CS8791-Cloud Computing 2 Marks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

CS8791-Cloud Computing Department of CSE & IT 2023-2024

UNIT I INTRODUCTION
Introduction to Cloud Computing – Definition of Cloud – Evolution of Cloud Computing –
Underlying Principles of Parallel and Distributed Computing – Cloud Characteristics –
Elasticity in Cloud – On-demand Provisioning.
UNIT I PART-A
1 What is Distributed computing?
Distributed computing refers to a system where processing and data storage is
distributed across multiple devices or systems, rather than being handled by a single
central device. In a distributed system, each device or system has its own processing
capabilities and may also store and manage its own data. These devices or systems
work together to perform tasks and share resources, with no single device serving as
the central hub.
2 What is High Performance Computing?
High Performance Computing most generally refers to the practice of aggregating
computing power in a way that delivers much higher performance than one could get
out of a typical desktop computer or workstation in order to solve large problems in
science, engineering, or business. High-performance computing (HPC) uses
supercomputers and computer clusters to solve advanced computation problems.
3 What is Utility computing?
It is a service provisioning model in which a service provider makes computing
resources and infrastructure management available to the customer as needed, and
charges them for specific usage rather than a flat rate.
4 Difference between distributed and parallel computing.
Distributed Parallel
Each processor has its own private All processors may have access to a
memory (distributed memory). shared memory to exchange information
Information is exchanged by passing between processors.
messages between the processors.
Several computers execute tasks Several processors execute various tasks
simultaneously simultaneously in parallel computing.
It is loosely coupled. It is tightly coupled.
An important goal and challenge of Large problems can often be divided into
distributed systems is location smaller ones, which are then solved
transparency. concurrently ("in parallel").
5 Define cloud computing. (Nov/Dec 2022)
Cloud computing is the delivery of computing as a service rather than a product,
hereby shared resources, software, and information are provided to computers and
other devices as a utility.
6 What are the properties of Cloud Computing?
There are six key properties of cloud computing:
 user-centric
 task-centric
 powerful
St. Joseph’s College of Engineering Page 1 of 23
CS8791-Cloud Computing Department of CSE & IT 2023-2024
 accessible
 intelligent
 programmable
7 Differentiate public cloud and private cloud (Dec 20)
Public Cloud: Multiple Clients, Hosted at providers location, Shared infrastructure,
Access over Internet, Low Cost, Less Security
Private Cloud: Single Client, Hosted at providers/organization location, Shared only
within organization, Access over Internet/private network, High Cost, High Security
8 Outline the advantages of distributed computing.
 The goal of distributed computing is to make a network work as a single computer.
 Distributed systems offer many benefits over centralized systems, including
Scalability.
 Failure of one node does not lead to the failure of the entire distributed system.
Other nodes can still communicate with each other.
9 Difference between HPC and HTC.
HPC (High performance computing):
 HPC systems emphasize the raw speed performance.
 The speed of HPC systems has increased from Giga floating point operations
per second ( Gflops) to Peta floating point operations per second flops (Pflops)
 The applications for HPC are scientific, engineering, and manufacturing
communities.
 HPC measured by floating-point speed.
HTC (High Throughput Computing):
 HTC paradigm pays more attention to high-flux computing.
 The main application for high-flux computing is in Internet searches and web
services by millions or more users simultaneously.
 The performance goal measure high throughput or the number of tasks
completed per unit of time.
10 What are the New Computing Paradigms
 Utility computing
 Cluster computing
 Grid computing
 Cloud computing
 Fog Computing
11 Define Centralized computing.
Centralized computing is a type of computing architecture where all or most of the
processing/computing is performed on a central server. Centralized computing is
which all computer resources are centralized in one physical system. All resources
(processors, memory, and storage) are fully shared and tightly coupled within one
integrated OS.
12 What is high-throughput computing (HTC)?
The emergence of computing clouds instead demands high-throughput computing
(HTC) systems built with parallel and distributed computing technologies. We have to
upgrade data centers using fast servers, storage systems, and high-bandwidth
St. Joseph’s College of Engineering Page 2 of 23
CS8791-Cloud Computing Department of CSE & IT 2023-2024
networks. The purpose is to advance network-based computing and web services with
the emerging new technologies.
13 What is meant by parallel computing?
Parallel computing In parallel computing, all processors are either tightly coupled with
centralized shared memory or loosely coupled with distributed memory. Inter
processor communication is accomplished through shared memory or via message
passing. A computer system capable of parallel computing is commonly known as a
parallel computer.
14 What are the properties of Cloud Computing?
There are six key properties of cloud computing:
 Cloud computing is user-centric
 task-centric
 powerful
 accessible
 intelligent
 programmable
15 List the main characteristics of cloud computing. (Dec 20)
 On-Demand self service
 Broad network access
 Location independent resource pooling
 Rapid elasticity
 Measured services
16 Sketch the architecture of Cloud.

17 What are the benefits of cloud computing?


 Simplicity
 Scalability
 Vendors
 Security
18 What is Google app engine?
Google app engine is a SaaS provider which was introduced in 2008. It was quite
unique cloud system compared to other systems. It provides platform to create
applications. It provides infrastructure for hosting. Many high level services which
need to be build are available when using an App Engine.
19 List out the services provided by a cloud or What is SPI? (Dec 21)

