You are on page 1of 7
Q.1.a.What is cloud computing? Explain two important features of cloud computing? Ans: - Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet 2 Following are the two important features of cloud computing : - Resources Pooling. It means that the Cloud provider pulled the computing resources to provide services to multiple customers with the help of a On demand self-service and easy maintenance. multi-tenant model. Q.1.b.What are the different types of deployment models? Explain each in brief. Ans: There are four cloud deployment models. They are as follows: 1.Public Cloud 2.Private Cloud 3.Community Cloud And, 4.Hybrid Cloud 1 Public cloud:- As the name suggests, this type of cloud deployment model supports all users who want to make use of a computing resource, such as hardware (OS, CPU, memory, storage) or software (application server, database) on a subscription basis. Most common uses of public clouds are for application development and test non-mission-critical tasks such as file-sharing, and e- mail service. 2. Private cloud:- True to its name, a private cloud is typically infrastructure used by a single organization, Such infrastructure may be managed by the organization itself to support various user groups, or it could be managed by a service provider that takes care of it eith pital expenditure involved in e better able to address the security and onsite or off: Private clouds are more expensive than public clouds due to the acquiring and maintaining them, However, private clouds a privacy concerns of organizations today. 3.Community cloud:- This deployment model supports multiple organizations sharing computing resources that are part of a communit research, or police departments within county or state sharing computing resources. Access to a of the community. ; examples include universities cooperating in certain areas of community cloud environment is typically restricted to the member: And, 4.Hybrid cloud:- In a hybrid cloud, an organization makes use of interconnected private and public cloud infrastructure. Many organizations make use of this model when they need to scale up their IT. infrastructure rapidly, such as when leveraging public clouds to supplement the capacity available within a private cloud. For example, if an online retailer needs more computing resources to run its Web applications during the holiday season it may attain those resources via public clouds. Q.2.a.Compare Saas,laas and PaaS with respect to the following factors 1.Consumers. 2Services offered Service Coverage Ans:- The key differences between Saas,laaS and PaaS are as follows: 1. SaaS- It stands for Software As A Service. It provides software as a service to consumers. available via a third-party over the internet. JaaS - It stands for Infrastructure As A Service. It provides cloud-based services .pay services such as storage, networking and virtualization. PaaS- It stands for Platform As A Service. It provides hardware and software tools available over the internet. Q.2.b.Define Virtualization, Why Virtualization is important in cloud computing? Ani virtual computer hardware platforms, storage devices, and computer network resources. Virtualization in Cloud Computing increases security as it protects both the integrity of guest virtual machines and cloud components. Cloud Component virtualized machines can also be scaled up or down on demand or can provide reliability. Virtualization is the key to cloud ‘computing, since it is the enabling technology allowing the creation of an intelligent abstraction layer which hides the complexity of underlying hardware or software. Q.3.a.What are the different techniques used in implementation of hardware virtualization. Explain them in detail, Ans:-The different techniques used for implementation of hardware virtualization are as follows: In computing, virtualization refers to the act of creating a virtual version of something, including 1. Full Virtualization: need any modification to run any applications. : Here the hardware architecture is completely simulated. Guest software doesn't 2. Emulation Virwalization: Here the virtual machine simulates the hardware & is independent. Furthermore, the guest OS doesn't require any modification. 3. Para-Virtualization: Here, the hardware is not simulated; instead the guest software runs its isolated system. Q.3.b.What is load balancing? What are the advantages of load balancing? Ans:- Cloud load balancing is the process of distributing workloads and computing resources in a cloud computing environment. Load balancing allows enterprises to manage application or workload demands by allocating resources among multiple computers, networks or servers. Following are the advantages of load balancing: 1. High Performing applicati 2. Increased sealabi 3. Ability to handle sudden traffic spikes 4, Business continuity with complete flexibility 5. It also improves system performance is Q.4.a.Take a suitable example and explain the concept of map reduce. Ans:- Map Reduce is a programming framework that allows us to perform distributed and parallel processing on large data sets in a distributed environment. Reduce() ayertig Reduce() Q.4.b.What do you mean by virtual LAN and virtual SAN? Write their benefits. Ans:- Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2 (data link layer). Generally, layer 3 devices divides broadcast domain but broadcast domain can be divided by switches using the concept of VLAN.VLAN 1 is the default VLAN of switches. A virtual storage area network is primarily implemented in eloud computing and virtualization environments. A VSAN allows end users and organizations to provision a logical storage area network on top of the physical SAN through storage virtualization. VLANs provide a number of advantages, such as ease of administration, confinement of broadcast domains, reduced broadcast traffic, and enforcement of security policies. VLANs provide the following advantages: VLANs enable logical grouping of end-stations that are physically dispersed on a network, VLANs administration, confinement of broadcast domains, reduced broadca provide a number of advantages, such as ease of traffic, and enforcement of security policies. VLANs provide the following advantages: VLANs enable logical grouping of end-stations that are physically dispersed on a network. Q.5.a.What are the different security challenges in cloud computing ? Discuss each in brief. Ans:-Following are the different security challenges in cloud computing:~ 41. Lack of Visibility and Control- Relating to both public and hybrid cloud environments, the loss of overall service visibility and the associated lack of control can be a problem, 2. Data Breaches and Downtime- Despite the fact that generally speaking, enterprise-grade cloud services are more secure than legacy architecture, there is still a potential cost in the form of data breaches and downtime 3. Vendor Lock- For companies that come to rely heavily on public and hybrid cloud platforms, there is a danger that they become forced to continue with a specific third-party vendor simply to retain operational capacity. If critical business applications are locked into a single vendor, it can be very difficult to make tactical decisions such as moving to a new vendor. Compliance Complexity- In sectors such as healthcare and finance, where legislative requirements with regard to storage of private data are heavy, achieving full compliance whilst using public or private cloud offerings can be more complex. A Lack of Transparency: When a business buys in third-party cloud services as either a public or hybrid cloud offering, itis likely they will not be provided with a full service description, detailing exactly how the platform works, and the security processes the vendor operates. 