21CS72 Solutions
21CS72 Solutions
Model Question Paper-1 with effect from 2021 (CBCS Scheme)                                                          applications over the internet on a subscription basis. Users can access these
                                                                                                                                applications from anywhere, eliminating the need for installation and maintenance on
 USN                                                                                                                            local devices.
                             Seventh Semester B.E. Degree Examination                                                           The reference model also emphasizes the importance of dynamic provisioning, which
                                  Subject Title Cloud Computing                                                                 allows for the rapid allocation and release of resources based on user demand. This
                                                                                                                                utility-oriented approach means that users typically pay for what they use, similar to
TIME: 03 Hours                                                                                   Max. Marks: 100                how utilities like water or electricity are billed.
   Note:     01.     Answer any FIVE full questions, choosing at least ONE question from each MODULE.
                                                                                                                              b Explain the differences between public, private and hybrid cloud deployment models.
                                                                                                                                                                                                                              1,   7
                                                                                                                                                                                                                              2
                                                                                                                                Public, private, and hybrid cloud deployment models each serve different needs and use
                                              Module -1                                                    CO    Ma             cases in the realm of cloud computing. Here’s a detailed breakdown of each model:
                                              Download                                                      s    rks
Q.01   a Explain the cloud computing reference model with a neat diagram.
                                                                                                           1,    7
                                                                                                           2
           The cloud computing reference model is a framework that categorizes the various
           services and technologies associated with cloud computing. It highlights the capability
           of cloud computing to deliver a diverse range of IT services on demand, which can lead
           to different perceptions of what cloud computing entails among users. Despite these
           varying interpretations, the model classifies cloud computing services into three
           primary categories:
                                                                                                                                1. Public Clouds :
                                                                                                                                  - Definition : Public clouds are owned and operated by third-party service providers
                                                                                                                                who deliver their computing resources over the internet. These resources include
                                                                                                                                virtualized data centers, storage, and applications.
                                                                                                                                  - Accessibility : They are available to anyone who wants to purchase or subscribe to
                                                                                                                                the services, making them highly scalable and cost-effective.
           1. Infrastructure-as-a-Service (IaaS) : This is the foundational layer of the cloud                                    - Use Cases : Ideal for small to medium-sized businesses or startups that need to
           computing stack, providing virtualized hardware resources such as servers, storage, and                              quickly access IT resources without the overhead of managing physical infrastructure.
           networking. Users can rent these resources on demand, allowing for flexibility and                                   Users can leverage compute, storage, and application services without significant
           scalability without the need for significant capital investment in physical infrastructure.                          upfront investment.
           2. Platform-as-a-Service (PaaS) : This layer offers a platform allowing developers to                                2. Private Clouds :
           build, deploy, and manage applications without worrying about the underlying                                           - Definition : Private clouds are dedicated environments that are exclusively used by
           infrastructure. It provides tools and services that facilitate the development process,                              a single organization. They can be hosted on-premises within the organization’s own
           making it easier to create scalable applications.                                                                    data center or managed by a third-party provider.
                                                                                                                                  - Security and Control : This model offers enhanced security and privacy, making it
           3. Software-as-a-Service (SaaS) : At the top of the stack, SaaS delivers software                                    suitable for organizations with strict regulatory requirements, such as government
                                                                                           JOIN WHATSAPP CHANNEL                                                                                                JOIN WHATSAPP CHANNEL
                                                                                                       OR GROUP                                                                                                             OR GROUP
                                                                                                         21CS72                                                                                                             21CS72
           agencies and financial institutions.                                                                                 provider. This allows businesses to focus on their core activities rather than IT
             - Use Cases : Organizations that need to keep sensitive data in-house or require high                              management.
           levels of customization and control over their IT resources often opt for private clouds.
                                                                                                                                - Increased Agility : Organizations can quickly adapt their IT resources to meet changing
         3. Hybrid Clouds :                                                                                                     business needs without the constraints of capital expenditures for hardware and software.
