Cloud Computing Course Code: 4360709
Cloud Computing Course Code: 4360709
Cloud Computing Course Code: 4360709
1. RATIONALE
This course aims students to understand the hardware, software concepts and architecture of cloud
computing. Students realize the importance of Cloud Virtualization, Abstractions and Enabling
Technologies.
2. COMPETENCY
Demonstrate comprehensive understanding, practical proficiency, and effective
communication in cloud computing concepts, architectures, deployment models,
virtualization, and security measures, while collaborating to propose and implement real-
world cloud solutions.
The student will develop underpinning knowledge of competency for implementing various
applications using cloud computing to attain the following course outcomes.
3 - 2 4 30 70 25 25 150
(*): Out of 30 marks under the theory CA, 10 marks are for assessment of the micro-project
to facilitate integration of COs and the remaining 20 marks is the average of 2 tests to be
taken during the semester for the assessing the attainment of the cognitive domain UOs
required for the attainment of the COs.
Legends: L-Lecture; T – Tutorial/Teacher Guided Theory Practice; P -Practical; C – Credit, CA -
Continuous Assessment; ESE -End Semester Examination.
Approx.
S. Unit
Practical Outcomes (PrOs) Hrs.
No. No.
required
Total 28
Note
i. MoreCase Studiescan be designed and offered by the respective course teacher to develop
the industry relevant skills/outcomes to match the COs. The above table is only a
suggestive list.
ii. The following are some sample ‘Process’ and ‘Product’ related skills (more may be
added/deleted depending on the course) that occur in the above listed Practical Exercises
of this course required which are embedded in the COs and ultimately the competency.
Total 100
S. PrO. No.
Equipment Name with Broad Specifications
No.
The ADOs are best developed through the laboratory/field-based exercises. Moreover, the
level of achievement of the ADOs according to Krathwohl’s ‘Affective Domain Taxonomy’
should gradually increase as planned below:
i. ‘Valuing Level’ in 1st year
ii. ‘Organization Level’ in 2nd year.
iii. ‘Characterization Level’ in 3rd year.
8. UNDERPINNING THEORY
Only the major Underpinning Theory is formulated as higher-level UOs of Revised Bloom’s
taxonomy in order development of the COs and competency is not missed out by the
students and teachers. If required, more such higher-level UOs could be included by the
course teacher to focus on the attainment of COs and competency.
Unit Unit Outcomes (UOs) Topics and Sub-topics
Unit – I 1.1Describe basic concept of 1.1.1 cloud computing
Introduction to Cloud Computing and its About cloud
Cloud applications About computing
Computing 1.2Advantages and Definition of cloud computing
Disadvantages of Cloud Central Ideas Behind Cloud
Computing Computing
1.1.2 Characteristics of Cloud
Computing
1.1.3 Challenges of Cloud Computing
1.1.4 Novel Applications of cloud
computing
1.1.5 Security risk of cloud computing
1.2.1 Advantages and Disadvantages
of Cloud Computing
Unit – II 2.1Describe cloud computing 2.1.1 Introduction Cloud Computing
Cloud architecture Architecture
Computing 2.2Describe various cloud 2.1.2 Components of Cloud Computing
Architecture & deployment model Architecture
Deployment 2.3Compare and contrast ● Client Infrastructure
Model different cloud deployment ● Cloud access device
models, including public, ● Application
private, hybrid, and community ● Services
clouds. ● Runtime cloud
● storage
● Infrastructure
● Security
2.2.1 Types of Cloud Deployment
Model
● Public cloud:
Brief Introduction
Advantages and
Disadvantages
● Private cloud:
Brief Introduction
Advantages and
Disadvantages
● Hybrid cloud:
Brief Introduction
Advantages and
Disadvantages
● Community cloud:
Brief Introduction
Advantages and
Disadvantages
2.3.1 Key drivers to adopting the cloud
(Xen, VMM)
Unit– V 5.1 Conduct a security risk 5.1.1 Infrastructure Security
Security and assessment for a cloud ● The Network level
Privacy Issues infrastructure, identifying ● The Host level
in Cloud vulnerabilities and ● The Application Level
Computing proposing mitigation 5.2.1 Data Security and storage
strategies. 5.2.2Privacy issue
5.2 Perform a privacy impact 5.2.3Data Life Cycle
assessment for a cloud- 5.2.4Key Privacy concern in the cloud
based application, 5.2.5Protecting Privacy
considering data life cycle
and key privacy concerns.
Note: The UOs need to be formulated at the ‘Application Level’ and above of Revised Bloom’s
Taxonomy’ to accelerate the attainment of the COs and the competency.
IV Virtualization 10 5 6 6 17
Total 42 22 24 24 70
Legends: R=Remember, U=Understand, A=Apply and above (Revised Bloom’s taxonomy)
Note: This specification table provides general guidelines to assist students for their learning
and to teachers to teach and question paper designers/setters to formulate test
items/questions assess the attainment of the UOs. The actual distribution of marks at
different taxonomy levels (of R, U and A) in the question paper may vary slightly from the
above table.
prepare reports of about 5 pages for each activity, also collect/record physical evidences for
their (student’s) portfolio which will be useful for their placement interviews:
a) Create cloud computing concept map
b) Arrange a debate on security risks
c) Deployment model comparison
d) Service model simulation
e) Privacy policy analysis
1 Cloud Computing: Concepts, Technology & Thomas Erl , Ricardo Pearson Service
Architecture Puttini , Zaigham Technology
Mahmood ISBN(9780133387520)
4 Cloud Computing: SaaS, PaaS, IaaS, Kris Jamsa Jones & Bartlett
Virtualization, Business Models, Mobile, Learning
Security and More ISBN (978-9380853772)
5 Cloud Computing: Master the Concepts, Kamal Kant Hiran, BPB Publications
Architecture and Applications with Real- Ruchi Doshi, Temitayo ISBN (978-9388511407)
world examples and Case studies Fagbola, Mehul
Mahrishi, Dr Maria-
Alexandra Paun,
Deepak Modi
Competency
Demonstrate comprehensive understanding, practical proficiency, and effective communication in cloud computing concepts,
architectures, deployment models, virtualization, and security measures, while collaborating to propose and implement real-
world cloud solutions.
Course Outcomes
a) To describe the principles and
2 - - - - - 1
paradigm of Cloud Computing
d) To evaluate various
virtualization technologies and 2 2 2 2 2 2 2
methods
e) To implement comprehensive
security measures, ensuring
2 2 1 1 2 2 2
the security and privacy of
data
Legend: ‘3’ for high, ‘2’ for medium, ‘1’ for low or ‘-’ for the relevant correlation of each competency, CO, with PO/ PSO
Sr. Contact
Name and Designation Institute Email
No. No.
Government
Miss. Kumundrini B. Prajapati
3 Polytechnic 9974543026 [email protected]
Lecturer Gandhinagar
Government
Mrs. Khushbu Smit Shrimankar
4 Polytechnic for Girls, 7405544535 [email protected]
Lecturer Ahmedabad