6. Insecure interfaces and APIS- Cloud vendors provide their customers with a range of Application Programming Interfaces (APIs), which the customer uses to manage the cloud service. 7. Insufficient due diligence- For companies that lack the internal resources to fully evaluate the implications of cloud adoption, then the risk of deploying a platform that is ineffective and even insecure is real. Q.5.b-Explain the terms 1.Confidentiality- Confidentiality refers to the prevention of the unauthorized access of the data and hence making sure that only the user who has the permission can access the data. 2.Integrity- Integrity involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. 3. Availability- Availability in this context is how much time the service provider guarantees that your data and services are available. This is typically documented as a percent of time per year, e.g. 99.999% (or five nines) uptime means you will be unable to access resources for no more than about five minutes per year. 4, Authentication- Cloud computing users should be authenticated to be able to use the resources. Itis noteworthy that a great number of attacks occur at this entrance gate. Hence, the design of a secure mechanism to authenticate users is a substantial aid to increased security of the entire system. sel Q.6.2. What is Honeypot ? What are the different types of Honeypot? Ans:- Honeypots are systems used to trap, monitor, and identify erroneous requests within a network, Honeypots using various cloud computing platforms (such as Amazon EC2, Windows Azure etc.) Honeypots are designed to purposely engage and deceive hackers and identify malicious activities performed over the Internet. Following are the different types of Honeypot:- 1, Low-Interaetion Honeypots 2. Medium-Interaction Honeypors 3. High-Interaction Honeypots Q.6.b.Explain security reference architecture of cloud with neat diagram, Ans: Q.7.a. Givea suitable definition of cloud federation stack and explain it in detail. Ans:- Cloud federation is the practice of interconnecting the cloud computing environments of two or more service providers for the purpose of load balancing traffic and accommodating spikes in demand. A federated cloud (also called cloud federation) is the deployment and management of multiple external and internal cloud computing services to match business needs. A federation is the union of several smaller parts that perform a common action. See also: hybrid cloud. Q.7.b.What do you mean by third party cloud services Give suitable Examples. Ans:- A cloud service provider is a third-party company offering a cloud-based platform, infrastructure, application or storage services. Much like « homeowner would pay for a utility such as electricity or gas, companies typically have to only pay for the amount of cloud services they use, as business demands require, You need to know whether your cloud-computing vendor is itself outsourcing to another cloud-computing vendor. For example, a SaaS vendor, such as Dropbox, could be running its service in the data center of a third-party IaaS vendor, such as Amazon Web Services Q.8.Write short notes on any two of the followings: a, HADOOP- Hadoop is a distributed framework in Big Data which utilizes programming models to process large data sets across multiple computers whereas cloud computing is a model where managing and accessing resources can be easily done from anywhere on the earth via the internet. Hadoop in the cloud, also know as Hadoop-as-a-Service (HaaS), is a sub-category of Platform-as-a-Service (PaaS). Apache Hadoop is an open source software framework that enables high throughput processing of big data sets across distributed clusters. The Hadoop architecture is a package of the file system, Map Reduce engine and the HDFS (Hadoop Distributed File System). The Map Reduce engine can be Map Reduce/MR1 or YARN/MR2. A Hadoop cluster consists of a single master and multiple slave nodes. b. Microsoft Azure- Microsoft Azure (formerly Windows Azure /) is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Mierosoft- managed data centers. Initial release: February 1, 2010; 10 years ago Operating system: Linux, Microsoft Windows License: Closed source for platform, Open source for client SDKs . Storage Services provides REST and SDK APIs for storing and accessing data on the cloud. + Table Service lets programs store structured text in partitioned collections of entities that are accessed by partition key and primary key. I's a NoSQL non-relational database. «Blob Service allows programs to store unstructured text and binary data as blobs that can be accessed by an HTTP(S) path. Blob service also provides security mechanisms to control access to da + Queue Service lets programs communicate asynchronously by message using queues. of data on the cloud using the REST APIs or the SMB protocol «File Service allows storing and ac c.Aneka-Aneka is a platform and a framework for developing distributed applications on the Cloud. It hamesses the spare CPU cycles of a heterogeneous network of desktop PCs and servers or datacenters on demand, Aneka provides developers with a rich set of APIs for transparently exploiting such resources and expressing the business logic of applications by using the preferred programming abstractions. System administrators can leverage on a collection of tools to monitor and control the deployed infrastructure. This can be a public cloud available to anyone through the Internet, or a private cloud constituted by a set of nodes with restricted access. ‘The Aneka based computing cloud is a collection of physical and virtualized resources connected through a network, which are either the Internet or a private intranet. Each of these resources hosts an instance of the Aneka Container representing the runtime environment where the distributed applications are executed. The container provides the basic management features of the single node and leverages all the other operations on the services that it is hosting. The services are broken up into fabric, foundation, and execution services. Fabric services directly interact with the node through the Platform Abstraction Layer (PAL) and perform hardware profiling and dynamic resource provisioning. Foundation services identify the core system of the Aneka middleware, providing a set of basic features to enable Aneka containers to perform specialized and specific sets of tasks. Execution services directly deal with the scheduling and execution of applications in the Cloud. 4. Cloud Analyties- Cloud analytics is a marketing term for businesses to carry out analysis using cloud ‘computing. It uses a range of analytical tools and techniques to help companies extract information from a web browser. massive di and present it in a way that is easily categorized and readily available vi (o[oleTe} Analytics

You might also like