0% found this document useful (0 votes)
25 views39 pages

Mimp Gtu - CC

The document outlines important questions related to Cloud Computing for a semester course, including applications, definitions, characteristics, advantages, disadvantages, security risks, and architecture of cloud computing. It provides detailed insights into various use cases such as big data analytics, disaster recovery, and the benefits of IaaS and PaaS. Additionally, it addresses potential security risks like data loss and account hijacking, and describes the architecture of cloud computing, including frontend and backend components.

Uploaded by

ppriyansh705
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views39 pages

Mimp Gtu - CC

The document outlines important questions related to Cloud Computing for a semester course, including applications, definitions, characteristics, advantages, disadvantages, security risks, and architecture of cloud computing. It provides detailed insights into various use cases such as big data analytics, disaster recovery, and the benefits of IaaS and PaaS. Additionally, it addresses potential security risks like data loss and account hijacking, and describes the architecture of cloud computing, including frontend and backend components.

Uploaded by

ppriyansh705
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Cloud Computing MIMP Subject Code: 4360709

VPMP POLYTECHNIC, GANDHINAGAR


DEPARTMENT OF COMPUTER ENGINEERING
Sub: Cloud Computing (4360709) Semester: 6
Important questions list
1. List applications of cloud computing. (CO-1)
How is the cloud actually used? modern public clouds have been applied across countless use
cases, such as the following:

 Testing and development. Ready-made, tailored environments can expedite


timelines and milestones.
 Production workload hosting. Organizations are using the public cloud to host live
production workloads. This requires careful design and architecture of cloud
resources and services needed to create an adequate operational environment for the
workload and its required level of resilience.
 Big data analytics. Remote data centers through cloud storage are flexible and
scalable and can provide valuable data-driven insights. Major cloud providers offer
services tailored to big data analytics and projects, such as Amazon EMR and Google
Cloud Dataproc.
 IaaS. IaaS lets companies host IT infrastructures and access compute, storage and
network capabilities in a scalable manner. Pay-as-you-go subscription models are
cost-effective, as they can help companies save on upfront IT costs.
 PaaS. PaaS can help companies develop, run and manage applications more easily
and flexibly, at a lower cost than maintaining a platform on premises. PaaS services
can also increase the development speed for applications and enable higher-level
programming.
 Hybrid cloud. Organizations have the option to use the appropriate cloud -- private
or public -- for different workloads and applications to optimize cost and efficiency
according to the circumstance.

Prepared By: Department of Computer Engineering Page 1


Cloud Computing MIMP Subject Code: 4360709

 Multi-cloud. Using multiple different cloud services from separate cloud providers
can help subscribers find the best cloud service fit for diverse workloads with specific
requirements.
 Storage. Large amounts of data can be stored remotely and accessed easily. Clients
only have to pay for storage that they actually use.
 Disaster recovery. Cloud offers faster recovery than traditional on-premises DR.
Furthermore, it's offered at lower costs.
 Data backup. Cloud backup options are generally easier to use. Users don't have to
worry about availability and computing capacity, and the cloud provider manages
data security.
 Artificial intelligence as a service. Cloud computing lets individuals without formal
knowledge or expertise in data sciences reap the benefits of AIaaS. For example, a
web developer might create a facial recognition app with their web development
skills. AI is available as a service in the cloud and accessible via the API. This lets
users automate routine tasks, saving time and personnel costs. Businesses can also
enhance decision-making by using AI to predict outcomes based on historical
datasets.
 Internet of things. Cloud computing simplifies the processing and management of
data from IoT devices. Cloud platforms offer the scalability and processing capacity
required to handle the enormous amounts of data produced by IoT devices,
facilitating real-time analytics and decision-making. For example, an IoT device
system such as Google Nest or Amazon Alexa can collect data on how much energy
is used inside a smart home. The device can then use cloud computing to analyze the
gathered data and make recommendations to the homeowner on how to reduce energy
consumption.

2. Define cloud computing and list characteristics of cloud computing. ( CO-1)

Prepared By: Department of Computer Engineering Page 2


Cloud Computing MIMP Subject Code: 4360709

 Cloud computing is the on-demand availability of computer system resources, especially


data storage (cloud storage) and computing power, without direct active management by
the user.

 Following are the characteristics of Cloud Computing:


1. Resources Pooling

This means that the Cloud provider used a multi-leaner model to deliver the computing
resources to various customers. There are various allocated and reassigned physical and
virtual resources, which rely on customer demand. In general, the customer has no
control or information about the location of the resources provided, but can choose
location on a higher level of abstraction.
2. On-Demand Self-Service

This is one of the main and useful advantages of Cloud Computing as the user can track
server uptimes, capability and network storage on an ongoing basis. The user can also
monitor computing functionalities with this feature.
3. Easy Maintenance

The servers are managed easily and the downtime is small and there are no downtime
except in some cases. Cloud Computing offers an update every time that increasingly
enhances it. The updates are more system friendly and operate with patched bugs faster
than the older ones.
4. Large Network Access

The user may use a device and an Internet connection to access the cloud data or upload
it to the cloud from anywhere. Such capabilities can be accessed across the network and
through the internet.
5. Availability

The cloud capabilities can be changed and expanded according to the usage. This review
helps the consumer to buy additional cloud storage for a very small price, if necessary.
6. Automatic System

Cloud computing analyzes the data required automatically and supports a certain service
level of measuring capabilities. It is possible to track, manage and report the usage. It
provides both the host and the customer with accountability.
7. Economical

It is a one-off investment since the company (host) is required to buy the storage, which
can be made available to many companies, which save the host from monthly or annual
costs. Only the amount spent on the basic maintenance and some additional costs are
much smaller.
8. Security

Prepared By: Department of Computer Engineering Page 3


Cloud Computing MIMP Subject Code: 4360709

Cloud Security is one of cloud computing's best features. It provides a snapshot of the
data stored so that even if one of the servers is damaged, the data cannot get lost. The
information is stored on the storage devices, which no other person can hack or use. The
service of storage is fast and reliable.
9. Pay as you go

Users only have to pay for the service or the space in cloud computing. No hidden or
additional charge to be paid is liable to pay. The service is economical and space is often
allocated free of charge.
10. Measured Service

Cloud Computing resources that the company uses to monitor and record. This use of
resources is analyzed by charge-per-use capabilities. This means that resource use can be
measured and reported by the service provider, either on the virtual server instances
running through the cloud. You will receive a models pay depending on the
manufacturing company's actual consumption.

3. Write advantages and disadvantages of cloud computing. (CO-1)


 Advantages of Cloud Computing
 Cost efficiency:
 The biggest reason behind companies shifting to Cloud Computing is that it takes
considerably lesser cost than any on-premise technology. Now, companies need not store
data in disks anymore as the cloud offers enormous storage space, saving money and
resources.
 High speed
 Cloud Computing lets us deploy the service quickly with fewer clicks. This quick
deployment lets us get the resources required for our system within minutes.
 Excellent accessibility
 Storing information in the cloud allows us to access it anywhere and anytime, regardless
of the machine making it a highly accessible and flexible technology of the present time.
 Back-up and restore data
 Once data is stored in the cloud, it is easier to get its backup and recovery, which is quite
a time-consuming process in on-premise technology.
 Manageability
 Cloud Computing eliminates the need for IT infrastructure updates and maintenance
since the service provider ensures timely, guaranteed, and seamless delivery of our
services and also takes care of all the maintenance and management of our IT services
according to the service-level agreement (SLA).
 Sporadic batch processing
 Cloud computing lets us add or subtract resources and services according to our needs.
So, if the workload is not 24/7, we need not worry about the resources and services
getting wasted, and we won’t end up stuck with unused services.

