Q.1.a.What is cloud computing? Explain two important features of cloud computing?
Ans: - Cloud computing is the on-demand availability of computer system resources, especially data storage
and computing power, without direct active management by the user. The term is generally used to describe
data centers available to many users over the Internet
2
Following are the two important features of cloud computing : -
Resources Pooling. It means that the Cloud provider pulled the computing resources to provide
services to multiple customers with the help of a
On demand self-service and easy maintenance.
multi-tenant model.
Q.1.b.What are the different types of deployment models? Explain each in brief.
Ans:
There are four cloud deployment models. They are as follows:
1.Public Cloud
2.Private Cloud
3.Community Cloud
And,
4.Hybrid Cloud
1 Public cloud:- As the name suggests, this type of cloud deployment model supports all users who
want to make use of a computing resource, such as hardware (OS, CPU, memory, storage) or
software (application server, database) on a subscription basis. Most common uses of public clouds
are for application development and test
non-mission-critical tasks such as file-sharing, and e-
mail service.
2. Private cloud:- True to its name, a private cloud is typically infrastructure used by a single
organization, Such infrastructure may be managed by the organization itself to support various user
groups, or it could be managed by a service provider that takes care of it eith
pital expenditure involved in
e better able to address the security and
onsite or off:
Private clouds are more expensive than public clouds due to the
acquiring and maintaining them, However, private clouds a
privacy concerns of organizations today.
3.Community cloud:- This deployment model supports multiple organizations sharing computing
resources that are part of a communit
research, or police departments within county or state sharing computing resources. Access to a
of the community.
; examples include universities cooperating in certain areas of
community cloud environment is typically restricted to the member:
And,
4.Hybrid cloud:- In a hybrid cloud, an organization makes use of interconnected private and public
cloud infrastructure. Many organizations make use of this model when they need to scale up their IT.
infrastructure rapidly, such as when leveraging public clouds to supplement the capacity available
within a private cloud. For example, if an online retailer needs more computing resources to run its
Web applications during the holiday season it may attain those resources via public clouds.
Q.2.a.Compare Saas,laas and PaaS with respect to the following factors
1.Consumers.
2Services offered
Service Coverage
Ans:- The key differences between Saas,laaS and PaaS are as follows:
1.
SaaS- It stands for Software As A Service. It provides software as a service to consumers.
available via a third-party over the internet.
JaaS - It stands for Infrastructure As A Service. It provides cloud-based services .pay
services such as storage, networking and virtualization.
PaaS- It stands for Platform As A Service. It provides hardware and software tools available over the
internet.Q.2.b.Define Virtualization, Why Virtualization is important in cloud computing?
Ani
virtual computer hardware platforms, storage devices, and computer network resources.
Virtualization in Cloud Computing increases security as it protects both the
integrity of guest virtual machines and cloud components. Cloud Component virtualized machines can
also be scaled up or down on demand or can provide reliability. Virtualization is the key to cloud
‘computing, since it is the enabling technology allowing the creation of an intelligent abstraction layer
which hides the complexity of underlying hardware or software.
Q.3.a.What are the different techniques used in implementation of hardware virtualization.
Explain them in detail,
Ans:-The different techniques used for implementation of hardware virtualization are as follows:
In computing, virtualization refers to the act of creating a virtual version of something, including
1. Full Virtualization:
need any modification to run any applications.
: Here the hardware architecture is completely simulated. Guest software doesn't
2. Emulation Virwalization: Here the virtual machine simulates the hardware & is independent.
Furthermore, the guest OS doesn't require any modification.
3. Para-Virtualization: Here, the hardware is not simulated; instead the guest software runs its isolated
system.
Q.3.b.What is load balancing? What are the advantages of load balancing?
Ans:- Cloud load balancing is the process of distributing workloads and computing resources in
a cloud computing environment. Load balancing allows enterprises to manage application or workload
demands by allocating resources among multiple computers, networks or servers.
Following are the advantages of load balancing:
1. High Performing applicati
2. Increased sealabi
3. Ability to handle sudden traffic spikes
4, Business continuity with complete flexibility
5. It also improves system performance
is
Q.4.a.Take a suitable example and explain the concept of map reduce.