St. Joseph’s College of Engineering Page 3 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
Software, Platform, Infrastructure (SPI) model is a term that encompasses three
popular types of cloud computing services. They are as follows,
1. Software as a Service ( SaaS )
2. Platform as a Service ( PaaS )
3. Infrastructure as a Service ( IaaS )
20 What is Business on demand?
Business On Demand is not just about utility computing as it has a much broader set
of ideas about the transformation of business practices, process transformation, and
technology implementations. The essential characteristics of on-demand businesses
are responsiveness to the dynamics of business, adapting to variable cost structures,
focusing on core business competency, and resiliency for consistent availability.
21 What are the three communication patterns?
Three common communication patterns for distributed applications: broadcast,
aggregation, and shuffle.
22 Define Clusters of Cooperative Computers.
A computing cluster consists of interconnected stand-alone computers which work
cooperatively as a single integrated computing resource. A computer cluster is a set of
loosely or tightly connected computers that work together so that, they can be viewed
as a single system.
23 What is an autonomic computing?
Autonomic computing refers to the self managing characteristics of distributed
computing resources, adapting to unpredictable changes. It controls the functioning of
computer applications and systems without input from the user. This computing
model has systems that run themselves, capable of doing high level functions.
24 List the design objectives of cloud computing.
 Shifting Computing from Desktops to Datacentres
 Service Provisioning and Cloud Economics
 Scalability in Performance
 Data Privacy Protection
 High Quality of Cloud Services.
25 Highlight the importantance of the term “cloud computing”.
On-demand capabilities
Broad network access
Resource pooling
Rapid elasticity
Measured service
26 Illustrate the virtual appliances in cloud computing.(Dec 20)
A virtual appliance is a pre-configured virtual machine image, ready to run on a
hypervisor; virtual appliances are a subset of the broader class of software appliances.
A virtual appliance is usually built to host a single application; it therefore represents a
new way to deploy applications on a network.
27 Summarize the benefits and drawbacks of using “Platform as a Service”. (Dec 20)
Advantages of PaaS:
Cost Saving, Availability & Mobility, Facilitates Scalability, and Boosts Productivity.
Disadvantages of PaaS:
St. Joseph’s College of Engineering Page 4 of 23
CS8791-Cloud Computing Department of CSE & IT 2023-2024
Dependency on the Vendor and Data Security.
28 Mention the importance of grid computing and cloud computing.
Importance of Grid Computing:
Grid computing is flexible, secure, coordinated resource sharing among dynamic
collections of individuals, institutions, and resources. Grid computing enables the
virtualization of distributed computing resources such as processing, network
bandwidth, and storage capacity to create a single system image, granting users and
applications seamless access to vast IT capabilities.

Importance of Cloud Computing:


Accessibility- Cloud computing facilitates the access of applications and data from any
location worldwide and from any device with an internet connection.
Cost savings - Cloud computing offers businesses with scalable computing resources
hence saving them on the cost of acquiring and maintaining them.
29 What are the computing paradigm distinctions? (Dec 21) (Nov/Dec 2022)
 Distributed Computing
 Parallel Computing
 Cluster Computing
 Grid Computing
 Utility Computing
 Edge Computing
 Fog Computing
 Cloud Computing
PART - B
1 Explain briefly about the origin and the security concerns of cloud computing.
2 Outline the similarities and differences between Distributed Computing, Parallel
Computing and Cloud Computing.
3 List and explain in brief the three new computing paradigms.
4 Explain in detail about the evolution of cloud computing paradigm and list out the
advantages and disadvantages.(Nov/Dec 2022)
5 Describe in detail about the underlying principles of parallel and distributed
computing with neat sketch. (Nov/Dec 2022)
6 Illustrate the evolutionary trend towards parallel distributed and cloud computing.
(Dec 21)
7 i) State the benefits of cloud computing.
ii) Discuss issues of cloud computing and the government policies.
8 i) Explain in detail about computing paradigms.
ii) Explain in detail, categories of cloud.
9 Explain in detail, pros and cons of cloud computing.
10 Draw the diagram and explain about Parallel and Distributed programming models.
11 Discuss the Cloud – On-demand Provisioning.
12 Explain in detail about clusters of cooperative computers (Dec 21)
13 Explain the following challenges in cloud. (Dec 20)
i) Security. ii) Data lock-in and Standardization. iii) Fault tolerance and Disaster
recovery.

St. Joseph’s College of Engineering Page 5 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
14 Outline the computing platforms and technologies for the development of cloud
computing applications. (Dec 20)
15 Compare and Contrast the Key privacy issues in cloud and explain the steps to
overcome the issues with necessary examples. (Dec 20)
UNIT- II Cloud Enabling Technologies
Service Oriented Architecture – REST and Systems of Systems – Web Services – Publish-
Subscribe Model – Basics of Virtualization – Types of Virtualization – Implementation Levels
of Virtualization – Virtualization Structures – Tools and Mechanisms – Virtualization of CPU
-Memory – I/O Devices -Virtualization Support and Disaster Recovery..
UNIT-II PART - A
1 What is meant by service oriented architecture?
SOA, or service-oriented architecture, defines a way to make software components
reusable and interoperable via service interfaces. Services use common interface
standards and an architectural pattern so they can be rapidly incorporated into new
applications.
2 Define the term web service.
 A web service is any piece of software that makes it available over
the internet and uses a standardized XML messaging system. XML is used to
encode all communications to a web service. For example, a client invokes a web
service by sending an XML message, and then waits for a corresponding XML
response.
3 What are the objectives of OGSA (Open Grid Services Architecture)?
 Manage resources across distributed heterogeneous platforms
 Support QoS-oriented Service Level Agreements (SLAs).
 Provide a common base for autonomic management
 Define open, published interfaces and protocols for the interoperability of diverse
resources.
4 Define “OGSA” ?
Open Grid Services Architecture (OGSA) is a set of standards defining the way in
which information is shared among diverse components of large, heterogeneous grid
systems. In this context, a grid system is a scalable wide area network (WAN) that
supports resource sharing and distribution.
5 Give the basic operations of VM
1. Multiplexing
2.Suspension
3. Provision
4. Migration
6 What is mean by Virtualization?
Virtualization is a computer architecture technology by which multiple virtual
machines (VMs) are multiplexed in the same hardware machine. The purpose of a VM
is to enhance resource sharing by many users and improve computer performance in
terms of resource utilization and application flexibility.
7 Justify that Web and Web architecture are SOA based.
Modern IT and web applications are much more complex than the client-server

St. Joseph’s College of Engineering Page 6 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
model. Distributed web services, which are set up as service-oriented architectures
(SOA), offer many functions and modular functional units, which can be
supplemented. With SOAs, business processes can be automated by the involved
systems communicating with one another - partly without human intervention - and
performing certain tasks.
Web Architecture (WA) is a software architecture style that extends service-oriented
architecture (SOA) to web-based applications. WA was originally created by many web
applications and sites.
8 Define virtual machine monitor. (Nov/Dec 2022)
Different user applications managed by their own operating systems (guest OS) can
run on the same hardware, independent of the host OS after virtualization,. This is
often done by adding additional software, called a virtualization layer. This
virtualization layer is known as hypervisor or virtual machine monitor (VMM).
9 Compare Host OS and Guest OS.
 A host OS is software that is installed on a computer system and communicates
with the underlying hardware. In contrast, a guest OS is a software that is
installed in a virtual machine.

