Data Migration
The data migration process can take place in different forms such as moving data, application or business elements from an organization’s onsite computer to the cloud, vice-versa or between two cloud environments. There are lots of issues that can be identified such as security, different standards, compatibility of computing resources, performance, formats The primary objective of the study is to analyze data migration towards data assurance using D2Loader, to adopt compatibility of the new platform. Specifically, it will identify the pattern of queries required for data migration; validate the migrated data effectively, and ensure the synchronize pattern of data used to test data reliability and integrity for data assurance.
INTRODUCTION
Background/ Objectives and Goals
Data migration is considered a complex process that requires a robust methodology. In the same manner, databases form a major part of the infrastructure that underpins different storage for all data, so that, it can be accessed through the application. Database migrations are activities that need to be visualized, in order to test the data integrity and reliability to ensure that no data will be lost.
As defined data of transporting the data from one place to another place. The data migration process can take place in different forms such as moving data, application or business elements from an organization’s onsite computer to the cloud, vice-versa or between two cloud environments. There are lots of issues that can be identified such as security, different standards, compatibility of computing resources, performance, formats, etc.
METHODS
The iterative model is extremely easy to utilize. It takes basic usage of a little arrangement of the framework prerequisites, and after that intuitively improves the developing modules, until the real framework is actualized and prepared to be conveyed. The life cycle of this modeling approach does not focus on the detail with the full specification of prerequisites. In the modeling approach, primary concentration is toward the improvement of output first, by determining and executing a simple little piece of the product(output), which can be consistently looked into with a specific end-goal, to distinguish necessary requirements for the improvement, usefulness, and functionality of the system.
- Analysis
- Design
- Implement
- Test
- Install
- Maintain
Application Module Scope
- Upload
- Transfer/Migrate
Upload: In this module, the user can upload any type of files as swift storage supports, both structured and unstructured data. Like a Google drive account, users can upload a file and send it to other users.
Transfer/Migrate: Once the file gets uploaded, the file is migrated to the destination swift storage server demand when the user commands.
How cloud migration affect network security?
There are 3 most important dimensions which affect network security.
1. Source Data Dimension.
2. Source Data Updates and Backup.
3. Distribution of Access.