Ans:- Map Reduce is a programming framework that allows us to perform distributed and parallel
processing on large data sets in a distributed environment.
Reduce()
ayertig
Reduce()
Q.4.b.What do you mean by virtual LAN and virtual SAN? Write their benefits.
Ans:- Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2 (data link
layer). Generally, layer 3 devices divides broadcast domain but broadcast domain can be divided by
switches using the concept of VLAN.VLAN 1 is the default VLAN of switches.A virtual storage area network is primarily implemented in eloud
computing and virtualization environments. A VSAN allows end users and organizations to provision a
logical storage area network on top of the physical SAN through storage virtualization.
VLANs provide a number of advantages, such as ease of administration,
confinement of broadcast domains, reduced broadcast traffic, and enforcement of security
policies. VLANs provide the following advantages: VLANs enable logical grouping of end-stations that are
physically dispersed on a network,
VLANs
administration, confinement of broadcast domains, reduced broadca
provide a number of advantages, such as ease of
traffic, and enforcement of security
policies. VLANs provide the following advantages: VLANs enable logical grouping of end-stations that are
physically dispersed on a network.
Q.5.a.What are the different security challenges in cloud computing ? Discuss each in brief.
Ans:-Following are the different security challenges in cloud computing:~
41. Lack of Visibility and Control- Relating to both public and hybrid cloud environments, the loss of
overall service visibility and the associated lack of control can be a problem,
2. Data Breaches and Downtime- Despite the fact that generally speaking, enterprise-grade cloud
services are more secure than legacy architecture, there is still a potential cost in the form of data
breaches and downtime
3. Vendor Lock- For companies that come to rely heavily on public and hybrid cloud platforms,
there is a danger that they become forced to continue with a specific third-party vendor simply to
retain operational capacity. If critical business applications are locked into a single vendor, it can
be very difficult to make tactical decisions such as moving to a new vendor.
Compliance Complexity- In sectors such as healthcare and finance, where legislative
requirements with regard to storage of private data are heavy, achieving full compliance whilst
using public or private cloud offerings can be more complex.
A Lack of Transparency: When a business buys in third-party cloud services as either a public or
hybrid cloud offering, itis likely they will not be provided with a full service description,
detailing exactly how the platform works, and the security processes the vendor operates.
6. Insecure interfaces and APIS- Cloud vendors provide their customers with a range of Application
Programming Interfaces (APIs), which the customer uses to manage the cloud service.
7. Insufficient due diligence- For companies that lack the internal resources to fully evaluate the
implications of cloud adoption, then the risk of deploying a platform that is ineffective and even
insecure is real.
Q.5.b-Explain the terms
1.Confidentiality- Confidentiality refers to the prevention of the unauthorized access of the data
and hence making sure that only the user who has the permission can access the data.2.Integrity- Integrity involves maintaining the consistency, accuracy and trustworthiness of data
over its entire lifecycle.
3. Availability- Availability in this context is how much time the service provider guarantees that
your data and services are available. This is typically documented as a percent of time per year,
e.g. 99.999% (or five nines) uptime means you will be unable to access resources for no more
than about five minutes per year.
4, Authentication- Cloud computing users should be authenticated to be able to use the resources.
Itis noteworthy that a great number of attacks occur at this entrance gate. Hence, the design of a
secure mechanism to authenticate users is a substantial aid to increased security of the entire
system.
sel
Q.6.2. What is Honeypot ? What are the different types of Honeypot?
Ans:- Honeypots are systems used to trap, monitor, and identify erroneous requests within a
network, Honeypots using various cloud computing platforms (such as Amazon EC2, Windows
Azure etc.) Honeypots are designed to purposely engage and deceive hackers and identify
malicious activities performed over the Internet.
Following are the different types of Honeypot:-
1, Low-Interaetion Honeypots
2. Medium-Interaction Honeypors
3. High-Interaction Honeypots
Q.6.b.Explain security reference architecture of cloud with neat diagram,
Ans:
Q.7.a. Givea suitable definition of cloud federation stack and explain it in detail.Ans:- Cloud federation is the practice of interconnecting the cloud computing environments of
two or more service providers for the purpose of load balancing traffic and accommodating
spikes in demand.