 The host OS executes directly on the hardware. In contrast, the guest OS


executes on a virtual machine.

 The host OS may be single. In contrast, the guest OS may be single or multiple.
10 List the requirements of VMM.
 VMM should provide an environment for programs which is essentially identical
to the original machine.
 Programs run in this environment should show, at worst, only minor decreases in
speed.
 VMM should be in complete control of the system resources. Any program run
under a VMM should exhibit a function identical to that which it runs on the
original machine directly.
11 What are the responsibilities of VMM?
 The VMM is responsible for allocating hardware resources for programs.
 Not possible for a program to access any resource not explicitly allocated to it.
 It is possible under certain circumstances for a VMM to regain control of resources
already allocated.
12 Define CPU virtualization.
CPU virtualization is the fundamental technology that makes hypervisors, virtual
machines, and operating systems possible. It allows a single CPU to be divided into
multiple virtual CPUs for use by multiple VMs. CPU architecture is virtualizable if it
supports the ability to run the VM’s privileged and unprivileged instructions in the
CPU’s user mode while the VMM runs in supervisor mode.
13 List the implementation levels of Virtualization. (Dec 21) (Nov/Dec 2022)
 Application Level
 Library Level
 Operating System Level

St. Joseph’s College of Engineering Page 7 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
 Hardware Abstraction Layer Level(HAL)
 Instruction set architecture Level(ISA)
14 Write notes on memory virtualization. (Dec 21)
Memory Virtualization is a concept where multiple physical memories across different
servers are put together as one to form a singular virtual memory. This allows you an
access to a bigger memory to work on. Virtual memory virtualization is similar to the
virtual memory support provided by modern operating systems.
15 What is mean by I/O virtualization?
I/O virtualization involves managing the routing of I/O requests between virtual
devices and the shared physical hardware. Three ways to implement:
Full device emulation, para-virtualization, direct I/O.
16 Distinguish the physical and virtual cluster
Physical cluster virtual cluster
Physical clusters are connected by Virtual clusters are connected by a virtual
network cables and are managed with a network and are managed with multiple
single system console. user consoles.
Physical clusters are created on different Virtual clusters are created on a single
systems, and they have different system, and they share the same
hardware. virtualization software and hardware.
17 What is memory migration?
Moving the memory instance of a VM from one physical host to another can be
approached in any number of ways. Memory migration can be in a range of hundreds
of megabytes to a few gigabytes in a typical system today, and it needs to be done in an
efficient manner. The Internet Suspend-Resume (ISR) technique exploits temporal
locality as memory states are likely to have considerable overlap in the suspended and
the resumed instances of a VM.
18 What is mean by host based virtualization?
A host-based virtualization requires additional software running on the host as a
privileged task or process. In some cases, volume management is built in to the
operating system, and in other instances it is offered as a separate product.
19 Define KVM.
Kernel-Based VM:- This is a Linux para-virtualization system—a part of the Linux
version 2.6.20 kernel. Memory management and scheduling activities are carried out by
the existing Linux kernel. The KVM does the rest, which makes it simpler than the
hypervisor that controls the entire machine. KVM is a hardware-assisted para-
virtualization tool, which improves performance and supports unmodified guest OSes
such as Windows, Linux, Solaris, and other UNIX variants.
20 Define VM and write the main purpose of a VM.
A VM is a virtualized instance of a computer that can perform almost all of the same
functions as a computer, including running applications and operating systems. The
main purpose of VMs is to operate multiple operating systems at the same time, from
the same piece of hardware.
21 How performance does enhance by virtualizing the data center?
Virtualization can help to make the data center more efficient. Most data centers are not
as efficient as it should be because of low utilization of the data center assets. To ensure
St. Joseph’s College of Engineering Page 8 of 23
CS8791-Cloud Computing Department of CSE & IT 2023-2024
maximum efficiency, we must go for virtualization - be it for servers, storage, and other
infrastructure.
22 “Although virtualization is widely accepted today, it does have its limits”. Comment
on the statement.
Yes, because not every application or server is going to work within an environment of
virtualization. That means an individual or corporation may require a hybrid system to
function properly. This still saves time and money in the long run, but since not every
vendor supports virtualization and some may stop supporting it after initially starting
it, there is always a level of uncertainty when fully implementing this type of system.
23 What are the types of hypervisor?
There are two types of hypervisors:
Type 1 (bare-metal)
Type 2 (hosted)
24 Differentiate full virtualization and para-virtualization. (Dec 20)
Full Virtualization Para virtualization
In Full virtualization, virtual machine In Para virtualization, virtual machine
permits the execution of the instructions does not implement full isolation of OS
with running of unmodified OS in an but rather provides a different API which
entire isolated way. is utilized when OS is subjected to
alteration.
Full Virtualization is less secure. Para virtualization is more secure than
the Full Virtualization.
Full Virtualization uses binary Para virtualization uses hyper calls at
translation and direct approach as a compile time for operations.
technique for operations.
Examples of full virtualization are Examples of para virtualization are
Microsoft and Parallels systems. VMware and Xen.
25 Point out the layers in security architecture design. (Dec 20)
The temporal layer, the distribution layer and the data layer
UNIT-II PART-B
1 a) Explain the trust management in virtual clusters.
b) Discuss how virtualization is implemented in different layers.
2 Explain implementation levels of virtualization in details.
3 Explain the virtualization for data center automation. / What is data centre? Outline
the issues to be addressed with respect to virtualization for data centre automation.
4 Explain the virtualization of CPU, Memory and I/O devices
5 Short notes on
a. Para-Virtualization with Compiler Support
b. Binary Translation with Full Virtualization
6 What are the types of virtualization? Explain the types of virtualization. (Dec 21)
What is the need for virtualization? Explain in detail about the types of virtualization.
(Nov/Dec 2022)
7 Explain detail about Service oriented Architecture.
8 Discuss the REST Full web services.
9 Write short notes on OS level virtualization. List the pros and cons of OS level