Prepared By: Department of Computer Engineering Page 4


Cloud Computing MIMP Subject Code: 4360709

 Strategic Edge
 Cloud computing provides a company with a competitive edge over its competitors when
it comes to accessing the latest and most mission-critical applications that it needs
without having to invest its time and money in its installations.
 Easy implementation
 With cloud hosting, businesses can retain the same applications and processes without
having to deal with the backend technicalities. Cloud infrastructure can be accessed
easily.
 No hardware required
 Since the cloud hosts everything, there is no requirement for a physical storage center.
However, a backup is recommended for disaster management and business continuity.
 Automatic Software Integration
 In the cloud, software integration occurs automatically. No additional efforts are
necessary for the customization and integration of applications to meet preferences.
 Reliability
 Cloud hosting comes with the biggest advantage of reliability. One doesn’t have to worry
about changes due to instant updates.
 Mobility
 Employees working on-premises or from remote locations can easily access all the cloud
services as long as they have an internet connection.
 Unlimited storage capacity
 The cloud comes with an almost limitless storage capacity, which can be expanded at any
time for a very nominal monthly fee.

 Disadvantages of Cloud Computing


 Vulnerability to attacks
 Storing data in the cloud may pose serious challenges in terms of information theft since
every company’s data is online. A security breach is something that even the best
organizations have suffered from, and it’s a potential risk in the cloud as well. Although
advanced security measures are deployed on the cloud, still storing confidential data in
the cloud can be a risky affair, and hence vulnerability to attacks shall be considered.
 Network connectivity dependency
 Cloud computing is entirely dependent on the Internet. This direct tie-up with the Internet
means that a company needs to have reliable and consistent Internet service as well as a
fast connection and bandwidth to reap the benefits of cloud computing.
 Downtime
 Downtime is considered as one of the biggest potential downsides of using cloud
computing. Cloud providers may sometimes face technical outages that can happen due
to various reasons, such as loss of power, low Internet connectivity, data centers going
out of service for maintenance, etc. This can lead to temporary downtime in the cloud
service.
 Vendor lock-in
 When a company needs to migrate from one cloud platform to another, it might face
some serious challenges because of the differences between vendor platforms. Hosting
and running the applications of the current cloud platform on some other platform may

Prepared By: Department of Computer Engineering Page 5


Cloud Computing MIMP Subject Code: 4360709

cause support issues, configuration complexities, and additional expenses. The


company’s data might also be left vulnerable to security attacks due to compromises that
might have been made during migrations.
 Limited control
 Cloud customers may face limited control over their deployments. Cloud services run on
remote servers that are completely owned and managed by service providers, which
makes it hard for the companies to have the level of control that they would want over
their back-end infrastructure.
 No Redundancy
 A cloud server is not redundant or backed up. Although it is an extra expense, make sure
to invest in a redundancy plan as in most cases, it will be well worth it. Technology does
sometimes seem to fail.
 Bandwidth issues
 For better performance, it is advisable not to pack large numbers of storage devices and
servers into a small set of data centers. The additional charges could, however, be
significantly costly.
 Lacks Support
 Cloud computing companies do not provide proper support to their customers and expect
them to depend on FAQs or online help.
 Varied Performances
 In a cloud environment, applications run on the server, which also provides resources to
other businesses. This means that any attack or harmful activity by a tenant could affect
the performance of the shared resources.

4. Explain security risk of cloud computing. (CO-1)

1. Data Loss:

 Data loss is the most common cloud security risks of cloud computing. It is also
known as data leakage. Data loss is the process in which data is being deleted,
corrupted, and unreadable by a user, software, or application. In a cloud
computing environment, data loss occurs when our sensitive data is somebody
else's hands, one or more data elements can not be utilized by the data owner,
hard disk is not working properly, and software is not updated.

2. Hacked Interfaces and Insecure APIs:

 As we all know, cloud computing is completely depends on Internet, so it is


compulsory to protect interfaces and APIs that are used by external users. APIs
are the easiest way to communicate with most of the cloud services. In cloud
computing, few services are available in the public domain. These services can be
accessed by third parties, so there may be a chance that these services easily
harmed and hacked by hackers.

Prepared By: Department of Computer Engineering Page 6


Cloud Computing MIMP Subject Code: 4360709

3. Data Breach:

 Data Breach is the process in which the confidential data is viewed, accessed, or
stolen by the third party without any authorization, so organization's data is
hacked by the hackers.

4. Vendor lock-in:

 Vendor lock-in is the of the biggest security risks in cloud computing.


Organizations may face problems when transferring their services from one
vendor to another. As different vendors provide different platforms, that can cause
difficulty moving one cloud to another.

5. Increased complexity strains IT staff:

 Migrating, integrating, and operating the cloud services is complex for the IT
staff. IT staff must require the extra capability and skills to manage, integrate, and
maintain the data to the cloud.

6. Spectre & Meltdown:

 Spectre & Meltdown allows programs to view and steal data which is currently
processed on computer. It can run on personal computers, mobile devices, and in
the cloud. It can store the password, your personal information such as images,
emails, and business documents in the memory of other running programs.

7. Denial of Service (DoS) attacks:

 Denial of service (DoS) attacks occur when the system receives too much traffic
to buffer the server. Mostly, DoS attackers target web servers of large
organizations such as banking sectors, media companies, and government
organizations. To recover the lost data, DoS attackers charge a great deal of time
and money to handle the data.

8. Account hijacking:

 Account hijacking is a serious security risk in cloud computing. It is the process


in which individual user's or organization's cloud account (bank account, e-mail
account, and social media account) is stolen by hackers. The hackers use the
stolen account to perform unauthorized activities.

5. Explain cloud computing architecture in detail with diagram. (CO-2)


 Cloud Computing Architecture is a combination of components required for a Cloud
Computing service.

Prepared By: Department of Computer Engineering Page 7


Cloud Computing MIMP Subject Code: 4360709

 A Cloud computing architecture consists of several components like a frontend platform,


a backend platform or servers, a network or Internet service, and a cloud-based delivery
service.
 The cloud architecture is divided into 2 parts
1. Frontend:
 It is a GUI (Graphical User Interface) which is use by user side.
 The front end consists of the client part of a cloud computing system.
 It comprises interfaces and applications that are required to access the Cloud
computing or Cloud programming platform.
 The front end includes web servers (Chrome, Firefox, Opera, etc.), clients, and
mobile devices.

2. Backend :
 The back end refers to the cloud itself, it provides the resources required for cloud
computing services.
 It consists of virtual machines, servers, data storage, security mechanisms, traffic
control mechanisms, etc.
 It is under the provider’s control.

Fig. Cloud Computing Architecture

 Components of Cloud Computing Architecture

1. Client Infrastructure

 Client Infrastructure is a Front end component.


 It provides GUI (Graphical User Interface) to interact with the cloud.

Prepared By: Department of Computer Engineering Page 8


Cloud Computing MIMP Subject Code: 4360709

2. Cloud access device

 Cloud access devices enables users to access their files and data from the cloud,
providing convenience and flexibility.
 Smartphone, Tablet, Mobile… devices can connect to cloud storage services through
dedicated applications.

3. Application

 Application in backend refers to a software or platform to which client accesses.


 Means it provides the service in backend as per the client requirement.

4. Services

 The service component manages which type of service you can access according to the
client’s requirements.
 Three Cloud computing services are:

 Software as a Service (SaaS)


 Platform as a Service (PaaS)
 Infrastructure as a Service (IaaS)

5. Runtime cloud

 Runtime cloud in backend provides the execution and Runtime platform/environment to


the Virtual machine.

6. Storage

 Storage is another important Cloud computing architecture component.


 It provides a large amount of storage capacity in the Cloud to store and manage data.

7. Infrastructure

 It offers services on the host level, network level, and application level.
 Cloud infrastructure includes hardware and software components like servers, storage,
network devices, virtualization software, and various other storage resources that are
needed to support the cloud computing model.

8. Security
 Security is an in-built back end component of cloud computing.
 It implements a security mechanism in the back end.
 It secures cloud resources, systems, files, and infrastructure to end-users in the backend.

9. Management.
 It is use to manage all the components in back-end.

Prepared By: Department of Computer Engineering Page 9


Cloud Computing MIMP Subject Code: 4360709

6. List types of cloud deployment models and explain any one in detail. (CO-2)
Types of Cloud Deployment Model

 Deployment is movement of software, hardware ,computing resources, processing power


to remote servers on internet.
 Cloud Deployment Model acts as a virtual computing environment that offers a choice of
deployment model according to how much data users want to store and who will have
access to the infrastructure.
 It signifies how servers are deployed and provisioned over the internet so that various
organizations and companies can access these servers without configuring them.
 Different types of cloud computing deployment models are as below.