           - Definition : Hybrid clouds combine elements of both public and private clouds,
         allowing data and applications to be shared between them. This model enables                                           - Ease of Scalability : The cloud's vast capacity allows organizations to handle
         organizations to leverage the benefits of both environments.                                                           unexpected surges in demand efficiently. For instance, they can quickly provision
           - Flexibility : Organizations can use private clouds for sensitive operations while                                  additional servers during peak times and scale down when demand decreases.
         utilizing public clouds for less critical tasks or to handle peak loads when private
         resources are insufficient.                                                                                            - Accessibility : Users can access their data and applications from any device connected
           - Use Cases : This model is becoming increasingly popular as it allows businesses to                                 to the Internet, providing flexibility and convenience.
         scale their resources dynamically and optimize costs while maintaining control over
         sensitive data.                                                                                                        - Utility Model : Cloud computing transforms IT services into a utility model, similar to
       c Elaborate the various cloud computing characteristics and its benefits.                                                how we consume water or electricity. This means organizations can access IT resources
                                                                                                           1,2   6
                                                                                                                                as needed and pay only for what they use.
           Cloud computing offers a range of characteristics that provide significant benefits to both
           cloud service consumers (CSCs) and cloud service providers (CSPs). Here are some of
           the key characteristics and their associated benefits:                                                                                                  OR
                                                                                                                       Q.02   a List & Explain the various cloud computing platforms and technologies.
                                                                                                                                                                                                                              1,   7
           1. No Up-Front Commitments : Users can access cloud services without the need for
                                                                                                                                                                                                                              2
           long-term contracts or significant initial investments. This flexibility allows organizations                        Cloud computing platforms and technologies are diverse and cater to various needs in
           to scale their usage based on current needs.                                                                         the IT landscape. Here’s a detailed overview of the key platforms and technologies
                                                                                                                                associated with cloud computing:
           2. On-Demand Access : Cloud services are available whenever needed, enabling users to
           quickly access resources without delays. This immediacy is crucial for businesses that                               1. Infrastructure-as-a-Service (IaaS) :
           require rapid responses to changing demands.                                                                           - Definition : IaaS provides virtualized computing resources over the internet. It
                                                                                                                                allows users to rent IT infrastructure such as servers, storage, and networking on a pay-
           3. Nice Pricing : The pricing models for cloud services are often competitive and can be                             per-use basis.
           tailored to the user's consumption patterns. Many services operate on a pay-per-use basis,                             - Examples : Amazon Web Services (AWS), Microsoft Azure, and Google Cloud
           meaning organizations only pay for what they use, which can lead to substantial cost                                 Platform (GCP) are prominent IaaS providers. They enable businesses to scale their
           savings.                                                                                                             infrastructure dynamically based on demand, which is particularly useful for
                                                                                                                                applications with fluctuating workloads.
           4. Simplified Application Acceleration and Scalability : Cloud computing allows
           organizations to easily scale their applications up or down based on demand. This is                                 2. Platform-as-a-Service (PaaS) :
           particularly beneficial during peak usage times, as resources can be added or removed                                  - Definition : PaaS offers a platform allowing customers to develop, run, and manage
           without significant effort.                                                                                          applications without the complexity of building and maintaining the underlying
                                                                                                                                infrastructure.
           5. Efficient Resource Allocation : Cloud providers can optimize resource distribution                                  - Examples : Google App Engine, Microsoft Azure App Service, and Heroku are
           across multiple users, ensuring that resources are used effectively and reducing waste.                              examples of PaaS. They provide development tools, middleware, and database
                                                                                                                                management systems, enabling developers to focus on writing code rather than
           6. Energy Efficiency : By utilizing shared resources in large data centers, cloud                                    managing servers.
           computing can lead to lower energy consumption compared to traditional on-premises
           infrastructure.                                                                                                      3. Software-as-a-Service (SaaS) :
                                                                                                                                  - Definition : SaaS delivers software applications over the internet, on a subscription
           7. Seamless Creation and Use of Third-Party Services : Cloud platforms often facilitate                              basis. Users can access these applications via a web browser, eliminating the need for
           the integration of third-party services, allowing organizations to enhance their                                     installation and maintenance.
           applications with additional functionalities without extensive development work.                                       - Examples : Popular SaaS applications include Salesforce, Google Workspace, and
                                                                                                                                Microsoft 365. These services are hosted in the cloud and can be accessed from
            Benefits of Cloud Computing:                                                                                        anywhere, making them highly convenient for users.