St. Joseph’s College of Engineering Page 9 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
virtualization.
10 i) Write short notes on virtual clusters.
ii) Explain Publish Subscribe Model (Dec 21)
11 Explain in detail with the functionalities of OGSA components.
12 What is virtualization? Describe para and full virtualization architectures.
Compare and contrast them.
13 Explain the different phenomenon that has gained an interest towards virtualization
technologies.(Dec 20.21)
14 Explain about Virtualization for Linux and Windows and NT Platform. Design the
process of Live Migration of VM from one host to another. (Dec 20)
15 Write short notes on following: (Nov/Dec 2022)
i) Types of hypervisor
ii) SOAP
16 Explain the differences between full-virtualization and para-virtualization and
illustrate with an example VMM, that was built in each of the two categories. (Nov/Dec
2022)
UNIT III Cloud Architecture, Services and Storage
Layered Cloud Architecture Design – NIST Cloud Computing Reference Architecture –
Public, Private and Hybrid Clouds – laaS – PaaS – SaaS – Architectural Design Challenges –
Cloud Storage – Storage-as-a-Service – Advantages of Cloud Storage – Cloud Storage
Providers – S3.
UNIT- III PART- A
1 What is the working principle of Cloud Computing?
The cloud is a collection of computers and servers that are publicly accessible via the
Internet. This hardware is typically owned and operated by a third party on a
consolidated basis in one or more data center locations. The machines can run any
combination of operating systems.
2 Define private cloud.
The private cloud is built within the domain of an intranet owned by a single
organization. Therefore, they are client owned and managed. Their access is limited to
the owning clients and their partners. Their deployment was not meant to sell capacity
over the Internet through publicly accessible interfaces. Private clouds give local users
a flexible and agile private infrastructure to run service workloads within their
administrative domains.
3 Define public cloud.
A public cloud is built over the Internet, which can be accessed by any user who has
paid for the service. Public clouds are owned by service providers. They are accessed
by subscription. Many companies have built public clouds, namely Google App
Engine, Amazon AWS, Microsoft Azure, IBM Blue Cloud, and Salesforce Force.com.
These are commercial providers that offer a publicly accessible remote interface for
creating and managing VM instances within their proprietary infrastructure.
4 Define hybrid cloud.
A hybrid cloud is built with both public and private clouds; Private clouds can also
support a hybrid cloud model by supplementing local infrastructure with computing
capacity from an external public cloud. For example, the research compute cloud (RC2)
is a private cloud built by IBM.
5 What are the types of Cloud service development?

St. Joseph’s College of Engineering Page 10 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
 Software as a Service
 Platform as a Service
 Infrastructure as a Service
6 Define anything-as-a-service.
Providing services to the client on the basis on meeting their demands at some pay per
use cost such as data storage as a service, network as a service, communication as a
service etc. it is generally denoted as anything as a service (XaaS).
7 What is mean by IaaS?
The Infrastructure as a Service model puts together the infrastructure demanded by the
user namely servers, storage, network and the data center fabric. The user can deploy
and run on multiple VM’s running guest OS on specific application.
8 What is PaaS?
The Platform as a Service model enables the user to deploy user built applications onto
a virtualized cloud platform. It includes middleware, database, development tools and
some runtime support such as web2.0 and java. It includes both hardware and software
integrated with specific programming interface.
9 Differentiate SaaS and PaaS (Dec 21)
Saas
 A pre-installed, pre-configured package as per the requirement is given and
only need to pay accordingly.
 It is like a complete package of services
 Most popular among normal consumers or companies who reply on software’s
such as email, file sharing and social networking as they don’t have to worry
about the technicalities.
PaaS
 It includes middleware, database, development tools and some runtime support
such as web2.0 and java. It includes both hardware and software integrated with
specific programming interface. It enables the users to get these platforms & pay
accordingly.
10 Define Cloud services with example.
Any web-based application or service offered via cloud computing is called a cloud
services. Cloud services can include anything from calendar and contact applications to
word processing and presentations.
11 Define cloud provider.
Cloud Provider is a company that offers some component of cloud computing typically
infrastructure as a service, software as a Service or Platform as a Service. It is
something referred as CSP (Cloud Service Provider).
12 What is meant by cloud broker?
Cloud Broker is a third party individual or business that act as an intermediary
between the purchase of cloud computing service and sellers of that service.
13 What is storage networking?
Storage networking is the practice of linking together storage devices and connecting
them to other IT networks. Storage networks provide a centralized repository for
digital data that can be accessed by many users, and they use high speed connections to
provide fast performance. The phrase "storage networking" is commonly used in

St. Joseph’s College of Engineering Page 11 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
reference to storage area networks (SANs).
14 List some of the service provider of SaaS.
Some of the service providers are
1. Amazon Web services
2. Google Apps
3. icloud
4. Oracle
5. Salesforce.com
6. Windows Azure
15 What is cloud storage?
Cloud storage is a cloud computing model that stores data on the Internet through a
cloud computing provider who manages and operates data storage as a service. It’s
delivered on demand with just-in-time capacity and costs, and eliminates buying and
managing your own data storage infrastructure. This gives you agility, global scale and
durability, with “anytime, anywhere” data access.
16 How Does Cloud Storage Work?
Cloud storage is purchased from a third party cloud vendor who owns and operates
data storage capacity and delivers it over the Internet in a pay-as-you-go model. These
cloud storage vendors manage capacity, security and durability to make data accessible
to your applications all around the world.
Applications access cloud storage through traditional storage protocols or directly via
an API. Many vendors offer complementary services designed to help collect, manage,
secure and analyze data at massive scale.
17 List the cloud enabling technologies.
 Fast platform deployment Virtual clusters on demand
 Multitenant techniques, Massive data processing
 Web scale communication
 Distributed storage
 Licensing and billing services
18 Give the significance of Amazon’s AWS.
Amazon Web Services (AWS) is a comprehensive, evolving cloud computing
platform provided by Amazon.com. Web services are sometimes called cloud
services or remote computing services.
The growing AWS collection offers over three dozen diverse services including:
1. CloudDrive 2. CloudSearch
3. Dynamo Database 4. Elastic Compute Cloud
19 List some of the more popular cloud storage services.
Google Drive,iCloud,Dropbox,OneDrive,Box
20 What is meant by S3? List the features of S3. (Nov/Dec 2022)
Simple Storage Service (Amazon S3) is an object storage service that offers industry-
leading scalability, data availability, security, and performance.
The customers of all sizes and industries can use it to store and protect any amount of
data for a range of use cases, such as websites, mobile applications, backup and restore,
archive, enterprise applications, IoT devices, and big data analytics.
21 What is NIST model in cloud computing?
NIST (National Institute of Standards and Technology) defines cloud computing as a
model for enabling convenient, on-demand network access to a shared pool of

