0% found this document useful (0 votes)
70 views

Spring 2023 - CS435 - Assignment - 2

This document provides instructions for Assignment No. 02 on Cloud Computing. The objectives are to learn about the CIAAA Triad, use CloudSim simulator, and learn computer security basics. Students must install CloudSim, modify an example file with their ID, run the simulation, and take an output snapshot. They must also answer two multiple choice questions about the CIAAA Triad concepts of confidentiality, integrity, availability, authentication, and authorization. The assignment is due on October 7th, 2023 and must follow formatting instructions to receive credit.

Uploaded by

Qasim Khan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

Spring 2023 - CS435 - Assignment - 2

This document provides instructions for Assignment No. 02 on Cloud Computing. The objectives are to learn about the CIAAA Triad, use CloudSim simulator, and learn computer security basics. Students must install CloudSim, modify an example file with their ID, run the simulation, and take an output snapshot. They must also answer two multiple choice questions about the CIAAA Triad concepts of confidentiality, integrity, availability, authentication, and authorization. The assignment is due on October 7th, 2023 and must follow formatting instructions to receive credit.

Uploaded by

Qasim Khan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment No.

02 Total Marks: 30
Semester: Spring 2023
CS435: Cloud Computing Due Date: 10/07/2023

Objective:

The objective of this assignment is to enhance the learning capabilities of the students about :

 CIAAA Triad
 Explore and practice the features of Cloud Sim Simulator
 Computer Security Basics

Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if:
 The assignment is submitted after due date.
 The assignment is not in the required format (.doc or .docx)
 The submitted assignment does not open or file is corrupt.
 Assignment is copied (partial or full) from any source (websites, forums, students, etc)
Assignment

Question No. 1 Total Marks: 20

Cloud Sim is a simulation environment. It is more suitable for testing various new and updated procedures and
hypothesizes related to Cloud computing.

What is Required:

 You are required to install Cloud Sim on your computer / Laptop.


 Modify Example 1 i.e., CloudSimExample1.java as below
 Name datacenter as your student ID e.g., if your student ID is BC11223344 then your datacenter name should be
“Datacenter_BC11223344”
 Set the Cloudlet length property as to the digits in your student ID e.g., if your student ID is BC11223344 then
length property of Cloudlet should be equal to 11223344
 Next, run the Simulation Example 1 and take the output snapshot as below.

For Cloud Sim configuration, you are required to download following software.
1. Commons-math3-3.6.1.jar
2. Eclipse IDE for Java Developers
3. JDK Development Kit 17.0.7 downloads
4. Cloudsim-3.0.3

(Download links & Step by Step installation process is given in helping guide, attached with assignment file)
Question No. 2 Total Marks: 10

Confidentiality, integrity, availability, authentication, and authorization are five fundamental concepts in
Information Security. They are collectively referred to as the CIAAA Triad.
Select the appropriate option from CIAAA.

Description Correct Option

Refers to the protection and preservation of


sensitive information from unauthorized access,
use, or disclosure.

Refers to the quality of being honest, upright, and


adhering to strong moral principles and values. It
encompasses having a strong sense of ethics,
truthfulness, and reliability in one's actions,
words, and character.

Refers to the state or condition of being


accessible, present, or ready for use.

The process of verifying the identity or validity of


a user, system, or entity. It ensures that the
claimed identity or credentials are accurate and
authorized for access or interaction.

The process of granting or restricting access rights


and permissions to users or entities based on
their authenticated identity and specified
privileges.

Best of Luck!

You might also like