1) Public cloud
2) Private cloud
3) Hybrid cloud
4) Community cloud

Public cloud:

 Public cloud As the name suggests, this type of cloud deployment model supports all
users who want to make use of a computing resource, such as hardware (OS, CPU,
memory, storage) or software (application server, database) on a subscription basis.
 The public cloud makes it possible for anybody to access systems and services.
 The public cloud is one in which cloud infrastructure services are provided over the
internet to the general people or major industry groups.
 The infrastructure in this cloud model is owned by the entity that delivers the cloud
services, not by the consumer.
 It is a type of cloud hosting that allows customers and users to easily access systems and
services.
 This form of cloud computing is an excellent example of cloud hosting, in which service
providers supply services to a variety of customers.
 In this arrangement, storage backup and retrieval services are given for free, as a
subscription, or on a per-user basis. For example, Google App Engine etc.

Prepared By: Department of Computer Engineering Page 10


Cloud Computing MIMP Subject Code: 4360709

Advantages of the Public Cloud Model

 Minimal Investment: Because it is a pay-per-use service, there is no substantial


upfront fee, making it excellent for enterprises that require immediate access to
resources.
 No setup cost: The entire infrastructure is fully subsidized by the cloud service
providers, thus there is no need to set up any hardware.
 Infrastructure Management is not required: Using the public cloud does not
necessitate infrastructure management.
 No maintenance: The maintenance work is done by the service provider (not users).
 Dynamic Scalability: To fulfill your company’s needs, on-demand resources are
accessible.

Disadvantages of the Public Cloud Model

 Less secure: Public cloud is less secure as resources are public so there is no
guarantee of high-level security.
 Low customization: It is accessed by many public so it can’t be customized according
to personal requirements.

7. Explain key drivers for adapting cloud computing. (CO-2)


1. Cost Savings

 On-premise solutions are often quite expensive, with various costs adding up.
 These include necessary hardware and implementation costs along with costs related to
continuous management and updating required from in-house personnel.

Prepared By: Department of Computer Engineering Page 11


Cloud Computing MIMP Subject Code: 4360709

 Moving to the cloud, on the contrary, gives organizations the benefit of eliminating the
high cost of hardware and installation as it allows them to opt for a subscription-based
model that suits their budget.
 Most cloud solutions provide enterprises with the ability to pay for exactly what they
need instead of paying for unwanted or unused services.

2.Security

 User data is more secure on cloud as compare to physical device.


 The service providers ensure along with all the new and exciting features entail an
update in security through audit and compliance.
 To further enhance clients satisfactory, all activities on the cloud will be closely
monitored and frequently audited by a third party to ensure that security standards are
met.
 Cloud computing actually makes servers and storage more secure by defining different
levels of security by implementing robust intrusion detection and prevention systems,
firewalls and performing security audits regularly in their data centers to protect data.

3. Flexibility

 The nature of cloud computing is such that it allows organizations to allow services
more quickly and as per company needs.
 This is because cloud computing helps in distributing workloads across the company
and can be remotely accessed by end-users, irrespective of their location.
 Companies could even hire a global and, perhaps, cheaper workforce when they use
cloud computing.

4. Mobility

 Mobility means no dependency on device or location.


 User can work at any time, any place , on any device.
 Cloud computing allows mobile access to corporate data via smartphones and devices
like PC, Tablet.
 Staff with busy schedules, or who live a long way away from the corporate office, can
use this feature to keep instantly up to date with clients and co-worker.
 Through the cloud, you can offer conveniently accessible information to staff who
travel or remote employees, for better work-life balance.

5. Insight

 Many cloud-based storage solutions offer integrated cloud analytics for a bird's-eye
view of your data.
 With your information stored in the cloud, you can easily implement tracking
mechanisms and build customised reports to analyse information organisation wide.
 From those insights, you can increase efficiencies and build action plans to meet
organisational goals.

Prepared By: Department of Computer Engineering Page 12


Cloud Computing MIMP Subject Code: 4360709

6. Increased Collaboration
 If your business has less employees, then you should be making collaboration with
other organization.
 After all, there isn't much point to having a team if it is unable to work like a team.
 Team members can view and share information easily and securely across a cloud-
based platform.
 Some cloud-based services even provide collaborative social spaces to connect
employees across your organization, therefore increasing interest and engagement

7.Quality Control
 In a cloud-based system, all documents are stored in one place and in a single format.
 With everyone accessing the same information, you can maintain consistency in data,
avoid human error, and have a clear record of any revisions or updates.
 There are few things as detrimental to the success of a business as poor quality and
inconsistent reporting.

8. Disaster Recovery
 When data is stored offline, if fire or flood damage physical device than there is no
recovery or backup for that data.
 Damage to infrastructure also leads to data loss.
 Downtime in your services leads to lost productivity, revenue, and brand reputation.
 When we use cloud base storage , data recovery is easy.
 Most of cloud users claim disaster recovery in few hours.

9. Loss Prevention
 If your local hardware generate a problem or stolen, you might end up permanently
losing your data.
 This is a more common problem than you might realize computers can malfunction for
many reasons
 If you aren't on the cloud, you're at risk of losing all the information you had saved
locally.
 With a cloud-based server, however, all the information you've uploaded to the cloud
remains safe and easily accessible from any computer with an internet connection, even
if the computer you regularly use isn't working.

10. Automatic Software Updates


 Cloud-based applications automatically refresh and update themselves, instead of
forcing an IT department to perform a manual organization wide update.
 For those who have a lot to get done, there isn't anything more irritating than having to
wait for system updates to be installed.
 This saves valuable time and money spent on outside IT consultation.

11. Competitive Edge


 While cloud computing is increasing in popularity, there are still those who prefer to
keep everything local.

Prepared By: Department of Computer Engineering Page 13


Cloud Computing MIMP Subject Code: 4360709

 That's their choice, but doing so places them at a distinct disadvantage when competing
with those who have the benefits of the cloud at their fingertips.
 If you implement a cloud-based solution before your competitors, you'll be further
along with higher outcome.

12. Sustainability
 On-premise data centre consume more energy and increase the emission of harmful
gases like carbon dioxide.
 Moving to cloud computing help companies cut down their energy requirements and
achieve sustainable growth.
 Another important objective of green computing is facilitating remote and hybrid work
culture.
 Remote work allows companies to use smaller office spaces and reduces the
infrastructure needs of employees. Similarly, employees do not need to commute to the
office, which reduces the use of vehicles and hence cuts down on the emission of
greenhouse gases.

8. Give difference between public and private cloud. (CO-2)

Public Cloud Private Cloud

Cloud Computing infrastructure is shared Cloud Computing infrastructure is


with the public by service providers over shared with private organizations by
the internet. It supports multiple service providers over the internet. It
customers i.e, enterprises. supports one enterprise.

Multi-Tenancy i.e, Data of many Single Tenancy i.e, Data of a single


enterprises are stored in a shared enterprise is stored.
environment but are isolated. Data is
shared as per rule, permission, and
security.

Cloud service provider provides all the Specific services and hardware as per
possible services and hardware as the the need of the enterprise are
user-base is the world. Different people available in a private cloud.
and organizations may need different
services and hardware. Services provided
must be versatile.

It is hosted at the Service Provider site. It is hosted at the Service Provider


site or enterprise.

Prepared By: Department of Computer Engineering Page 14


Cloud Computing MIMP Subject Code: 4360709

Public Cloud Private Cloud

It is connected to the public internet. It only supports connectivity over the


private network.

Scalability is very high, and reliability is Scalability is limited, and reliability


moderate. is very high.

Cloud service provider manages the cloud Managed and used by a single
and customers use them. enterprise.

It is cheaper than the private cloud. It is costlier than the public cloud.

Security matters and dependent on the It gives a high class of security.


service provider.

Performance is low to medium. Performance is high.

It has shared servers. It has dedicated servers.