St. Joseph’s College of Engineering Page 12 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
configurable computing resources that can be rapidly provisioned and released with
minimal management effort or service provider interaction.
22 Is AWS s3 an example of IaaS or PAAS?
Amazon Simple Storage Service (Amazon S3) is a global Infrastructure as a Service
(IaaS) solution provided by Amazon Web Services (AWS). Amazon S3 facilitates
highly-scalable, secured and low-latency data storage from the cloud.
The most famous Amazon Web Service (AWS) offering in Iaas is EC2 (Elastic
computing 2), S3 (Simple Storage Service), and RDS (Relational Database Service). Each
of these products is charged by the hour.
23 Why do we need a hybrid cloud?
The hybrid cloud infrastructure is a composition of two or more clouds that remains
unique entities but is bound together by standardized or proprietary technology that
enables data and application portability.
24 What are the advantages of cloud storage?
Purchasing physical storage can be expensive. Without the need for hardware cloud
storage is exceptionally cheaper per GB than using external drives. Using
the cloud for storage gives you access to your files from anywhere that has an internet
connection.
25 Compare Public, hybrid and private cloud
Public cloud Hybrid cloud Private cloud
Services are owned and It combines both public Dedicated to a single
Operated by a third party and private cloud organization
provider
The maintenance is bared Cloud bursting is possible Purchase and maintenance
by the service provider which means that an has to be bared by the
organization only pays for organization
extra compute resources
when they are needed.
Pay-as-you-go model. Thus Can be extremely Expensive than public
the setting and operating expensive cloud
cost is less
Lesser security as the Network complexities and Higher security as the
platform is shared compliance issues resources are not shared
Lesser flexibility and Greater flexibility and more Greater flexibility to
control over the cloud deployment options control the cloud
environment environment
26 Outline the main services that are offered by AWS. (Dec 20)
 Amazon Elastic Cloud Compute (EC2) The Amazon EC2 service comes under
the compute domain and it provides services that help to compute workloads
 Amazon S3 (Simple Storage Service)
 Amazon Virtual Private Cloud (VPC)
 Amazon CloudFront, Amazon Relational Database Services (RDS)
27 What do you mean by community cloud? (Dec 21) (Nov/Dec 2022)
Community cloud is a cloud infrastructure allows system and services to be
accessible by a group of several organization to share the information. It is owned,
managed and operated by one or more organization in the community, a third party or
a combination of them.
PART-B
1 Explain the cloud architecture with suitable block diagram.

St. Joseph’s College of Engineering Page 13 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
2 Explain the various Layered Cloud Architectural Development design for effective
cloud computing environment. (Dec 20, 21,22)
3 Write short notes on cloud deployment model.
4 Explain in detail NIST cloud architecture.
5 Compare public cloud with private cloud.
6 Explain the provisioning of storage resources in detail.
7 Explain in detail, the categories of cloud.
8 Discuss about the various challenges during architectural design.
9 Describe Infrastructure-as-a-Service(IaaS), Platform-as-a-Service(PaaS) , Software-as-a-
Service(SaaS) with an example.(Dec 21)(Nov/Dec 2022)
10 Explain cloud storage providers in detail and also state the advantages of cloud
storage.
11 Demonstrate the architectural design of compute and storage clouds. (Dec 20)
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
Inter Cloud Resource Management – Resource Provisioning and Resource Provisioning
Methods – Global Exchange of Cloud Resources – Security Overview – Cloud Security
Challenges –Software-as-a-Service Security – Security Governance – Virtual Machine
Security – IAM –Security Standards.
UNIT-IV PART-A
1 What are challenges and risk of cloud security?
Cloud computing security challenges fall into three broad categories:
Data Protection: Securing your data both at rest and in transit
User Authentication: Limiting access to data and monitoring who accesses the data.
Disaster and Data Breach: Contingency Planning
2 List the security issues in cloud.
 Secure data transfer
 Secure software interfaces
 Secure stored data
 User access control
 Data separation
3 Define security governance.
Cloud services governance is a general term for applying specific policies or
principles to the use of cloud computing services. The goal of cloud services
governance is to secure applications and data when they are located remotely.
4 Define security awareness in cloud.
A common failure with securing the Cloud is that most organizations focus on only
the technical controls, such as where is the data stored or when and how is the data
encrypted. However, it is important to train and educate the people using this
technology or the organization may be exposed to tremendous risk.
5 What are the layers in security architecture design? (Nov/Dec 2022)
 User security and monitoring
 Information security – data
 Application level security
 Platform and infrastructure security

