Cloud Computing Second Internals Answers
Cloud Computing Second Internals Answers
Explain Operating System Security and Virtual Machine Security (8 Marks, CO4)
Operating system security involves managing user privileges, process isolation, and secure
kernel modules. In a cloud environment, virtual machine security adds another layer,
isolating workloads using hypervisors. While hypervisors are smaller and easier to secure,
they still rely on a trusted Management OS. Common practices include encryption, secure
boot, and patch management to reduce vulnerabilities.
Define Trust. Explain the Security of Database Services (10 Marks, CO4)
Trust in cloud computing refers to a user's confidence that their data and applications are
secure and handled correctly by the provider.
Database Security involves access control, encryption, and secure APIs. Services like AWS
provide mechanisms like KMS (Key Management Service) and fine-grained IAM roles to
safeguard stored data. Contracts should specify data ownership, liability, and geographic
storage to build trust.
Explain the Various System Issues for Running a Parallel Program in Either
Parallel or Distributed Manner (13 Marks, CO5)
Key issues include:
- Partitioning: Dividing data and computation.
- Mapping: Assigning tasks to processing nodes.
- Synchronization: Coordinating task execution to avoid race conditions.
- Communication: Exchanging data between tasks.
- Scheduling: Efficient use of limited computing resources.
These aspects must be handled efficiently for optimal system performance and scalability.
Explain Programming the Google App Engine and Amazon AWS (12 Marks, CO5)
Google App Engine (GAE) provides a PaaS model supporting Python, Java, and Go with
integrated services like user authentication, data storage, and scalable app deployment.
Amazon AWS offers IaaS and PaaS services like EC2 for compute, S3 for storage, and EBS for
block storage. Developers interact via REST APIs, SDKs, and CLI tools, configuring services
to scale dynamically based on user demand.