           - Reduced Maintenance and Operational Costs : Organizations benefit from lower costs                                 4. Virtualization :
           related to infrastructure maintenance, as these responsibilities shift to the cloud service                            - Definition : Virtualization is a core technology that allows multiple virtual instances
                                                                                           JOIN WHATSAPP CHANNEL                                                                                                JOIN WHATSAPP CHANNEL
                                                                                                       OR GROUP                                                                                                             OR GROUP
                                                                                                       21CS72                                                                                                       21CS72
            of operating systems to run on a single physical machine. It abstracts the hardware                        management of cloud services through rich interfaces and web services.
            layer, enabling efficient resource utilization.
              - Importance : It plays a crucial role in cloud computing by allowing providers to                       4. Service Orientation : This architectural style focuses on providing services to other
            maximize hardware usage and offer scalable services. Technologies like VMware and                          applications through a network. It is essential for the development of cloud services that
            Hyper-V are widely used for virtualization.                                                                can be consumed on-demand.
            5. Distributed Systems :                                                                                   5. Utility Computing : This model treats computing resources as a utility, similar to
              - Definition : A distributed system is a network of independent computers that                           water or electricity, where users pay for what they use. It embodies the pay-per-use
            appears to its users as a single coherent system. This architecture is fundamental to                      concept that is central to cloud computing.
            cloud computing.
              - Characteristics : It enables resource sharing, fault tolerance, and scalability, which                 These technologies have evolved over time, with significant milestones such as
            are essential for cloud services. The cloud infrastructure is essentially a large distributed              mainframe computing, cluster computing, and grid computing paving the way for the
            computing facility.                                                                                        cloud computing paradigm we see today.
                                                                                                                     c Describe the main characteristics of a service-oriented computing                                1,   6
            6. Web 2.0 Technologies :                                                                                                                                                                                   2
              - Definition : Web 2.0 refers to the evolution of the web into a platform for user-                      Service-oriented computing (SOC) is a fundamental paradigm that underpins cloud
            generated content and interactive applications. It includes technologies that facilitate the               computing systems, characterized by several key features:
            delivery and management of cloud services.
              - Examples : AJAX, RESTful APIs, and social media integration are part of Web 2.0                        1. Service Abstraction : At its core, SOC treats services as the primary building blocks
            technologies that enhance user interaction with cloud services.                                            for application and system development. A service is an abstraction that represents a self-
                                                                                                                       describing, platform-agnostic component capable of performing a wide range of
            7. Service Orientation :                                                                                   functions, from simple tasks to complex business processes.
              - Definition : This approach involves designing software applications as a collection
            of services that communicate over a network. It is a key principle in cloud computing.                     2. Interoperability : SOC promotes the development of applications that are flexible,
              - Benefits : It promotes reusability, scalability, and flexibility in application                        low-cost, and interoperable. This means that different services can work together
            development, allowing businesses to adapt quickly to changing needs.                                       seamlessly, regardless of the underlying technology or platform.
            8. Utility Computing :                                                                                     3. Rapid Development : The service-oriented approach allows for the rapid development
              - Definition : Utility computing is a model where computing resources are provided                       of applications. By leveraging existing services, developers can create new applications
            as a metered service, similar to traditional utilities like electricity or water.                          more quickly and efficiently, focusing on integrating various services rather than building
              - Significance : This model underpins the pricing strategies of cloud services,                          everything from scratch.
            allowing users to pay only for what they consume, which can lead to cost savings.