Example: Amazon web service (AWS) Example: Microsoft KVM, HP, Red
and Google AppEngine etc. Hat & VMWare etc.

9. List cloud service models and explain any one in detail. (CO-3)
 There are the following three types of cloud service models -
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)

Prepared By: Department of Computer Engineering Page 15


Cloud Computing MIMP Subject Code: 4360709

1. SaaS:
 Brief Introduction
 Software as a Service (SaaS) is a category of cloud computing services that delivers
software applications over the internet. In a SaaS model, users can access and use software
applications without the need for installing, maintaining, or managing the underlying
infrastructure. Instead of purchasing and installing software on individual computers or
servers, users subscribe to the software on a pay-as-you-go basis.

 Here are some key characteristics and features of SaaS in cloud computing:
1. Accessibility: SaaS applications are accessible through a web browser, allowing users to
access the software from anywhere with an internet connection. This flexibility is
particularly advantageous for remote work and distributed teams.
2. Subscription Model: SaaS typically operates on a subscription-based pricing model,
where users pay a recurring fee to access the software. This often includes maintenance,
updates, and support services, eliminating the need for upfront software licensing costs.

Prepared By: Department of Computer Engineering Page 16


Cloud Computing MIMP Subject Code: 4360709

3. Automatic Updates: The responsibility for software updates, maintenance, and security
patches rests with the SaaS provider. This ensures that users always have access to the
latest features and security enhancements without having to manually update their
software.
4. Scalability: SaaS solutions are designed to scale easily to accommodate varying
workloads and user demands. Users can often adjust their subscription plans to match the
evolving needs of their organization.
5. Multi-Tenancy: SaaS applications are usually multi-tenant, meaning that multiple
organizations or users share the same infrastructure and code base while maintaining
separate instances of the application. This allows for efficient resource utilization and
cost-sharing among users.
6. Managed Security: SaaS providers are responsible for securing the infrastructure, data,
and application, relieving users of many security concerns. However, users must still
manage access controls and ensure the security of their data within the application.
7. Collaboration and Integration: SaaS applications often support collaboration features,
enabling users to work together in real-time. Additionally, many SaaS solutions offer
integrations with other cloud services and on-premises systems, facilitating a seamless
workflow.
 Popular examples of SaaS applications include customer relationship management (CRM)
systems like Salesforce, productivity tools like Google Workspace and Microsoft 365, and
enterprise resource planning (ERP) solutions like SAP S/4HANA Cloud.
 In summary, SaaS in cloud computing offers a convenient and cost-effective way for
organizations to access and use software applications, with the added benefits of scalability,
automatic updates, and reduced IT management overhead.

Advantages and Disadvantages

 Advantages of SaaS
1. Cost-Effective: Pay only for what you use.
2. Reduced time: Users can run most SaaS apps directly from their web browser without
needing to download and install any software. This reduces the time spent in installation
and configuration and can reduce the issues that can get in the way of the software
deployment.
3. Accessibility: We can Access app data from anywhere.
4. Automatic updates: Rather than purchasing new software, customers rely on a SaaS
provider to automatically perform the updates.
5. Scalability: It allows the users to access the services and features on-demand.

 Disadvantages of Saas :

Prepared By: Department of Computer Engineering Page 17


Cloud Computing MIMP Subject Code: 4360709

1. Limited customization: SaaS solutions are typically not as customizable as on-premises


software, meaning that users may have to work within the constraints of the SaaS
provider’s platform and may not be able to tailor the software to their specific needs.
2. Dependence on internet connectivity: SaaS solutions are typically cloud-based, which
means that they require a stable internet connection to function properly. This can be
problematic for users in areas with poor connectivity or for those who need to access the
software in offline environments.
3. Security concerns: SaaS providers are responsible for maintaining the security of the data
stored on their servers, but there is still a risk of data breaches or other security incidents.
4. Limited control over data: SaaS providers may have access to a user’s data, which can be
a concern for organizations that need to maintain strict control over their data for
regulatory or other reasons.

10. Give difference between IaaS, PaaS, and SaaS.( CO-3)

Basis Of IAAS PAAS SAAS


Infrastructure as a
Stands for Platform as a service. Software as a service.
service.
IAAS is used by PAAS is used by SAAS is used by the
Uses
network architects. developers. end user.
PAAS gives access
IAAS gives access to to run time
the resources like environment to SAAS gives access to
Access
virtual machines and deployment and the end user.
virtual storage. development tools
for application.
It is a cloud
It is a service model It is a service model
computing model
that provides in cloud computing
that delivers tools
Model virtualized that hosts software to
that are used for the
computing resources make it available to
development of
over the internet. clients.
applications.
There is no
Some knowledge is requirement about
Technical It requires technical
required for the basic technicalities
understanding. knowledge.
setup. company handles
everything.
It is popular among It is popular among
It is popular among developers who consumers and
Popularity developers and focus on the companies, such as
researchers. development of apps file sharing, email,
and scripts. and networking.
Usage Used by the skilled Used by mid-level Used among the users

Prepared By: Department of Computer Engineering Page 18


Cloud Computing MIMP Subject Code: 4360709

developer to develop developers to build of entertainment.


unique applications. applications.
Amazon Web Facebook, and MS Office web,
Cloud services Services, sun, vCloud Google search Facebook and Google
Express. engine. Apps.
AWS virtual private
Enterprise services Microsoft Azure. IBM cloud analysis.
cloud.
Outsourced cloud Force.com,
Salesforce AWS, Terremark
services. Gigaspaces.
Operating System,
Runtime, Data of the
User Controls Nothing
Middleware, and application
Application data
It is highly scalable It is highly scalable to
It is highly scalable to suit the different suit the small, mid
Others
and flexible. businesses according and enterprise level
to resources. business

11. Explain AWS cloud service provider. (CO-3)


 Amazon Web Services (AWS), a subsidiary of Amazon.com, has invested billions of dollars
in IT resources distributed across the globe. These resources are shared among all the AWS
account holders across the globe. These account themselves are entirely isolated from each
other. AWS provides on-demand IT resources to its account holders on a pay-as-you-go
pricing model with no upfront cost. Amazon Web services offers flexibility because you
can only pay for services you use or you need. Enterprises use AWS to reduce capital
expenditure of building their own private IT infrastructure (which can be expensive
depending upon the enterprise’s size and nature). AWS has its own Physical fiber network
that connects with Availability zones, regions and Edge locations. All the maintenance cost
is also taken care by the AWS which saves a fortune for the enterprises.
 Security of the cloud is the responsibility of AWS but Security in the cloud is the
Customer’s Responsibility. The Performance efficiency in the cloud has four main areas:-
1. Selection
2. Review
3. Monitoring
4. Tradeoff

Prepared By: Department of Computer Engineering Page 19


Cloud Computing MIMP Subject Code: 4360709

 Advantages of Amazon Web Services


1. AWS allows you to easily scale your resources up or down as your needs change,
helping you to save money and ensure that your application always has the resources it
needs.
2. AWS provides a highly reliable and secure infrastructure, with multiple data centers and
a commitment to 99.99% availability for many of its services.
3. AWS offers a wide range of services and tools that can be easily combined to build and
deploy a variety of applications, making it highly flexible.
4. AWS offers a pay-as-you-go pricing model, allowing you to only pay for the resources
you actually use and avoid upfront costs and long-term commitments.
 Disadvantages of Amazon Web Services
1. AWS can be complex, with a wide range of services and features that may be difficult to
understand and use, especially for new users.
2. AWS can be expensive, especially if you have a high-traffic application or need to run
multiple services. Additionally, the cost of services can increase over time, so you need
to regularly monitor your spending.
3. While AWS provides many security features and tools, securing your resources on AWS
can still be challenging, and you may need to implement additional security measures to
meet your specific requirements.
4. AWS manages many aspects of the infrastructure, which can limit your control over
certain parts of your application and environment.

