You are on page 1of 3

Assignment No.

02 Total Marks: 30
Semester: Spring 2023
CS435: Cloud Computing Due Date: 10/07/2023

Objective:

The objective of this assignment is to enhance the learning capabilities of the students about :

 CIAAA Triad
 Explore and practice the features of Cloud Sim Simulator
 Computer Security Basics

Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if:
 The assignment is submitted after due date.
 The assignment is not in the required format (.doc or .docx)
 The submitted assignment does not open or file is corrupt.
 Assignment is copied (partial or full) from any source (websites, forums, students, etc)
Assignment

Question No. 1 Total Marks: 20

Cloud Sim is a simulation environment. It is more suitable for testing various new and updated procedures and
hypothesizes related to Cloud computing.

What is Required:

 You are required to install Cloud Sim on your computer / Laptop.


 Modify Example 1 i.e., CloudSimExample1.java as below
 Name datacenter as your student ID e.g., if your student ID is BC11223344 then your datacenter name should be
“Datacenter_BC11223344”
 Set the Cloudlet length property as to the digits in your student ID e.g., if your student ID is BC11223344 then
length property of Cloudlet should be equal to 11223344
 Next, run the Simulation Example 1 and take the output snapshot as below.

For Cloud Sim configuration, you are required to download following software.
1. Commons-math3-3.6.1.jar
2. Eclipse IDE for Java Developers
3. JDK Development Kit 17.0.7 downloads
4. Cloudsim-3.0.3

(Download links & Step by Step installation process is given in helping guide, attached with assignment file)
Question No. 2 Total Marks: 10

Confidentiality, integrity, availability, authentication, and authorization are five fundamental concepts in
Information Security. They are collectively referred to as the CIAAA Triad.
Select the appropriate option from CIAAA.

Description Correct Option

Refers to the protection and preservation of


sensitive information from unauthorized access,
use, or disclosure.

Refers to the quality of being honest, upright, and


adhering to strong moral principles and values. It
encompasses having a strong sense of ethics,
truthfulness, and reliability in one's actions,
words, and character.

Refers to the state or condition of being


accessible, present, or ready for use.

The process of verifying the identity or validity of


a user, system, or entity. It ensures that the
claimed identity or credentials are accurate and
authorized for access or interaction.

The process of granting or restricting access rights


and permissions to users or entities based on
their authenticated identity and specified
privileges.

Best of Luck!

You might also like