A federated cloud (also called cloud federation) is the deployment and management of
multiple external and internal cloud computing services to match business needs. A federation is the union
of several smaller parts that perform a common action. See also: hybrid cloud.
Q.7.b.What do you mean by third party cloud services Give suitable Examples.
Ans:- A cloud service provider is a third-party company offering a cloud-based platform, infrastructure,
application or storage services. Much like « homeowner would pay for a utility such as electricity or gas,
companies typically have to only pay for the amount of cloud services they use, as business demands
require,
You need to know whether your cloud-computing vendor is itself outsourcing
to another cloud-computing vendor. For example, a SaaS vendor, such as Dropbox, could be running
its service in the data center of a third-party IaaS vendor, such as Amazon Web Services
Q.8.Write short notes on any two of the followings:
a, HADOOP- Hadoop is a distributed framework in Big Data which utilizes programming models to
process large data sets across multiple computers whereas cloud computing is a model where managing
and accessing resources can be easily done from anywhere on the earth via the internet.
Hadoop in the cloud, also know as Hadoop-as-a-Service (HaaS), is a sub-category of
Platform-as-a-Service (PaaS). Apache Hadoop is an open source software framework that enables high
throughput processing of big data sets across distributed clusters.
The Hadoop architecture is a package of the file system, Map Reduce engine and the HDFS
(Hadoop Distributed File System). The Map Reduce engine can be Map Reduce/MR1 or YARN/MR2.
A Hadoop cluster consists of a single master and multiple slave nodes.
b. Microsoft Azure- Microsoft Azure (formerly Windows Azure /) is a cloud computing service created
by Microsoft for building, testing, deploying, and managing applications and services through Mierosoft-
managed data centers.
Initial release: February 1, 2010; 10 years ago
Operating system: Linux, Microsoft Windows
License: Closed source for platform, Open source for client SDKs
. Storage Services provides REST and SDK APIs for storing and accessing data
on the cloud.
+ Table Service lets programs store structured text in partitioned collections of entities that are accessed
by partition key and primary key. I's a NoSQL non-relational database.
«Blob Service allows programs to store unstructured text and binary data as blobs that can be accessed by
an HTTP(S) path. Blob service also provides security mechanisms to control access to da
+ Queue Service lets programs communicate asynchronously by message using queues.
of data on the cloud using the REST APIs or the SMB protocol
«File Service allows storing and acc.Aneka-Aneka is a platform and a framework for developing distributed applications on the Cloud. It
hamesses the spare CPU cycles of a heterogeneous network of desktop PCs and servers or datacenters on
demand, Aneka provides developers with a rich set of APIs for transparently exploiting such resources and
expressing the business logic of applications by using the preferred programming abstractions. System
administrators can leverage on a collection of tools to monitor and control the deployed infrastructure. This
can be a public cloud available to anyone through the Internet, or a private cloud constituted by a set of
nodes with restricted access.
‘The Aneka based computing cloud is a collection of physical and virtualized resources connected through a
network, which are either the Internet or a private intranet. Each of these resources hosts an instance of the
Aneka Container representing the runtime environment where the distributed applications are executed. The
container provides the basic management features of the single node and leverages all the other operations
on the services that it is hosting. The services are broken up into fabric, foundation, and execution services.
Fabric services directly interact with the node through the Platform Abstraction Layer (PAL) and perform
hardware profiling and dynamic resource provisioning. Foundation services identify the core system of the
Aneka middleware, providing a set of basic features to enable Aneka containers to perform specialized and
specific sets of tasks. Execution services directly deal with the scheduling and execution of applications in
the Cloud.
4. Cloud Analyties- Cloud analytics is a marketing term for businesses to carry out analysis using cloud
‘computing. It uses a range of analytical tools and techniques to help companies extract information from
a web browser.
massive di
and present it in a way that is easily categorized and readily available vi(o[oleTe}
Analytics