AWS Global Infrastructure

Prepared By: Department of Computer Engineering Page 20


Cloud Computing MIMP Subject Code: 4360709

 The AWS global infrastructure is massive and is divided into geographical regions. The
geographical regions are then divided into separate availability zones. While selecting the
geographical regions for AWS, three factors come into play
 Optimizing Latency
 Reducing cost
 Government regulations (Some services are not available for some regions)
 Each region is divided into at least two availability zones that are physically isolated from
each other, which provides business continuity for the infrastructure as in a distributed
system. If one zone fails to function, the infrastructure in other availability zones remains
operational. The largest region North Virginia (US-East), has six availability zones. These
availability zones are connected by high-speed fiber-optic networking.

AWS Cloud Computing Models

There are three cloud computing models available on AWS.

1. Infrastructure as a Service (IaaS): It is the basic building block of cloud IT. It generally
provides access to data storage space, networking features, and computer
hardware(virtual or dedicated hardware). It is highly flexible and gives management
controls over the IT resources to the developer. For example, VPC, EC2, EBS.
2. Platform as a Service (PaaS): This is a type of service where AWS manages the
underlying infrastructure (usually operating system and hardware). This helps the
developer to be more efficient as they do not have to worry about undifferentiated heavy
lifting required for running the applications such as capacity planning, software
maintenance, resource procurement, patching, etc., and focus more on deployment and
management of the applications. For example, RDS, EMR, ElasticSearch.
3. Software as a Service(SaaS): It is a complete product that usually runs on a browser. It
primarily refers to end-user applications. It is run and managed by the service provider.
The end-user only has to worry about the application of the software suitable to its needs.
For example, Saleforce.com, Web-based email, Office 365 .

12. Explain Google Cloud Platform service provider. CO-3)


 Google Cloud Platform (GCP) is a cloud computing platform provided by Google. It
offers a broad set of services and infrastructure to help organizations build, deploy, and
scale applications. Here are key aspects of Google Cloud Platform as a service provider:

Prepared By: Department of Computer Engineering Page 21


Cloud Computing MIMP Subject Code: 4360709

1. Services:
 Compute Services: GCP provides virtual machines (Google Compute Engine), managed
Kubernetes clusters (Google Kubernetes Engine), and serverless computing options like
Google Cloud Functions.
 Storage Services: GCP offers various storage options, including Cloud Storage for object
storage, Cloud SQL for managed relational databases, and Cloud Firestore and Cloud
Bigtable for NoSQL databases.
 Big Data and Analytics: GCP provides services like BigQuery for analytics, Dataflow for
stream and batch processing, and Dataprep for data preparation.
 Machine Learning and AI: GCP offers a robust set of machine learning services,
including AI Platform, AutoML for custom models, and pre-trained models through
Cloud AI.
 Networking Services: GCP provides networking services such as Virtual Private Cloud
(VPC), Cloud Load Balancing, and Cloud CDN for content delivery.
 Identity and Security: Identity and Access Management (IAM) is used for managing
access control, and GCP offers various security features like Cloud Identity-Aware
Proxy, Key Management Service (KMS), and Cloud Security Scanner.
2. Global Network:
 GCP has an extensive global network with data centers strategically located around the
world. This allows users to deploy applications and services in proximity to their end-
users for improved performance and reliability.
3. Containerization and Orchestration:
 GCP is known for its strong support for containerization and orchestration. Google
Kubernetes Engine (GKE) provides a managed Kubernetes service, making it easier for
users to deploy, manage, and scale containerized applications.
4. Serverless Computing:
 GCP offers serverless computing options, such as Cloud Functions and Cloud Run,
allowing developers to focus on writing code without managing the underlying
infrastructure.
5. BigQuery and Data Analytics:

Prepared By: Department of Computer Engineering Page 22


Cloud Computing MIMP Subject Code: 4360709

 BigQuery is a fully-managed, serverless data warehouse that enables super-fast SQL


queries using the processing power of Google's infrastructure. GCP provides a suite of
tools for data analytics and business intelligence.
6. Open Source and Interoperability:
 GCP embraces open-source technologies and provides tools that work seamlessly with
popular open-source projects. Google actively contributes to and supports various open-
source communities.
7. Customer Support and Documentation:
 GCP offers comprehensive documentation, tutorials, and customer support services to
assist users in getting started and solving issues.
8. Security and Compliance:
 Google Cloud has a strong focus on security, compliance, and privacy. It adheres to
industry standards and certifications, and users can leverage features like encryption,
identity management, and audit logging.
 Google Cloud Platform is used by a wide range of organizations, from startups to large
enterprises, and it continues to evolve with new services and features. The choice of GCP
often depends on specific use cases, existing technology stack, and business
requirements.

13. Define Virtualization & Explain working of virtualization in cloud computing. (CO-4)
 Virtualization is the "creation of a virtual (rather than actual) version of something, such
as a server, a desktop, a storage device, an operating system or network resources".

 In other words, Virtualization is a technique, which allows to share a single physical


instance of a resource or an application among multiple customers and organizations. It
does by assigning a logical name to a physical storage and providing a pointer to that
physical resource when demanded.

 Working of Virtualization
Virtualization plays a very important role in the cloud computing technology, normally in
the cloud computing, users share the data present in the clouds like application etc, but
actually with the help of virtualization users shares the Infrastructure.

The main usage of Virtualization Technology is to provide the applications with the
standard versions to their cloud users, suppose if the next version of that application is
released, then cloud provider has to provide the latest version to their cloud users and
practically it is possible because it is more expensive.

To overcome this problem we use basically virtualization technology, By using


virtualization, all severs and the software application which are required by other cloud
providers are maintained by the third party people, and the cloud providers has to pay the
money on monthly or annual basis.

Prepared By: Department of Computer Engineering Page 23


Cloud Computing MIMP Subject Code: 4360709

14. Write Characteristic of Virtualization.(CO-4)


 Characteristics of Virtualization
Virtualization is a technology that allows multiple virtual machines to run on a single
physical machine. It is a powerful tool that has revolutionized the way we use
computers and has become an essential component of modern IT infrastructure. The
concept of virtualization has been around for decades, but it has only recently become
mainstream as technology has advanced and costs have dropped. In this article, we
will explore the characteristics of virtualization and how it is being used today.
1. Abstracting Physical Resources
One of the most significant characteristics of virtualization is the ability to abstract
physical resources. This means that virtual machines can be created that are
completely independent of the underlying physical hardware. This allows multiple
virtual machines to run on the same physical machine, each with their own operating
system and applications. This is known as server virtualization, and it is the most
common use of virtualization today.
2. Isolation of Resources
Another key characteristic of virtualization is the isolation of resources. This means
that each virtual machine is isolated from the others, and they cannot access each
other's resources. This provides security and stability, as a problem with one virtual
machine will not affect the others.
3. Flexibility

Prepared By: Department of Computer Engineering Page 24


Cloud Computing MIMP Subject Code: 4360709

Virtualization also provides flexibility in terms of resource allocation. Virtual


machines can be easily created, deleted, and modified as needed. This allows for easy
scaling, as more resources can be allocated to a virtual machine as needed. It also
allows for easier testing and development, as virtual machines can be created to test
new software and configurations without affecting the production environment.
4. Portability
Virtualization also provides portability, as virtual machines can be easily moved
between physical machines. This allows for easy disaster recovery, as virtual machines
can be quickly moved to a different physical machine in the event of a disaster. It also
allows for easy migration between physical machines, as virtual machines can be
moved to new hardware without affecting the applications or data.
5. Networking
Virtualization also provides networking capabilities, as virtual machines can be
connected to virtual networks. This allows for easy communication between virtual
machines, as well as the ability to connect to physical networks. This allows for easy
integration of virtual machines into existing networks and the ability to create isolated
networks for specific purposes.
6. Snapshots and Backup
Virtualization also provides the ability to create snapshots of virtual machines. This
allows for easy backup and recovery of virtual machines, as well as the ability to
quickly revert to a previous state. This is especially useful for testing and
development, as it allows for easy experimentation without the risk of losing data or
compromising the production environment.
7. Desktop Virtualization
Desktop virtualization is another form of virtualization that allows multiple virtual
desktops to run on a single physical machine. This allows for easy deployment and
management of desktops, as well as the ability to access desktops remotely. This is
especially useful for companies with a mobile workforce, as it allows employees to
access their desktop from any location.