                                                                                                                       4. Quality of Service (QoS) : SOC introduces the concept of QoS, which encompasses a
          cloud computing encompasses a variety of platforms and technologies that work                                set of functional and non-functional attributes used to evaluate service performance.
          together to provide scalable, flexible, and cost-effective IT solutions. Each component                      These attributes can include response time, security, reliability, scalability, and
          plays a vital role in the overall cloud ecosystem, enabling businesses to leverage the                       availability. QoS requirements are typically defined in a Service Level Agreement (SLA)
          power of the cloud for their operations.                                                                     between the service provider and the client.
        b What are the major distributed computing technologies that led to                                 1,   7
          cloud computing.                                                                                  2          5. Web Services : One of the most prominent expressions of SOC is through Web
                                                                                                                       Services (WS). These are software components that expose functionalities accessible via
            The major distributed computing technologies that led to the development of cloud                          method invocation over the Internet, typically using protocols like HTTP. Web services
            computing include:                                                                                         utilize standards such as the Web Service Description Language (WSDL) for defining
                                                                                                                       service characteristics and the Simple Object Access Protocol (SOAP) for
            1. Distributed Systems : These are collections of independent computers that work                          communication.
            together to present themselves as a single coherent system. They are foundational to
            cloud computing, allowing resources to be shared and utilized more efficiently.                            6. Utility Computing : SOC aligns with the concept of utility computing, where
                                                                                                                       computing resources are provided as a service, similar to utilities like water or electricity.
            2. Virtualization : This technology enables the creation of virtual versions of physical                   This model allows users to access services based on their needs without worrying about
            resources, such as servers and storage devices. It allows for better resource management                   the underlying infrastructure.
            and flexibility in deploying applications.
                                                                                                                       7. Dynamic Provisioning : SOC supports dynamic provisioning of IT resources, enabling
            3. Web 2.0 : This refers to the evolution of the web into a platform for user-generated                    organizations to scale their services up or down based on demand. This flexibility is a
            content and interactive applications. Web 2.0 technologies facilitate the delivery and                     significant advantage of cloud computing, allowing for efficient resource management.
                                                                                           JOIN WHATSAPP CHANNEL                                                                                        JOIN WHATSAPP CHANNEL
                                                                                                       OR GROUP                                                                                                     OR GROUP
                                                                                                       21CS72                                                                                                       21CS72
                                                                                                                       allocated to each guest, such as memory and processor frequency, which helps in
            8. Integration and Composition : SOC facilitates the integration of various services,                      meeting service-level agreements (SLAs) and optimizing performance.
            allowing for the composition of applications from multiple service providers. This
            capability enables organizations to create more complex systems by aggregating existing                    6. Isolation : Each virtual environment is isolated from others, which means that
            services, focusing on adding value rather than reinventing the wheel.                                      applications running in one virtual machine do not interfere with those in another. This
                                                                                                                       isolation is crucial for maintaining stability and security in multi-tenant environments,
                                                                                                                       such as cloud computing.
            5. Performance Tuning : Advances in virtualization technology have made it easier to                       2. Storage Virtualization : This technique allows the decoupling of the physical
                                                                                                                       organization of hardware from its logical representation. Users can access their data
            fine-tune the performance of virtual machines. Administrators can control the resources
                                                                                           JOIN WHATSAPP CHANNEL                                                                                        JOIN WHATSAPP CHANNEL
                                                                                                       OR GROUP                                                                                                     OR GROUP
                                                                                              21CS72                                                                                                          21CS72
  using a logical path without worrying about its specific physical location.                                      demand increases.
  3. Network Virtualization : While less popular than execution and storage                                        7. High Availability and Accessibility : Virtualization technologies often provide
  virtualization, it is often a complementary feature necessary for building virtual                               features that enhance the availability of applications and services, ensuring that they can
  computing systems.                                                                                               be accessed remotely and reliably.
  Within execution virtualization, there are various techniques that provide different types                       virtualization has transformed the way IT infrastructure is managed, providing
  of virtual computation environments, such as:                                                                    organizations with the tools to optimize their resources while addressing the growing
  - Bare Hardware : Direct access to hardware resources.                                                           demands for capacity and efficiency. However, it is important to note that
  - Operating System Resources : Virtualization at the OS level.                                                   virtualization also introduces new security challenges that require careful management
  - Low-Level Programming Language : Virtualization that abstracts programming                                     and oversight.
