Cloud Computing
Cloud Computing
PART A
● Security concerns in cloud computing include data breaches, data loss, account
hijacking, insecure APIs, and system vulnerabilities.
22. Discuss the regulatory issues of cloud computing and government policies.
● Regulatory issues in cloud computing revolve around data privacy laws, compliance
with industry-specific regulations (like GDPR), cross-border data flow, and local data
storage policies. Governments implement frameworks to ensure data security and
proper handling of cloud services.
23. Define the 5 layers of the Cloud Computing architecture in brief.
● Physical layer: The hardware (servers, storage).
● Virtual layer: Virtualization of resources.
● Control layer: Management of virtual resources.
● Application layer: Delivery of applications.
● Business layer: Cloud services (IaaS, PaaS, SaaS).
24. Explain in detail about the cloud delivery model.
● The cloud delivery model comprises three main service models: IaaS (Infrastructure
as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). Each
offers varying levels of abstraction and control over infrastructure, platform, and
application management.
25. Discuss the operational and economic benefits of SaaS.
● SaaS offers cost savings (as no hardware or software maintenance is needed),
flexibility (anytime, anywhere access), and scalability, which reduces the need for
companies to invest in infrastructure.
26. Explain in detail the various aspects of the need for virtualization in cloud
computing.
● Virtualization optimizes resource use, enables scalability, reduces hardware costs,
enhances disaster recovery, and facilitates easier management of infrastructure in
cloud environments.
27. Write short notes on (i) Software virtualization (ii) Network virtualization.
● Software virtualization: Allows running multiple operating systems on a single
physical machine using software like hypervisors.
● Network virtualization: Combines hardware and software network resources into a
single software-based entity, making it easier to manage and scale.
28. Discuss the design considerations for a storage network.
● Storage network design considerations include scalability, data redundancy, fault
tolerance, high availability, and the use of network-attached storage (NAS) or storage
area networks (SAN).
29. Explain in detail about object storage.
● Object storage is a data storage architecture that manages data as objects, typically
used for storing large, unstructured data. It offers benefits like scalability and
metadata management but has disadvantages, such as slower data retrieval times
compared to traditional file systems.
30. Write short notes on (i) Brokered cloud storage access (ii) Storage location and
tenancy.
● Brokered cloud storage access: Refers to intermediaries that manage access to
cloud storage services on behalf of clients.
● Storage location and tenancy: Refers to where data is physically stored in the
cloud and whether it's in a single-tenant or multi-tenant environment.
31. Explain virtualization security management.
● Virtualization security management involves securing virtual machines (VMs) and
hypervisors from vulnerabilities, ensuring proper isolation between VMs, and
maintaining the security of data flowing within virtualized environments.
32. Explain briefly about virtual threats.
● Virtual threats in cloud environments include hypervisor vulnerabilities, VM escapes,
data breaches, and insecure VM migration.