15. List out type of virtualization & Explain any one in detail(CO-4)
 Types Of Virtualization In Cloud Computing
 Network Virtualization
 Storage Virtualization
 Memory Virtualization
 Software Virtualization
 Desktop Virtualization
 Application Virtualization
 Server Virtualization

Prepared By: Department of Computer Engineering Page 25


Cloud Computing MIMP Subject Code: 4360709

1. Network Virtualization

 Network Virtualization refers to the virtualization of a network into a sub network


that one could produce on the very same physical network. It basically refers to a
system where one can run multiple virtual networks at the same time and each of
these networks have a separate control system and data plan.

 These networks co-exist on the same physical network and yet have their individual
functioning and system. This type of virtualization of network does not compromise
on the security factor at all.

 It restricts the movement of files across multiple networks to make sure of the same.
It also helps you keep a better track of things on the network and allow for good
supervision as well as identification of the data usage.

 It is also a reliable and safe system as issues on one network do not have a domino
effect on the other networks. The main aimed result of Network Virtualization is to
improve the efficiency and productivity of the network.

Prepared By: Department of Computer Engineering Page 26


Cloud Computing MIMP Subject Code: 4360709

 There are two types of Network Virtualizations in cloud computing:

 Internal Network Virtualization : extends network-like functionality to a single system.


 External Network Virtualization : Combines multiple networks or its individual parts into a
single virtual unit.

16. Explain advantage & disadvantage of virtualization. (CO-4)


 Advantage Of Virtualization
 Virtualization enables one to run multiple applications and operating systems on the very same
server at the same time.
 It increases the overall efficiency and flexibility of existing hardware.
 It increases the ability to effectively manage all the available resources.
 It ensures an easier backup system and recovery from disaster.
 Virtualization saves energy, the hardware expenditure as well as the overall costs.
 It provides for the maximum usage of the servers.
 It offers better uptime.
 It allows for faster deployment of resources.

 Disadvantages Of Virtualization
 It can get a shade expensive when effectively implemented.
 Like every system it has its own limitations like not every application would have the ability to
work effectively within a virtual environment and thus has a level of uncertainty attached to it.
 In spite of all precautions taken, it does have the element of risking the security of your data and
your server at large which cannot be eliminated easily.
 It creates the issue of scalability which can get limited in a virtual environment.
 It needs a number of links that are efficiently roped in together and are working cohesively for
the overall efficient working of the entire virtual environment.
 Although convenient, it can be a time-consuming process.

17. Define Hypervisor. List out type of Hypervisor & Explain any one type of Hypervisor
in detail.(CO-4)
 A hypervisor, also known as a virtual machine monitor (VMM) or virtualizer, is a
type of computer software, firmware or hardware that creates and runs virtual machines.
 A computer on which a hypervisor runs one or more virtual machines is called a host
machine, and each virtual machine is called a guest machine.
 Types of Hypervisor:
1. Type 1 Hypervisors (Bare Metal)
2. Type 2 Hypervisors (Hosted)

 Type 1 Hypervisors (Bare Metal)

 A Type 1 hypervisor is installed directly on top of the physical machine. Type 1 hypervisors
are also known as bare-metal hypervisors due to the nature of their installation type.
 These categories of hypervisors are more popular and secure than the Type 2 hypervisors.

Prepared By: Department of Computer Engineering Page 27


Cloud Computing MIMP Subject Code: 4360709

 Type 1 hypervisors have a lower amount of latency and are the most used in the market.
Some examples of these hypervisors are VMware ESXi, Microsoft Hyper-V, or open-source
Kernel-based VMs (KVMs).
 Hypervisors of type I run directly on top of the hardware. As a result, they stand in for
operating systems and communicate directly with the ISA interface offered by the underlying
hardware, which they replicate to allow guest operating systems to be managed. Because it
runs natively on hardware, this sort of hypervisor is also known as a native virtual machine.

18. Give differences between Cloud Computing & Virtualization.(CO-4)


S.NO Cloud Computing Virtualization

Cloud computing is used to provide pools While It is used to make various


1. and automated resources that can be simulated environments through a
accessed on-demand. physical hardware system.

Cloud computing setup is tedious, While virtualization setup is simple as


2.
complicated. compared to cloud computing.

While virtualization is low scalable


3. Cloud computing is high scalable.
compared to cloud computing.

While virtualization is less flexible


4. Cloud computing is Very flexible.
than cloud computing.

In the condition of disaster recovery, cloud While it relies on single peripheral


5.
computing relies on multiple machines. device.

In cloud computing, the workload is In virtualization, the workload is


6.
stateless. stateful.

The total cost of cloud computing is The total cost of virtualization is


7.
higher than virtualization. lower than Cloud Computing.

Cloud computing requires many dedicated While single dedicated hardware can
8.
hardware. do a great job in it.

While storage space depends on


Cloud computing provides unlimited
9. physical server capacity in
storage space.
virtualization.

10. Cloud computing is of two types : Public Virtualization is of two types :

Prepared By: Department of Computer Engineering Page 28


Cloud Computing MIMP Subject Code: 4360709

S.NO Cloud Computing Virtualization

cloud and Private cloud. Hardware virtualization and


Application virtualization.

In Cloud Computing, Configuration is In Virtualization, Configuration is


11.
image based. template based.

In cloud computing, we utilize the entire


In Virtualization, the entire servers
12. server capacity and the entire servers are
are on-demand.
consolidated.

In cloud computing, the pricing pay as you


In Virtualization, the pricing is totally
13. go model, and consumption is the metric
dependent on infrastructure costs.
on which billing is done.

19. Give differences between TYPE-1 Hypervisor & TYPE-2 Hypervisor.(CO-4)


Criteria Type Type-1 Hypervisor 1 Type-2 Hypervisor 1Type 2
Deployment Directly installed on hardware Installed on operation system as an applic
ation
Hardware Many vendors provide with hardwar Hardware-agnostic
compatibility e compatibility list
Setup Some technical knowledge is require Easy, same way as other application for h
d. ost OS
Management Mostly via web interface Management Console as application on ho
st OS
Performance All resources are devoted to virtualiz Slower performance because of additional
ation. Hypervisor has direct access to host OS layer. Hypervisor doesn’t have dir
h/w ect access to hardware.
Security Hypervisor and all VMs are fully isol Guest OS is isolated from Host OS. Other
ated. No additional applications are i applications may have vulnerabilities, wha
nstalled on hypervisor what lowers s t increase security risks.
ecurity risk
Stability Only hypervisor failure can crash gu Hypervisor and OS failure or even applica
est VMs tion failure may crash VMs
Multipurpose Hardware is used only for virtualizati Other applications may run on host OS be
usage of h/w on sides the hypervisor.
Additional Clustering, embedded software-defin No other features besides virtualization.
features ed storage, built-in disaster recovery
capabilities, central management of
multiple hypervisors, role-based
access etc.
Examples VMWare ESXi, VMWare Workstation Playes,

Prepared By: Department of Computer Engineering Page 29


Cloud Computing MIMP Subject Code: 4360709

Microsoft HyperV, Microsoft Virtual PC,


Citrix Xen Server Sun’s VirtualBox

20. Define Infrastructure Security & Explain Infrastructure Security of Network


Level.(CO-5)
 The aim of cloud infrastructure security is to protect cloud-based assets from cyber
security threats.
 Infrastructure security is the practice of protecting critical systems and assets against
physical and cyber threats.

 The Network level

There are no new attacks, vulnerabilities, or changes that need to be considered in this
specific topology by the information security personnel, beside that our organization’s IT
infrastructure might be affected by the implementation of a private cloud but our current
network topology probably will not get affected. whereas if we used the services of
public clouds any changes in the security requirements will require a change in the
network topology. Therefore, we must define some ways through which our existing
network topology will interact with the topology of the cloud provider.

User can reduce their cloud security challenges in many ways, which is why it is
essential.

1. Reduces Business Risk

Network security provides enterprise-level protection for cloud resources. It means


operating remotely becomes more secure and more manageable. It helps company teams
collaborate better and improve productivity.

