevent unauthorized access. However, our findings indicate that the original concerns regarding data security in the cloud still exist. One possible reason for this could be a lack of awareness by clients to understand how to use various CSP’s security features and a false sense of security in some cases.

We identified that Google and Rack space are the only CSPs that do not provide seamless VM migration from external sources. While Rackspace has the option to autoscale the cloud, Google compute engine cannot migrate VMs back or forth, despite relying on third-party providers such as Cohesive Networks to facilitate this function. On the other hand, Microsoft and Amazon Web Services offer a more straightforward and efficient VM migration process for their clients. In addition, we examined encryption used by the CSPs and found that they all use Advanced Encryption Standard (AES) in securing user data.

The paper concludes by outlining steps that users can take to confirm the data protection practices of their CSPs, such as performing regular backups, monitoring network activity, and implementing proper access control. It is important that clients understand the data security measures provided by their CSPs to facilitate a secure business environment.



1. To understand the measures taken by CSPs to protect data security.
2. To identify the encryption methods used by different CSPs.
3. To evaluate the data protection practices of leading CSPs.
4. To identify the changes in data security measures implemented by CSPs, if any.

Learning Outcomes:

1. Learners will be able to analyze the measures taken by different CSPs to protect data while it is at rest, in transit, and being processed.
2. Learners will be able to identify the encryption methods employed by different CSPs for improved data security.
3. Learners will be able to evaluate and compare the data protection practices of various leading CSPs in terms of their approach to security, data breach prevention, and responsiveness in the event of a security threat.
4. Learners will be able to assess why some CSPs have failed to address the original concerns relating to data security or changes made to their data security measures.


Cloud systems have become an integral part of various companies’ operations worldwide. Four of the leading CSPs in the world are Microsoft, Amazon Web Services, Google, and Rackspace. These cloud service providers have different approaches to meeting specific criteria for their customers’ needs. This paper, therefore, seeks to examine the data security measures put in place by these CSPs, specifically looking at how they protect data while at rest, in transit, and during processing. The paper will also focus on the encryption types employed by these CSPs and recommend steps for confirming their data protection practices.

Data Security Measures by CSPs:

When evaluating data security measures by cloud service providers, it is essential to consider how they protect data while at rest, in transit, and during processing. In terms of securing data while at rest or stored, all the four CSPs have implemented different measures. Microsoft and AWS are known to offer a transparent, secure data storage mechanism that minimizes the possibility of unauthorized access to stored data. On the other hand, Google and Rackspace rely on third-party service providers to facilitate encrypted data storage.

Regarding data in transit or during transfer, all CSPs apply encryption protocols to prevent data breaches or theft. For example, Amazon Web Services offers users an encrypted Secure Sockets Layer (SSL) for data transfer from users to the cloud and vice versa. Microsoft has implemented Transport Layer Security (TLS) for similar purposes. Similarly, Google encrypts data during transfer using SSL and TLS connections while Rackspace uses SSL and Virtual Private Network (VPN) technologies.

Encryption types used by CSPs:

Encryption is a critical data protection technique adopted by various CSPs for data security. All CSPs use different encryption protocols. AWS and Microsoft have implemented Advanced Encryption Standard (AES) to protect customer data. AES is a widely accepted encryption protocol that is tough to hack and decrypt. On the other hand, Google and Rackspace employ the Blowfish encryption protocol. Blowfish requires a key to decrypt encrypted data making it hard to crack codes.

Confirmation of Data Protection Practices by CSPs:

To confirm the safety and security of customer’s data, there are practices and steps that customers can follow. For instance, customers should ensure that CSPs have data recovery and backup plans in place. CSPs should also have a fraud detection strategy that checks for any breaches and data theft. Moreover, the CSPs should be audited and accredited by reputable third-party certificating bodies to ensure they meet the industry’s data security standards and protocols.


In conclusion, data security is a fundamental issue when dealing with cloud-based systems. CSPs such as Microsoft, Amazon Web Services, Google, and Rackspace have implemented various measures to protect users’ data while at rest, in transit, and during processing. These CSPs have employed encryption protocols such as AES and Blowfish to safeguard data. It is also crucial for customers to confirm the data protection practices of the CSPs by following specific steps such as backup plans, fraud detection, and accreditations. While some CSPs have addressed data security concerns, others still experience challenges due to various factors such as resistance to change or lack of resources.

Solution 1: Concerns still exist with Data Security in CSPs

Based on the research conducted on the four CSPs, it can be seen that concerns still exist with regards to data security while it is at rest, being processed, and while in transit. Even though CSPs employ various measures to keep their customers’ data secure, breaches still occur, and sensitive information is leaked.

One possible reason for this is that hackers and cybercriminals are becoming more sophisticated in their techniques and are finding new ways of accessing information. As such, CSPs must continually update their security measures to keep up with these evolving threats. Additionally, some CSPs may prioritize functionality over security, which can make it easier for hackers to gain unauthorized access to sensitive data.