                                                                                                                                                       OR
  language execution.
  - Application Libraries : Virtualization that involves libraries linked to application                 Q.04    a Explain virtualization and cloud computing and pros and cons of                               2,   7
                                                                                                                   virtualization.                                                                               3
  images.
                                                                                                                   Virtualization is a technology that allows the creation of virtual versions of physical
                                                                                                                   resources, such as servers, storage devices, and networks. It enables multiple virtual
  virtualization encompasses a wide range of techniques that enhance the efficiency and                            environments to run on a single physical machine, effectively abstracting the
  manageability of computing environments, particularly in cloud computing contexts.
                                                                                                                   underlying hardware. This technology is particularly significant in cloud computing,
c What is virtualization and what are its benefits.                                             2,   6
                                                                                                3                  where it facilitates the delivery of Infrastructure-as-a-Service (IaaS) and Platform-as-a-
  Virtualization is a technology that creates an abstract environment, allowing multiple                           Service (PaaS) solutions. By using virtualization, organizations can create secure,
  operating systems or applications to run on a single physical machine. It essentially                            customizable, and isolated environments for running applications, even if those
  emulates hardware or software environments, enabling efficient resource utilization and                          applications are untrusted. For instance, you can run a Windows operating system on a
  management. This technology is particularly significant in cloud computing, where it                             virtual machine that is hosted on a Linux server.
  supports Infrastructure-as-a-Service (IaaS) solutions.
                                                                                                                   Cloud computing leverages virtualization to provide on-demand IT infrastructure and
  The benefits of virtualization are numerous:                                                                     services. It allows for the dynamic allocation of resources, enabling organizations to
                                                                                                                   scale their computing capabilities efficiently and cost-effectively. Virtualization plays a
  1. Managed Execution : Virtualization allows for controlled execution environments,                              crucial role in ensuring that cloud services are customizable, secure, and manageable,
  which can be configured to enhance security and manageability. This means that                                   which are essential for delivering IT services effectively.
  applications can run in isolated environments, reducing the risk of interference or
  security breaches.                                                                                                Pros of Virtualization:
                                                                                                                   1. Managed Execution and Isolation : Virtualization allows for the creation of secure
  2. Isolation : Each virtual machine operates independently, meaning that if one                                  and controllable computing environments, which is vital for running applications
  application crashes or is compromised, it does not affect others running on the same                             safely.
  host. This isolation is crucial for maintaining system stability and security.                                   2. Resource Utilization : It enables efficient use of physical resources by allowing
                                                                                                                   multiple virtual machines to share the same hardware, leading to cost savings.
  3. Resource Utilization : Virtualization enables better allocation and partitioning of                           3. Scalability : Virtualization supports the creation of elastically scalable systems,
  resources among different virtual machines. This is particularly beneficial in server                            allowing organizations to provision additional capabilities with minimal costs.
  consolidation scenarios, where multiple workloads can be run on fewer physical                                   4. High Availability : Techniques like live migration allow virtual machines to be
  servers, leading to cost savings and improved efficiency.                                                        moved between physical hosts without downtime, ensuring continuous service
                                                                                                                   availability.
  4. Portability : Virtual machines are typically represented by files that can be easily                          5. Customization : Organizations can tailor their virtual environments to meet specific
  moved between different physical systems. This portability allows for greater flexibility                        needs, enhancing flexibility in service delivery.
  in managing and deploying applications.
                                                                                                                     Cons of Virtualization:
  5. Performance Tuning : Advances in hardware and software have made it easier to                                 1. Security Vulnerabilities : While virtualization can enhance security through
  fine-tune the performance of virtual machines. Administrators can adjust resource                                isolation, it also introduces new security threats that need careful management.
  allocations, such as memory and processing power, to meet specific performance                                   2. Performance Trade-offs : Virtualization can lead to performance overhead, as
  requirements.                                                                                                    resources are shared among multiple virtual machines, which may affect application
                                                                                                                   performance.