2. Reduces Costs

The cloud infrastructure is not expensive for customers because they don’t have to buy
them. You only use cloud services offered by a provider and pay through a subscription
model. Implementing cloud computing or network security will safeguard you from
cyber-attacks and reduce the cost of data recovery.

3. Data Protection

Cloud computing network security helps protect user data from cyber-attacks and shields
against misconfigurations and human errors.

4. Increases Reliability and Availability

Cloud services need to be available to customers around the clock. To ensure this
availability, you must first employ network security measures to prevent downtime due to

Prepared By: Department of Computer Engineering Page 30


Cloud Computing MIMP Subject Code: 4360709

a breach. In addition, network security helps build customer trust because it shows
commitment to protecting their data.

5. Ensures Regulatory Compliance

How you implement your private cloud environment is the critical element in meeting
cloud security compliance. A compliance management platform can help you leverage
solutions while connecting them to your business risk and regulatory requirements. For
example, in the healthcare industry.

Different Types of Network Security

You can use some tools in your line of service for data protection. Some of the common
ones include:

1. Antivirus and Antimalware Tools

A common form of cyber attack is malware, which infiltrates and corrupts user files.
When a user experiences a malware attack, the best way to counter it is by installing an
antivirus like Kerperskey. It scans your file system and removes all threats.

2. Application Security

Updating your system security can be the first step in protecting your data from attack.
Combining antiviruses and best practices can help patch security gaps in a platform.

3. Behavioral Analytics

Creating a system that monitors user behavior is crucial to an organization, and here is
why. When staff or devices access a cloud system, monitoring use and behavior is easy.
If they’re irregular behavior like unauthorized access, it can indicate a system breach.
Having such systems can help to prevent any threat early.

4. Data Loss Prevention


They are company measures that protect its sensitive data from breaches by staff. These
networks prevent rogue employees from downloading, printing, or sharing company
information and sensitive data.
5. Access Control

It’s when a company limits access to sensitive information to only authorized people.
Companies accomplish it by applying security policies restricting access to specific
networks or system sections.

The Challenges Faced in Cloud Network Security:

Prepared By: Department of Computer Engineering Page 31


Cloud Computing MIMP Subject Code: 4360709

Any business needs to understand the top cloud data security network challenges they can
face. Common ones include:

1. Errors in the Cloud

Most cloud failures are because of some human error. It is a constant risk, especially
when building business apps. It gets amplified when these business apps get hosted in a
public cloud. The reason is the ease of use by multiple users without proper controls.
Ways you can manage this challenge is by building strong controls.

2. DDoS Attack

When your environment gets exposed, it’s called a DDoS attack. It happens when you
continuously add microservices to your caseload. Small data leaks can build up to a full-
blown attack. A user can manage the attack surface by managing their cloud resources.

3. Shadow IT

When an organization’s employee illegally gets access to the cloud servers without
approval, it’s called shadow IT. The risks associated with it are compliance violations,
breaches, and more. In addition, they can implement cloud usage policies. Not only that
but also monitor cloud usage and provide staff with approved cloud services and
applications.

4. Scaled Vulnerabilities

The cloud needs more advanced security protocols than on-premise servers. That’s why
an admin needs to learn a new cloud security strategy that adheres to modern standards.
So, businesses need the proper knowledge and expertise to know cloud security
challenges.

21. Explain Data Security & Storage in detail.(CO-5)


 Data Security and storage

Prepared By: Department of Computer Engineering Page 32


Cloud Computing MIMP Subject Code: 4360709

 Data security and storage in cloud computing are critical aspects that involve
safeguarding sensitive information, ensuring data integrity, availability, and
confidentiality.
 Cloud computing offers various services and deployment models, each with its own data
security considerations.
 Here are key aspects of data security and storage in cloud computing:

1. Data Encryption: Encrypt data both at rest (stored data) and in transit (data being transmitted
over networks). Use strong encryption algorithms (e.g., AES-256 for data at rest, TLS for data in
transit) to protect data from unauthorized access and interception.

2. Access Control: Implement robust access control mechanisms to regulate who can access data
and resources in the cloud environment. Use identity and access management (IAM) tools to
enforce least privilege principles, role-based access control (RBAC), and multi-factor
authentication (MFA) to authenticate and authorize users.

3. Data Masking and Tokenization: Use data masking techniques to obfuscate sensitive
information in non-production environments, reducing the risk of exposure during development
and testing. Tokenization can also be used to replace sensitive data with non-sensitive
equivalents (tokens) to protect sensitive data in storage and transit.

4. Backup and Disaster Recovery: Implement regular data backups and disaster recovery
strategies to ensure data resilience and continuity of operations. Use cloud-based backup
solutions and replication mechanisms to create redundant copies of data in geographically
diverse locations.

5. Data Loss Prevention (DLP): Deploy DLP solutions to monitor, detect, and prevent
unauthorized access, leakage, or misuse of sensitive data. DLP tools can identify and enforce
policies to protect data based on content, context, and user behavior.

6. Secure Data Sharing: Use secure methods for sharing data within and outside the
organization, such as encrypted file sharing platforms, secure APIs, and data access controls.
Implement data governance policies to manage data sharing permissions and track data access
and usage.

Prepared By: Department of Computer Engineering Page 33


Cloud Computing MIMP Subject Code: 4360709

7. Compliance and Regulatory Requirements: Ensure that data storage and handling practices
comply with relevant regulatory requirements, industry standards, and data protection laws (e.g.,
GDPR, HIPAA, PCI DSS). Cloud providers may offer compliance certifications and tools to
help meet these requirements.

8. Data Lifecycle Management: Implement data lifecycle management strategies to manage


data from creation to deletion efficiently. This includes data classification, retention policies,
archiving, and secure data disposal or deletion when no longer needed.

9. Monitoring and Auditing: Enable logging, monitoring, and auditing capabilities to track data
access, modifications, and security events in the cloud environment. Use security information
and event management (SIEM) tools to centralize logs, analyze threats, and generate real-time
alerts.

10. Vendor Security Assurance: Evaluate the security practices and certifications of cloud
service providers (CSPs) regarding data security, storage, and privacy. Understand the shared
responsibility model to clarify which security responsibilities are managed by the CSP and which
remain the customer's responsibility.

By addressing these data security and storage considerations in cloud computing, organizations
can enhance data protection, reduce security risks, and maintain compliance with regulatory
requirements, ultimately fostering trust and confidence in their cloud-based operations. Regular
security assessments, training, and collaboration between stakeholders are essential for effective
data security management in the cloud.

22. Explain Data Life Cycle in detail. (CO-5)


 Data Life Cycle
The data lifecycle is the process in which data is created, used, and then destroyed. The data
lifecycle changes slightly whether that data is stored on-premise or in the cloud.
 Create
 Storage
 Usage
 Sharing
 Archive
 Destruction

Prepared By: Department of Computer Engineering Page 34


Cloud Computing MIMP Subject Code: 4360709

Different Phases of Cloud Data Lifecycle

1. Data Creation:
 Data is gathered from various sources, including sensors, devices, applications, human
interactions, social media posts, and IoT temperature readings.
 The raw material for the data lifecycle passes through the ingestion, processing, storage,
and analysis phases to produce insightful information.
 Creating data is the first step in turning unactionable information into knowledge that can
be used.

2. Data Storage:
 Data finds a secure place in cloud storage infrastructure, encompassing object, block, and
database storage options.
 These choices have diverse features to suit various data types and use cases.
 Cloud storage ensures accessibility, scalability, and resilience while allowing
organizations to pick the ideal storage method.
 This stage is pivotal in the data lifecycle, where data is protected and prepared for future
use and retrieval.

3. Data Processing:
 Processing transforms data into a usable format, making tasks like data analysis, machine
learning, and artificial intelligence applications feasible.
 This process converts unstructured data into structured data that can power automation
and insights.
 Data processing is essential for deriving value and understanding from data, whether
combining numbers for analytics or developing AI algorithms.
 It bridges the gap between unactionable insight and raw data.