Solution 2: Advancements in Encryption have Improved Data Security in CSPs

Although concerns about data security still exist, CSPs have made significant improvements in encryption methods to protect customers’ data. Encryption refers to the process of encoding information so that only authorized parties can access it. CSPs use various encryption methods to keep their customer’s data secure, including AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman).

Some CSPs also provide options for customers to manage their encryption keys, enabling them to retain control over their data even while it is stored on a third-party server. This added level of security helps to protect against unauthorized access by the CSP or anyone else who might attempt to access the data.

To confirm the data protection practices of CSPs, customers should review the following steps:

1. Review their privacy and security policies
2. Conduct a security audit to assess risks and vulnerabilities
3. Check their compliance with data protection regulations
4. Evaluate their encryption methods and key management practices
5. Review backup and recovery processes in case of a breach or data loss.

In conclusion, while CSPs have made significant strides in advancing their data protection practices, concerns still exist with regards to data security. However, customers can take steps to verify CSPs’ security practices and ensure that their sensitive information is protected.

Suggested Resources/Books

1. “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance” by Tim Grance and Rebecca Herold.
This book is a comprehensive guide that explores the security and privacy risks associated with cloud computing. It covers topics such as data protection, encryption, and compliance requirements. The authors provide practical advice on how to evaluate cloud service providers and ensure that your data is secure.

2. “Cloud Computing Security: Foundations and Challenges” by John R. Vacca.
This book provides a detailed overview of the security issues surrounding cloud computing. It covers topics such as confidentiality, integrity, and availability of data in the cloud. The author also discusses the various cloud security models and provides guidance on selecting the right cloud service provider.

3. “Securing the Cloud: Cloud Computer Security Techniques and Tactics” by Vic (J.R.) Winkler.
This book provides an in-depth look at the different security threats facing cloud computing. It covers topics such as identity and access management, data privacy, and compliance. The author provides practical advice on how to implement security controls to protect your data in the cloud.

4. “Data Privacy and Security in the Cloud” by Siani Pearson.
This book explores the privacy and security issues associated with cloud computing. It covers topics such as data privacy regulations, data protection, and encryption. The author provides guidance on how to select the right cloud service provider and how to ensure that your data is secure in the cloud.

5. “Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016” edited by Xingming Sun and Jiwu Jing.
This book contains the proceedings of the second International Conference on Cloud Computing and Security. It features papers on a wide range of topics related to cloud security, including encryption, privacy, and access control. The authors provide insights into the latest research and developments in the field.

Similar Asked Questions

1. What are the potential risks involved in storing data in the cloud?
2. How do cloud service providers ensure the security of data at rest, in transit, and during processing?
3. What encryption methods are used by cloud service providers to protect customer data?
4. How can customers verify the data protection practices of their cloud service provider?
5. What steps can organizations take to ensure their data remains secure while using cloud services?

Opinion on Why There Has Been No Change in Original Concerns

Despite the growth in cloud computing over the years, data security remains a primary concern for many organizations. While cloud service providers have made efforts to address these concerns, there has been little change in the original concerns expressed by customers. One reason for this could be that cloud security is a constantly evolving field, and as new threats emerge, new security protocols need to be developed to counter them.

Another reason could be that organizations still have limited control over their data once it is moved to the cloud. While cloud service providers may provide robust security measures, customers still need to take responsibility for securing their data by ensuring that access controls are in place and regularly monitoring their data for any unauthorized activities.

Concerns Addressed and Contributing Factors

Cloud service providers have made significant strides in addressing the original concerns regarding data security in the cloud. For example, they have implemented robust encryption methods, access control policies, and authentication protocols to protect customer data. Additionally, cloud providers are subject to strict compliance requirements, such as HIPAA and GDPR, which require them to adhere to stringent data protection measures.

One contributing factor to the change could be the increased competition among cloud service providers. With more providers in the market, they are more incentivized to ensure that their security measures are top-notch to attract customers and differentiate themselves from their competitors. Additionally, the rise of multi-cloud environments has made it easier for organizations to adopt a hybrid approach to cloud computing, where they can choose the cloud service provider that meets their specific security needs for different workloads and data types.

Encryption Used by CSPs

Cloud service providers use various encryption methods to protect customer data. Microsoft Azure, for example, uses AES (Advanced Encryption Standard) 256-bit encryption for data at rest and in transit. Amazon Web Services uses both AES 256-bit encryption and HTTPS (Hypertext Transfer Protocol Secure) for data in transit. Google uses AES 128-bit encryption for data at rest and in transit.

Steps for Confirming Data Protection Practices

1. Review cloud service provider’s security and compliance documentation to ensure that they meet your organization’s security requirements.

2. Verify that the cloud service provider uses robust encryption methods, access control policies, and authentication protocols to protect customer data.

3. Request regular security assessments and audits from the cloud service provider to ensure that they are adhering to their security policies.

4. Regularly monitor your data in the cloud for any unauthorized access or activities.

5. Have a robust incident response plan in place in case of any security breaches or data loss.

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
× How can I help you?