  6. Scalability : Virtualization supports the creation of elastically scalable systems,                           3. Complexity : Managing a virtualized environment can be more complex than
  allowing organizations to provision additional resources quickly and cost-effectively as                         traditional setups, requiring specialized skills and tools.
                                                                                              21CS72                                                                                                          21CS72
  4. Dependency on Hypervisors : The performance and security of virtual machines                                  implementation.
  depend heavily on the hypervisor, which can become a single point of failure if not
  managed properly.
                                                                                                                   At the core of this model is the Instruction Set Architecture (ISA), which serves as the
                                                                                                                   interface between hardware and software. The ISA defines the instruction set for the
                                                                                                                   processor, including registers, memory management, and interrupt handling. This
                                                                                                                   foundational layer is critical for the operating system (OS) to function effectively.
  1. Type I Hypervisors : Also referred to as native or bare-metal hypervisors, these run                          There are two primary categories of execution virtualization techniques: process-level
  directly on the physical hardware. They do not require a host operating system to                                and system-level. Process-level techniques operate on top of an existing operating
  function, which allows them to interact directly with the hardware's Instruction Set                             system, leveraging its resources, while system-level techniques interact directly with
  Architecture (ISA). This direct interaction enables better performance and efficiency                            the hardware, requiring minimal support from the OS.
  since the hypervisor can manage guest operating systems without the overhead of a host
  OS. Examples of Type I hypervisors include VMware vSphere (ESX servers) and Xen.                                 Moreover, the model also highlights the importance of security and privilege levels. In
                                                                                                                   a hypervisor-managed environment, guest operating systems typically run in user mode
  2. Type II Hypervisors : These are hosted hypervisors that run on top of an existing                             (Ring 3), preventing them from directly accessing sensitive CPU status. This separation
  operating system. They rely on the host OS to provide virtualization services and                                is vital for maintaining security and isolation between different virtual machines.
  interact with it through the Application Binary Interface (ABI). This means that Type II
  hypervisors are essentially applications running within the host OS, which can
                                                                                                                                                 Module-3
  introduce some performance overhead compared to Type I hypervisors. Examples of                                                                Download
  Type II hypervisors include VMware Workstation and Oracle VirtualBox.                                  Q. 05   a Briefly Explain cloud computing architecture with a neat diagram.                             2,   7
                                                                                                                                                                                                                 3
  Both types of hypervisors enable full virtualization, allowing guest operating systems to                        Cloud computing architecture refers to the structured framework that enables the delivery
  run as if they were on dedicated hardware. They utilize techniques like binary                                   of cloud services. It encompasses various layers and components that work together to
  translation for sensitive instructions and direct execution for non-sensitive ones,                              provide scalable and efficient computing resources over the internet. Here’s a brief
  ensuring efficient operation of virtual machines.                                                                overview of the key elements of cloud computing architecture:
c Discuss machine reference model of execution virtualization.                                  2,   6
                                                                                                3
  The machine reference model of execution virtualization is a crucial framework that
  defines how different levels of the computing stack interact while abstracting
  implementation details. This model is essential for virtualizing execution environments,
  as it establishes clear interfaces between various layers, simplifying their
                                                                                                     21CS72                                                                                                  21CS72
        c What is SAAS. Explain its characteristics and its initial benefits.                          2,   6
                                                                                                       3
          Software-as-a-Service (SaaS) is a software delivery model that provides users with
          access to applications over the Internet as a web-based service. This model allows users
          to utilize software without the need for complex hardware or software management, as
          these tasks are handled by third-party providers. Here are some key characteristics and
          initial benefits of SaaS:
            Characteristics of SaaS:
          1. Application Access : Users access applications via the Internet, typically through a
          web browser, which means they do not need to install software on their local machines.
          2. Centralized Management : The applications are centrally managed by the service
          provider, ensuring that updates, maintenance, and security are handled without user
          intervention.
          3. One-to-Many Service Delivery : SaaS operates on a multi-tenant architecture, where
          a single instance of the application serves multiple users or organizations, optimizing
          resource use and cost.