St. Joseph’s College of Engineering Page 14 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
6 What are the roles of security governance?
A Security steering committee should be developed whose objective is to focus on
providing guidance about security initiatives and alignment with business and IT
strategies. The role of security governance is that not to lack of attention to security
issues. The security issues can result in key needs of the business not being met, risk
management, security monitoring, application security and sales support.
7 List out the various VM threat levels.
Abnormally terminated
Partially compromised
Totally compromised
8 What is IAM?
Identity Access Management (IAM) is a critical function for every organization a
fundamental expectation n of SaaS customers is that the principle of least privilege is
granted to their data, where the principle states that only the minimum
access necessary to perform an operation should be granted, and that access should
be of minimum amount of time necessary
9 Define Globus Resource Allocation Manager. (Nov/Dec 2022)
Globus Resource Allocation Manager (GRAM) provides resource allocation, process
creation, monitoring, and management services. GRAM implementations map requests
expressed in a resource specification language (RSL) into commands to local schedulers
and computers.
10 “Data security is of major concern in the cloud”. What are key mechanisms for
protecting data.
The key mechanisms for protecting data are: Access Control, Auditing, Authentication,
Authorization
11 List the threats for cloud computing.
 Abuse and Nefarious Use of Cloud Computing
 Insecure Application Programming Interfaces
 Malicious Insiders
 Shared Technology Vulnerabilities
 Data Loss/Leakage
 Account, Service, and Traffic Hijacking
12 Define blue pill
The blue pill is malware that executes as a hypervisor to gain control of computer
resources. The hypervisor installs without requiring a restart and the computer
functions normally, without degradation of speed or services, which makes detection
difficult.
13 Define Data lineage
Data lineage is defined as a data life cycle that includes the data's origins and where it
moves over time. It describes what happens to data as it goes through diverse
processes. It helps provide visibility into the analytics pipeline and simplifies tracing

St. Joseph’s College of Engineering Page 15 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
errors back to their sources.
14 What are the host security threats in public IaaS
 Stealing keys used to access and manage hosts (e.g., SSH private keys)
 Attacking unpatched, vulnerable services listening on standard ports (e.g., FTP,
SSH)
 Hijacking accounts that are not properly secured (i.e., no passwords for standard
accounts)
 Attacking systems that are not properly secured by host firewalls
 Deploying Trojans embedded in the software component in the VM or within the
VM image (the OS) itself
15 List the Public Cloud Security Limitations
 There are limitations to the public cloud when it comes to support for custom
security features. Security requirements such as an application firewall, SSL
accelerator, cryptography, or rights management using a device that supports PKCS
12 are not supported in a public SaaS, PaaS, or IaaS cloud.
 Any mitigation controls that require deployment of an appliance or locally attached
peripheral devices in the public IaaS/PaaS cloud are not feasible.
16 Discuss on the application and use of identity and access management.
Identity and Access Management (IAM) is used to manage access to resources by
assuring that the identity of an entity is verified, then granting the correct level of
access based on the protected resources.
17 Mention the importance of Transport Level Security
Transport Level Security (TLS) entails SOAP messages conveyed over a network
connection protected by TLS. TLS provides for both integrity protection and piracy.
Transport Level Security is supported today as a higher performance alternative to the
more standard driven, message level security.
18 What are the various Challenges in building the trust environment?
Identification, Privacy, Personalization, Integration, Security, Scalability
19 Identify the trust model based on site’s trust worthiness.
 A user job demands the resource site to provide security assurance by issuing a
security demand (SD).
 On the other hand, the site needs to reveal its trustworthiness, called its trust
index (TI).
 These two parameters must satisfy a security-assurance condition: TI ≥ SD
during the job mapping process.
 When determining its security demand, users usually care about some
typical attributes.
20 State how CIA Triad plays a vital role in managing cloud security.
Confidentiality, integrity and availability, also known as the CIA triad, is a model
designed to guide policies for information security within an organization. The model
is also sometimes referred to as the AIC triad (availability, integrity and confidentiality)
to avoid confusion with the Central Intelligence Agency. The elements of the triad are

St. Joseph’s College of Engineering Page 16 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
considered the three most crucial components of security.
21 What is identity and access management in a cloud environment?
 Identity and Access Management (IAM) is the security discipline that enables
the right individuals to access the right resources at the right times for the right
reasons. IAM addresses the mission-critical need to ensure appropriate access to
resources across increasingly heterogeneous technology environments.
 Enterprises traditionally used on-premises IAM software to manage identity and
access policies, but nowadays, as companies add more cloud services to their
environments, the process of managing identities is getting more complex.
Therefore, adopting cloud-based Identity-as-a-Service (IDaaS) and cloud IAM
solutions becomes a logical step.
22 What is virtual machine security in cloud computing?
A common approach in Infrastructure-as-a-Service Clouds or virtualized
Grid computing is to provide virtual machines to customers to execute their software
on remote resources. Giving full super user permissions to customers eases the
installation and use of user software, but it may lead to security issues.
23 What are the challenges of intercloud? (Dec 21)
 Lack of interoperability
 Inflexible pricing model
 Compliance and regulatory challenge
 Monitoring and auditing
 Identity and Access Management
24 Define trust, reliability and privacy (Dec 21)
Trust: People can justifiably rely on computer-based systems to perform critical
functions securely, and on systems to process, store and communicate sensitive
information securely
Reliability: The system does what you want, when you want it to
Privacy: Within certain limits, no one should know who you are or what you do
25 What is meant by the terms data-in-transit?
It is the process of the transfer of the data between all of the versions of the original file,
especially when data may be in transit on the Internet. It is data that is exiting the
network via email, web, or other Internet protocols.
26 Define application level security
Most websites are secured at the network level while there may be security loopholes
at the application level which may allow information access to unauthorized users.
Software and hardware resources can be used to provide security to applications.
27 List out the six specific areas of the cloud computing environment
There are six specific areas of the cloud computing environment where equipment and
software require substantial security attention These six areas are:
(1) security of data at rest,
(2) security of data in transit,
(3) authentication of users/applications/ processes,
(4) robust separation n between data belonging to different customers,

