CC MQP Solutions
CC MQP Solutions
Q.01 b. Outline eight reasons to adapt the cloud for upgraded Internet
applications and web services.
1. Desired location in areas with protected space and higher energy efficiency
2. Sharing of peak-load capacity among a large pool of users, improving overall utilization
3. Separation of infrastructure maintenance duties from domain-specific application
development
4. Significant reduction in cloud computing cost, compared with traditional computing paradigms
5. Cloud computing programming and application development
6. Service and data discovery and content/service distribution
7. Privacy, security, copyright, and reliability issues
8. Service agreements, business models, and pricing policies
Q.01 c. Briefly explain Message Passing Interface (MPI).
• This allows standard operating systems like Windows 2000 or Linux to run as if they are on actual
hardware.
• Mendel Rosenblum explained the low-level VMM operations, as shown in Figure 1.13.
Basic VM Operations:
4. A VM can be moved (migrated) from one hardware machine to another. (Figure 1.13(d))
Benefits:
• VMware said this method can increase server use from 5–15% to 60–80%.
• These attacks have resulted in large money losses in business and government.
• Data integrity may be lost due to user changes, Trojan horses, and spoofing attacks.
• Denial of Service (DoS) attacks stop system working and break Internet connections.
• Open systems like data centers and P2P networks are easy targets for attackers.
• Attacks can damage computers, networks, and storage systems.
Loss of Confidentiality
Loss of Integrity
Loss of Availability
• Leads to misuse of resources and data theft through weak or missing authentication.
MODULE-02
Q.03 a. Demonstrate the architecture of a computer system before and
after virtualization.
Before Virtualization:
Cannot run multiple OS (like Windows and Linux) on the same system.
After Virtualization:
Sl.
Physical Clusters Virtual Clusters
No.
Made of real physical machines connected Made of virtual machines running on one or more
1.
through a network. physical servers.
3. High cost due to more physical equipment. Cost-effective as fewer physical machines are needed.
Requires large physical space and power Saves space and energy as many VMs run on fewer
4.
supply. machines.
Manual monitoring and control of each Easier to manage using virtualization software (e.g.,
10.
physical server. VMware, VirtualBox).
OR
Q.04 a. Construct the Live migration process of a VM from one host to
another.
1. Pre-Migration (Step 0)
VM runs on Host A.
Destination Host B is selected and prepared.
2. Reservation (Step 1)
A container for the VM is initialized on Host B.
o HIDS (Host-based IDS): Runs on the same machine it's monitoring but is at
risk if the system is attacked.
o NIDS (Network-based IDS): Monitors network traffic but can't detect fake
(spoofed) actions.
In a virtualized system, guest VMs are isolated, so even if one VM is attacked, it
doesn't affect the others like NIDS.
The Virtual Machine Monitor (VMM) monitors access requests and behaves like a
HIDS by tracing fake actions.
o Policy Module: Uses tools like PTrace to trace and enforce policies in guest
VMs.
Logs are used to study attack behavior, but if the OS is compromised, logs may be
untrustworthy.
o Virtual honeypots must ensure the VM can't attack the host or VMM.
MODULE-03
Q.05 a. Outline six design objectives for cloud computing.
3. Scalability in performance
– Cloud systems must support more users by scaling up performance as needed.
Q.05 b. With a neat diagram, build a cloud ecosystem with a private cloud.
❖ A cloud ecosystem includes cloud providers, users, and technologies working together.
❖ Public clouds are commonly used and form the base of the cloud ecosystem.
❖ Private and hybrid clouds allow organizations to use both internal and public cloud resources.
❖ Users want flexible platforms to run services like websites and databases.
❖ VM managers handle and control VMs running on physical machines like Xen, KVM, and VMware.
❖ Tools like OpenNebula, vSphere, Eucalyptus, and Nimbus are used to manage cloud systems.
❖ Many startup companies use cloud resources instead of building their own IT setups.
❖ Interfaces like Amazon EC2WS, Nimbus WSRF, and ElasticHosts REST are used to access cloud
services.
❖ VI tools also support load balancing, dynamic resizing, and efficient use of server resources.
Functional Modules
1. Runtime Environment
– Runs applications written in Java, Python, Go, or PHP.
2. Datastore
– NoSQL database service for storing structured data.
3. Task Queues
– Handles background tasks without blocking user requests.
4. Memcache
– Provides fast, in-memory caching for frequently accessed data.
5. User Authentication
– Offers APIs to manage user login and identity.
1. User Satisfaction
– The system should give good service to users for many years (minimum 30 years).
– Quality of service (QoS) must be maintained always.
3. Multiuser Management
– The data center should support many users at the same time.
– It should handle activities like traffic control, database updates, and server monitoring.
4. Scalability
– As more users or data come in, the system should be ready to grow.
– Storage, processing power, I/O, power supply, and cooling must be easily expandable.
6. Cost Efficiency
– The total cost must be low for both cloud providers and users.
– This includes hardware, electricity, staff, and maintenance.
9. Service Automation
– Automated tools should manage routine tasks like backups, load balancing, and patch updates.
– This improves speed, accuracy, and reduces manual errors.