4. Data Sharing:
 Data is accessible to approved users and programs for collaboration and utilization.

Prepared By: Department of Computer Engineering Page 35


Cloud Computing MIMP Subject Code: 4360709

 This phase entails securely distributing it inside a restricted framework to ensure only
authorized parties can interact with the data.
 Sharing data is crucial to data management as it promotes collaboration, decision-
making, and the ability to derive insights from the data.
 Strong access controls and permissions are needed to maintain data security and
compliance.

5. Data Archival:
 Data is archived to meet compliance requirements and to ensure long-term storage.
 Data is transferred at this phase to cost-effective, secure storage options built for long-
term retention.
 Archiving ensures that previous data is still available when needed and reduces storage
expenses for data utilized less often.
 It is essential for ensuring data integrity and compliance with legal requirements.

6. Data Destruction:
 When data no longer serves a purpose or when required by laws and regulations, it is
destroyed.
 Information must be securely deleted or removed at this step to ensure that data cannot be
accessed or retrieved.
 Data deletion is crucial for preserving data privacy and compliance, especially when
keeping data is useless or illegal.
 It adheres to data governance standards and protects sensitive information.

23. Which are the Key Privacy concerns in the cloud? (CO-5)
 Key Privacy concern in the cloud

Addressing privacy issues in cloud computing requires a comprehensive approach that combines
technical controls, legal compliance, transparency, user education, and ongoing risk
management. Organizations should conduct privacy impact assessments, adopt privacy-
enhancing technologies, implement strong data protection measures, and engage in transparent
communication with stakeholders to mitigate privacy risks and protect individuals' privacy rights
in the cloud.
1. Data Ownership and Control: One of the primary concerns is determining who owns the
data stored in the cloud and how much control individuals or organizations have over their data.
Cloud service providers (CSPs) may assert certain rights over data stored on their platforms,
leading to questions about data ownership and sovereignty.

2. Data Location and Jurisdiction: Data stored in the cloud may be replicated across multiple
geographical locations for redundancy and performance reasons. This raises concerns about data
residency, compliance with local data protection laws, and the jurisdictional issues that arise
when data crosses international borders.

3. Data Security and Breaches: The security of data in the cloud is a major privacy concern.
Breaches, unauthorized access, data leaks, or vulnerabilities in cloud services can lead to the

Prepared By: Department of Computer Engineering Page 36


Cloud Computing MIMP Subject Code: 4360709

exposure of sensitive information, compromising individuals' privacy rights and potentially


resulting in financial or reputational damage.

4. Data Access and Sharing: Cloud environments often involve sharing data with third parties,
such as cloud service providers, partners, or subcontractors. Privacy risks arise when data is
accessed, processed, or shared without proper authorization, encryption, or contractual
safeguards in place.

5. Compliance and Regulatory Challenges: Compliance with data protection regulations and
privacy laws (e.g., GDPR, CCPA, HIPAA) presents challenges in cloud computing.
Organizations must ensure that cloud providers adhere to relevant privacy requirements, provide
transparency about data handling practices, and offer data protection assurances.

6. Data Minimization and Purpose Limitation: The principle of data minimization, which
advocates for collecting only necessary data, and purpose limitation, which restricts data use to
specified purposes, can be challenging to enforce in cloud environments where data may be
stored or processed for various purposes without clear consent or control.

7. Vendor Lock-in and Portability: Organizations may face vendor lock-in issues when
migrating data between cloud providers or transitioning from cloud to on-premises
environments. Lack of data portability standards, interoperability challenges, and contractual
limitations can hinder data mobility and control.

8. Cloud Service Agreements and Terms: Privacy concerns also arise from the terms and
conditions outlined in cloud service agreements. Organizations must carefully review and
negotiate contractual terms related to data privacy, security, compliance, data retention, and data
access rights to protect their interests and privacy obligations.

9. Data Analytics and Profiling: Cloud-based data analytics, machine learning, and profiling
techniques raise privacy concerns related to the aggregation, analysis, and use of personal data to
derive insights, make decisions, or create targeted advertising, posing risks to individual privacy
and autonomy.
10. Transparency and Accountability: Transparency about data practices, security measures,
data breaches, and incident response capabilities is crucial for building trust and accountability in
cloud computing. Organizations should demand transparency from cloud providers and maintain
transparency with users regarding data handling practices and privacy policies.

24. List out the different ways to protecting privacy. (CO-5)


 Protecting Privacy
 You can protect your business data in the cloud from unauthorized access.
 All you need is a sharp eye and an extra effort.
 Here are few practical tips to keep your cloud data safe and secure.

1. Always keep backup locally:


 Always have a backup for your data.

Prepared By: Department of Computer Engineering Page 37


Cloud Computing MIMP Subject Code: 4360709

 It is always good to create hard copies of your business data and keep it with yourself so
that you can have access them even if you lost the original one.
 You can use any cloud storage solutions to store your data.
 You can set up a cloud account & can keep the backup copies.
 You have another option of keeping the backup data in an external storage device also
like a hard disk or a thumb drive. This will allow you to access the information even if
without the internet.

2. Don’t store sensitive data:


 Data is playing an important role in businesses today. So, data privacy is one of the
primary aspects of any business.
 But if something is there on the internet, it is hard to trust it is safe.
 So, one should avoid storing the most sensitive files or information in the cloud.
 Identity theft is on rising and you can’t take any risk.
 You should keep those files in cloud platform which you access frequently and should
avoid putting information related to financial details, competitor details, client details,
contact details like phone number/address etc.
 If you are keeping these files, make sure you encrypt them before uploading.

3. Data encryption:
 One of the best ways to protect your data while using cloud storage is to do data
encryption.
 This is the best form of security because you need decryption before accessing the data.
 This will protect data against service providers and users also.
 To make it more protected, you can also ensure cloud encryption during uploading and
downloading phases.
 But, this will make data sharing and sync in the cloud platform little slow.

4. Encrypted cloud service:


 There are few cloud services which provide local encryption and decryption of your files
and information inside that other than storage and backup.
 This means the service takes care of both encrypting your files and storing them safely in
the cloud.
 This will ensure that no one including the service provider or the administrators can have
the access to your data files.
 There are many free versions and also trial versions available in the market. You can use
them to learn how it works and later can upgrade to enjoy more space.

5. Using password:
 The first thing which can be done is to put strong password which can stand a hacking.
 You can take the help of internet to learn how to create a strong password.
 It is very important to change your password frequently and never use the same password
for all the accounts or folders.
 You can opt for 2-step verification for login if your cloud service offers that option.
 Google drive use 2 phase log in option, consist of password & code sent to the registered
number.

Prepared By: Department of Computer Engineering Page 38


Cloud Computing MIMP Subject Code: 4360709

 This added security will make your data much safer.

6. Keep an eye on what you do online:


 The security of your cloud data largely depends on your online behaviour.
 While using a public computer, never save your password, and always ensure that you
logged out properly.
 Another biggest concern is accessing cloud data in unsecured or open Wi-Fi hotspots.
Such connections are unencrypted, hackers can target your data easily.
 Never save your password in any of the public forum or social media.
 Change Wi-Fi passwords frequently.

7. Anti-virus is a must:
 Sometimes the weakest link happens to be the computer or device you use for cloud data
access.
 You need to put proper protection in your system/device.
 It will help in securing your business data. If you expose yourself to bugs and viruses,
hackers can access your system easily.
 You need to choose a very effective and robust anti-virus system for your system, which
will protect all the files and information inside that.
 If your system isn’t well protected, and if the system is not encrypted and secured from
bugs, hackers can get hold of your information.

8. Read your user agreement:


 If you are new to the world of cloud computing and not sure what cloud storage to choose
or how it really work, you have to read the user agreement of the service you are going to
sign up for.
 Initially, it will be difficult to understand and at times it will test your patience, but you
need to face this.
 User agreements always carry essential information which can help you understand
things in detail.

9. Access limitation:
 Give access to those users who really need.
 Internal users and third party vendors should only get access to those files which will
help them to do their jobs.
 Use encryption keys if required. Make sure to evaluate the users and vendors regularly
and add/remove users as per the requirement.

Prepared By: Department of Computer Engineering Page 39

You might also like