Mod3 and Mod4 cloud computing
Mod3 and Mod4 cloud computing
Here are the answers to Module 3 questions in greater detail, strictly from the documents:
MODULE-4
Answers for Module 4 (Strictly from the documents)
4. Privacy
Privacy in cloud computing involves safeguarding sensitive user data from unauthorized access or
misuse:
Major Concerns:
1. Lack of Control: Users lose direct control over where and how data is stored.
2. Secondary Use: CSPs may use data for purposes such as targeted advertising.
3. Data Proliferation: Dynamic provisioning and outsourcing make tracking data
difficult.
Legislative Challenges: Different countries have varying privacy regulations, complicating
compliance for global CSPs.
Best Practices: Encrypting sensitive data and evaluating CSP privacy policies can mitigate
risks.
5. Trust
Trust in cloud computing is vital due to the shared and outsourced nature of services:
Trust Factors:
o Persistent trust is based on long-term behavior and proven reliability.
o Dynamic trust depends on current conditions and context.
Challenges:
o The anonymity and lack of identity transparency in online environments hinder trust.
o Users rely on CSP credentials, policies, and reputation for assurance.
Mechanisms to Foster Trust:
Access control and identity verification.
Intrusion detection and logging for accountability.
8. Security of Virtualization
Virtualization enables multiple VMs to run on shared physical infrastructure, but this introduces risks:
Challenges:
o Malicious VMs exploiting hypervisor flaws.
o Lack of transparency in resource allocation.
Best Practices:
o Regular hypervisor patching.
o Monitoring VM-to-VM communications for unusual activities.
9. Security Risks Posed by Shared Images
Shared VM images used in cloud environments can introduce vulnerabilities:
Risks:
o Malware or backdoors embedded in shared images.
o Outdated or unpatched software within images.
Mitigation:
o Thoroughly verify and scan shared images before use.
o Update and manage VM images periodically.