1. If a cloud service fails, the whole system may stop, especially if run by a single company.
3. Proprietary APIs cause "lock-in" — users can't easily move apps/data between clouds.
1. Cloud systems are open to cyberattacks like DDoS, malware, and VM hijacking.
3. Some countries require data to stay within their borders, adding legal issues.
1. VMs share CPU/memory well, but I/O (like disk access) causes slowdowns.
1. Cloud systems need storage that can grow and shrink with demand.
2. Debugging cloud errors is hard because bugs appear only at a large scale.
3. Virtual machines and simulators can help collect useful debugging info.
2. One bad user can damage the whole cloud's reputation (e.g., IP blacklisting).
4. Traditional threats
– These include DDoS attacks, phishing, SQL injection, cross-site scripting, etc.
– In clouds, these threats affect many users because resources are shared.
1. Data Breaches
– Unauthorized access to sensitive or confidential data.
4. System Vulnerabilities
– Bugs or flaws in software can allow attackers to exploit systems.
5. Account Hijacking
– Attackers use stolen credentials to take over accounts and services.
6. Malicious Insiders
– Employees or partners with access misuse their privileges.
8. Data Loss
– Accidental deletion, system failure, or lack of backups leads to permanent data loss.
Q.07 c. Select four widely-accepted fair information practices that “Consumer oriented
commercial web sites that collect personal identifying information from or about consumers
online would be required to comply with.
1. Notice
o Websites must clearly inform users about their data collection practices.
o This includes what data is collected, how it is collected (e.g., cookies), how it’s used, and if it is
shared with other entities.
2. Choice
o This includes both internal use (like marketing) and external use (sharing with third parties).
3. Access
4. Security
o Websites must take reasonable steps to protect user data from theft or misuse.
o The approach should be technologically neutral and flexible for future developments.
OR
Q.08 a. Summarize The design goals of Xoar are.
• Xoar is a modified version of Xen, designed to improve system security using microkernel
principles.
• It assumes trusted system administrators manage the system and threats mainly come from guest VMs or
bugs in the management code.
• It maintains all Xen functionalities while controlling privileges tightly—each component gets
only what it needs.
• Interfaces are minimized to reduce attack surfaces, and sharing is avoided or made explicitly logged.
• Components run only when needed to reduce the time window for attacks.
• Modular design reduces the risk and footprint of the system, with only a small performance
impact.
• Examples include: Builder (starts VMs), QEMU (device emulation), and drivers like PCIBack and
NetBack.
Q.08 b. Explain mobile devices and cloud security.
o Mobile apps use cloud services for data storage, backups, and processing because
devices have limited CPU, memory, and storage.
o Mobile devices often connect over public or untrusted Wi-Fi networks, which can be
intercepted by attackers.
o They are frequently lost or stolen, increasing the risk of unauthorized data access.
o Weak device-side authentication (like reused or weak passwords) can let attackers
access cloud accounts.
o Data must be encrypted both while traveling (e.g., TLS/SSL) and while stored in the cloud.
o End-to-end encryption ensures only device users can read sensitive data.
o Malicious or vulnerable apps might access or leak user data saved in the cloud.
o Secure mobile apps need trustworthy APIs with proper access controls.
o Easy to control and monitor but can be a single point of failure or target for attack.
3. User-Based Ratings
o Users give direct feedback (e.g., stars, likes, reviews) after a service or transaction.
o Simple to implement but can be manipulated using fake reviews or Sybil attacks.
4. Behavior-Based Monitoring
o The system monitors actual behavior (e.g., uptime, response time, data accuracy).
o More reliable and objective, but needs complex tracking and analytics.
5. Context-Aware Reputation
6. Time-Based Reputation
o Reputation fades over time if not updated, encouraging ongoing good behavior.
o Prevents users from building high scores and then acting maliciously later.
7. Incentive-Driven Models
o Users are rewarded (credits, trust scores) for providing accurate feedback or behaving
well.
1. On-Demand Self-Service
o Users can access computing resources (like servers, storage) whenever they need, without
human help.
o Services are available over the internet and can be used from laptops, phones, or tablets.
3. Resource Pooling
o Cloud providers share resources (like storage, memory) among many users using
virtualization.
4. Rapid Elasticity
o Users only pay for what they use (like mobile recharge) — helps save money.
6. High Availability
o Cloud platforms make sure services run 24/7 without downtime using backup and load
balancing.
8. Automation
o Many tasks like backups, updates, scaling can be done automatically without manual work.
9. Multi-Tenancy
o Multiple users can use the same cloud system securely and privately.
• Easy-to-use tools for developers to build, test, and deploy applications on the cloud.
o The input data is split into small parts (blocks) for processing.
2. Map Function
3. Shuffling
o The system groups all values with the same key together.
(All <apple, 1> pairs are brought together.)
4. Sorting
5. Reduce Function
6. Output Generation
Simple Example
Map Output:
<apple, 1>, <apple, 1>, <banana, 1>
OR
Q.10 a. Explain with a neat diagram how data flows in running a MapReduce job at
various task trackers using the Hadoop library.
1. Data Partitioning
2. Computation Partitioning
4. Input Reading
o Each Map worker reads its split and passes it to the Map() function.
6. Combiner (Optional)
7. Partitioning Function
o Intermediate data is split into R partitions (one per Reduce task) using: Hash(key) mod
R
Phase 3: Shuffle and Reduce
8. Synchronization
9. Communication
o Reduce workers fetch partitions from all Map workers using RPC.
• Keys are sorted and grouped (all values with same key together).
o Client contacts Master to ask which chunk server has the lease for the chunk and where other
replicas are.
2. Master Responds
o After all servers receive the data, the client informs the Primary to begin mutation.
o Primary assigns serial numbers to maintain write order.
o Primary sends write request to all secondary replicas, enforcing the same
serial order.
6. Secondaries Acknowledge