St. Joseph’s College of Engineering Page 17 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
(5 ) cloud legal and regulatory issues, and
(6) incident response
28 Define Network Level Security.
Strong network traffic encryption techniques such as Secure Socket Layer (SSL) and
the Transport Layer Security (TLS) can be used to prevent leakage of sensitive
information. Several key security elements such as data security, data integrity,
authentication and authorization, data confidentiality, web application security,
virtualization vulnerability, availability, backup, and data breaches should be carefully
considered to keep the cloud up and running continuously.
29 Outline the requirements of VMM. (Dec 20)
The three elements to consider when selecting virtualization hardware include the
CPU, memory, and network I/O capacity.
 VMM should provide an environment for pro-grams which is essentially
identical to the original machine.
 Programs run in this environment should show, at worst, only minor decreases
in speed.
 VMM should be in complete control of the system resources.
30 Mention the foundational infrastructure requirements for cloud computing security.
The foundational infrastructure for a cloud must be inherently secure whether it is a
private or public cloud or whether the service is SAAS, PAAS or IAAS. It will require
• Inherent component-level security
• Stronger interface security
• Resource lifecycle management
31 Identify the uses of application security. (Dec 20)
Application security describes security measures at the application level that aim to
prevent data or code within the app from being stolen or hijacked. Application security
may include hardware, software, and procedures that identify or minimize security
vulnerabilities.
UNIT IV - PART B
1 Explain the Security challenges in cloud computing in detail. (Dec 21)
2 Explain the security architecture in detail.
3 Explain the following (i) Security governance (ii) Application security
4 Explain in detail about Software-as-a-Service security.
5 Discuss about the virtual machine security.
6 With a neat sketch describe IAM function architecture and the challenges in
implementing it for cloud computing. (Dec 21)(Nov/Dec 2022)
7 Briefly write a note on Authentication and Authorization methods
8 Write in detail about cloud security infrastructures
9 Explain the different level of Cloud Infrastructure security: network, host and
application level
10 Briefly discuss on Identity and access management architecture with neat architecture
SaaS, PaaS, IaaS availability in the cloud.
11 Write a detailed note on identity and access management architecture

St. Joseph’s College of Engineering Page 18 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
12 In today world, infrastructure security and data security is highly challenging at
network, host and application levels”. Justify and explain the several ways of
protecting the data at transit and at rest.
13 Describe the Secure Software Development Life Cycle with neat diagram. (Dec 20)
14 Analyze the methods for providing data security and virtual machine security in cloud.
(Dec 20)
15 Combine the role of a distributed file system in a job execution environment such as
MapReduce in a large-scale cloud system and explain in detail with suitable
illustrations. (Dec 20)
16 What is resource provisioning? Explain in detail about various methods for resource
provisioning with suitable diagram. (Nov/Dec 2022)
17 Illustrate the ten steps to evaluate cloud security standards in IT governance, industry
with an example. (Nov/Dec 2022)
Unit-V Cloud Technologies and Advancements
Hadoop – MapReduce – Virtual Box — Google App Engine – Programming Environment for
Google App Engine — Open Stack – Federation in the Cloud – Four Levels of Federation -
Federated Services and Applications – Future of Federation.
PART-A
1 What are the advantages of using Hadoop ?
Hadoop is an Apache open source framework written in java, allows distributed
processing of large datasets across cluster of computers, simple programming models
2 Define Map Reduce.
The Map Reduce software framework provides an abstraction layer with the data flow
and flow of control of users and hides implementation of all data flow steps such as
data partitioning mapping, synchronization, communication and scheduling. The data
flow is such framework is predefined the abstraction layer provides two well defined
interface in the form of two functions map and reduce.
3 What is the role of map function in Hadoop? (Nov/Dec 2022)
 Each map function receives the input data split as a set of (key, value) pairs to
process and produce the intermediated (key, value) pairs.
 Maps can also be used as a metaphor, and as such function as an index to other
Information.
4 What is the role of reduce function?
The reduce worker iterates over the grouped (key, value) pairs, and for each unique
key, it sends the key and corresponding values to the reduce function. Then this
function processes its input data and stores the output results in predetermined files in
the user’s program.
5 What are the features of HDFS?
HDFS (Hadoop Distributed File System) is a distributed file system. It is a core part of
Hadoop which is used for data storage. It is designed to run on commodity hardware.
Features of HDFS
Highly Scalable - HDFS is highly scalable as it can scale hundreds of nodes in a single
cluster.

St. Joseph’s College of Engineering Page 19 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
Replication - Due to some unfavorable conditions, the node containing the data may
be loss. So, to overcome such problems, HDFS always maintains the copy of data on a
different machine.
Fault tolerance - The HDFS is highly fault-tolerant that if any machine fails, the other
machine containing the copy of that data automatically becomes active.
Distributed data storage - This is one of the most important features of HDFS that
makes Hadoop very powerful. Here, data is divided into multiple blocks and stored
into nodes.
Portable - HDFS is designed in such a way that it can easily portable from platform to
another.
6 List out the Hadoop core fundamental layers
The Hadoop core is divided into two fundamental layers: Map Reduce engine and
HDFS.
The Map Reduce engine is the computation engine running on top of HDFS as its data
storage manager.
HDFS is a distributed file system inspired by GFS that organizes files and stores their
data on a distributed computing system.
7 How to delete file or directory in hadoop file system?
Use the delete() method on File System to permanently remove files or directories:
public boolean delete(Path f, boolean recursive) throws IO Exception
If f is a file or an empty directory, then the value of recursive is ignored. A nonempty
directory is only deleted, along with its contents, if recursive is true (otherwise an IO
Exception is thrown).
8 How to process globs in hadoop file system? (Dec 21)
Hadoop provides two File System methods for processing globs:
public File Status()glob Status(Path pathPattern) throws IO Exception
public File Status() glob Status(Path pathPattern, Path Filter filter) throws IO Exception
The glob Status() methods returns an array of File Status objects whose paths match
the supplied pattern, sorted by path. An optional Path Filter can be specified to restrict
the matches further.
9 Define iterative map reduce.
In MapReduce, the mapper has to wait for the process completion, but in iterative
MapReduce, the asynchronous execution of map tasks is allowed. The reducer
operates on the intermediate results, and for fault tolerance, it has to send output to
one or more mappers.
10 Define block replication.
The reliably store data in HDFS is the file blocks, it is replicated in this system. HDFS
store a file as a set of blocks and each block is replicated and distributed across the
whole cluster.
11 Define heart beat in Hadoop. What are the advantages of heart beat?
The heart beat are periodic messages sent to the name node by each data node in the
cluster. Receipt of a heartbeat implies that data mode is functioning properly while
each block report contains list of all blocks in a data mode. The name node receives
such messages because it is the sole decision maker of all replicas in the system.

St. Joseph’s College of Engineering Page 20 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024

12 Name the different modules in Hadoop framework.


 Hadoop Common – contains libraries and utilities needed by other Hadoop
modules;
 Hadoop Distributed File System (HDFS) – a distributed file-system that stores data
on commodity machines, providing very high aggregate bandwidth across the
cluster;
 Hadoop YARN – a platform responsible for managing computing resources in
clusters and using them for scheduling users' applications;
 Hadoop Map Reduce – an implementation of the Map Reduce programming
model for large-scale data processing.
 The Hadoop framework mostly written in the Java programming language, with
some native code in C and command line utilities written as shell scripts.
 Distributed, scalable, and portable file system in Java for the Hadoop framework.

13 ”HDFS is fault tolerant “. Is it true? Justify your answer.


Yes, HDFS is fault tolerant because when the system functions properly without any
data loss even if some hardware components of the system have failed. It is very hard
to reach cent percent fault tolerance but faults can be tolerated up to some extent. It is
one of the characteristics of HDFS.
14 How divide-and-conquer strategy does relate to Map Reduce paradigm?
Any useful Map Reduce architecture will have mountains of other infrastructure in
place to efficiently "divide", "conquer", and finally "reduce" the problem set. With a
large Map Reduce deployment these steps to partition the work, compute something,
and then finally collect all results is non-trivial.
15 Brief out the main components of Globus toolkit.
Computing / Processing Power (GRAM), Data Management (Grid FTP, DAI, RLS),
Monitoring/Discovery (MDS), Authorization/Security (CAS), In development: Tele
control (NTCP/GTCP), Metadata (MCS), Virtual Data (Chimera, Pegasus)
16 What is Google App?
Google Apps are a suite of web-based messaging and collaboration applications
that Google hosts on their own servers. Google provides these applications as a
"service," rather than as software to download and install.
17 State the basic types of federation.
There are four basic types of federation: 1)Permissive 2)Verified 3)Encrypted 4)Trusted
18 What is distributed system?
A distributed system is a system whose components are located on different
networked computers, which communicate and coordinate their actions by passing
messages to one another.

St. Joseph’s College of Engineering Page 21 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
19 How MapReduce framework executes user jobs?
 To begin, a user runs a MapReduce program on the client node which
instantiates a Job client object.
 Next, the Job client submits the job to the JobTracker.
 Then the job tracker creates a set of map and reduce tasks which get sent
to the appropriate task trackers.
 The task tracker launches a child process which in turns runs the map or
reduce task.
 Finally the task continuously updates the task tracker with status and
counters and writes its output to its context.
20 What is Google App used for?
Play Store is Google's official pre-installed app store on Android-certified devices. It
provides access to content on the Google Play Store, including apps, books, magazines,
music, movies, and television programs.
21 Define Cloud Federation
Cloud federation refers to the unionization of software infrastructure and platform
services from desperate networks that can be accessed by a client vis the internet. The
federation of cloud resources is facilitated through network gateways that connect
public or external clouds, private or internal clouds and/or community clouds;
creating a hybrid cloud computing environment. It is important to note that federated
cloud computing services still rely on the existence of physical data centers.
22 What are the benefits of Cloud federation?
 The federation of cloud resources allows client to optimize enterprise IT service
delivery.
 The federation of cloud resources allows a client to choose. The best cloud
service providers in terms of flexibility cost and availability of services to neat a
particular business or technological need within their organization.
 Federation across different cloud resources pools allows applications to run in
the most appropriate infrastructure environments.
23 Identify the development technologies currently supported by AppEngine.(Dec 20)
(Nov/Dec 2022)
Google App Engine primarily supports Go, PHP, Java, Python, Node. js, . NET, and
Ruby applications, although it can also support other languages via "custom runtimes".
24 What is VirtualBox in cloud computing? (Dec 21)
VirtualBox is open-source software for virtualizing the x86 computing architecture. It
acts as a hypervisor, creating a VM (virtual machine) in which the user can run another
OS (operating system). The operating system in which VirtualBox runs is called the
"host" OS.
25 Compare VMWare and VirtualBox
VMWare VirtualBox
It is a free and open-source hosted It is an organization that offers different
hypervisor that is designed and developed software and applications for
by Oracle Corporation. virtualization.
It provides virtualization at both hardware It provides virtualization at the only

St. Joseph’s College of Engineering Page 22 of 23


CS8791-Cloud Computing Department of CSE & IT 2023-2024
and software levels. hardware level.
provides snapshots, which implies it can Snapshots are only available in
save and restore a virtual machine's state. premium virtualization products and
not with VMware Workstation Player.
26 Outline the map and reduce functions.
Map Function
Each Map function receives the input data split as a set of (key, value) pairs to process
and produce the intermediated (key, value) pairs. Maps can also be used as a
metaphor, and as such function as an index to other Information.
Reduce function
The reduce worker iterates over the grouped (key, value) pairs, and for each unique
key, it sends the key and corresponding values to the Reduce function. Then this
function processes its input data and stores the output results in predetermined files in
the user’s program.
UNIT-V PART-B
1 Give a detailed note on Hadoop framework.
2 Explain the architecture of Map Reduce in Hadoop?
3 Explain the dataflow and control flow of Map Reduce
4 Describe in detail about the dataflow of file read in HDFS.
5 Explain reading data from a Hadoop URL and deleting Data
6 Short notes on a) File pattern in HDFS b) Path filter
7 a) Explain in detail about command line interface in HDFS,
b) Discuss MAPREDUCE with suitable diagrams.
8 With an illustration, emphasize the significance of Map Reduce paradigm in Hadoop
frame work. And processing the data based on divide-and-conquer strategy.
9 What is Google App explain the architecture of Google App Engine in detail?
10 i) Explain cloud federation and Implementation.
ii)How cloud federation addresses the limitations in cloud computing
11 Explain the main components of Globus Toolkit (GT4) architecture. With a neat sketch,
explain the different types of services offered by GT4 architecture. (Dec 21)
12 i. Illustrate the functional Modules of GAE (Dec 20)
ii. Discuss in detail about GAE Applications
13 List the four levels of cloud federation and explain in detail about the four levels of
federation levels. (Dec 20, 21, Nov/Dec 2022)
14 Create a Successful Google application and deploy it in GAE along with google’s cloud
data storage facility for App Engine developers (Dec 21)(Nov/Dec 2022)

St. Joseph’s College of Engineering Page 23 of 23

You might also like