          4. Subscription-Based Pricing : Users typically pay a recurring fee to access the
          software, which can be structured as a subscription or pay-as-you-go model, making it
          financially accessible.                                                                                 1. Software Delivery Model : PaaS delivers a complete development and deployment
          5. Customization and Integration : SaaS applications can often be customized to meet                    environment in the cloud, which includes hardware, software, and tools necessary for
          specific user needs and can integrate with other services and applications, enhancing                   application development. This means developers can focus on writing code and
          their functionality.                                                                                    developing applications rather than worrying about the infrastructure.
            Initial Benefits of SaaS:                                                                             2. Automation : PaaS environments automate the deployment of applications, scaling
          1. Cost Reduction : SaaS significantly lowers software costs and total cost of                          them as needed based on demand. This automation is typically governed by a Service
          ownership (TCO) since users do not need to invest in hardware or pay large upfront                      Level Agreement (SLA) between the customer and the provider, which is not a native
          licensing fees.                                                                                         feature of Infrastructure-as-a-Service (IaaS) solutions.
          2. Service-Level Improvements : Providers often offer service-level agreements
          (SLAs) that guarantee certain performance and availability standards.                                   3. Development Tools and APIs : PaaS offerings provide developers with various
          3. Rapid Implementation : Users can quickly start using the software without lengthy                    services and APIs that simplify the creation and delivery of applications. These tools
          installation processes, allowing for faster deployment and time-to-value.                               often include components for application monitoring, management, and reporting,
          4. Standalone and Configurable Applications : SaaS applications can be configured to                    which are essential for maintaining application performance and reliability.
          meet specific business needs while remaining standalone solutions.
          5. Rudimentary Application and Data Integration : Early SaaS offerings provided basic                   4. Integration Capabilities : PaaS solutions allow for the integration of third-party
          integration capabilities, allowing users to connect with other applications and data                    services through standard interfaces and protocols, making application development
          sources.                                                                                                more agile and responsive to user needs.
          SaaS has evolved from its initial offerings to become a robust and flexible model that                  5. Vendor Lock-in : One of the significant concerns with PaaS is the potential for
          continues to gain acceptance in the cloud computing landscape, providing significant                    vendor lock-in. Unlike IaaS, which offers more flexibility in terms of the software
          advantages to businesses of all sizes.                                                                  stack, PaaS environments often bind applications to specific runtimes and APIs
                                              OR                                                                  provided by the vendor, making it challenging to migrate applications to other
Q. 06   a Explain PAAS with a neat diagram.                                                            2,   7     platforms.
                                                                                                       3
          Platform-as-a-Service (PaaS) is a cloud computing service model that provides a                         6. Cost Efficiency : PaaS can reduce costs associated with application development,
          platform allowing developers to build, deploy, and manage applications without the                      deployment, and management. By offloading the responsibility of technology upgrades
          complexity of maintaining the underlying infrastructure. Here are some key aspects of                   to the PaaS provider, organizations can focus on their core business activities.
          PaaS:
                                                                                                                  7. Categories of PaaS : PaaS solutions can be categorized into three main types:
                                                                                                                    - PaaS-I : Offers a fully integrated development environment hosted in the cloud.
                                                                                                                    - PaaS-II : Focuses on providing scalable infrastructure primarily for web
                                                                                                                  applications.
                                                                                                                    - PaaS-III : Provides a cloud programming platform for various types of applications,
                                                                                       JOIN WHATSAPP CHANNEL                                                                                    JOIN WHATSAPP CHANNEL
                                                                                                   OR GROUP                                                                                                 OR GROUP
                                                                                               21CS72                                                                                                            21CS72
  not limited to web apps.                                                                                            option for businesses of all sizes.
   Popular PaaS providers include Microsoft Azure, Google App Engine, and Heroku,                                  c List and Explain some of the challenges in cloud computing.                                   2,   6
   each offering unique features and capabilities tailored to different development needs.                                                                                                                         3
   Overall, PaaS is designed to streamline the application development process, making it                            Cloud computing presents several challenges that need to be addressed for its effective
   easier for developers to create and deploy applications in a cloud environment.                                   adoption and management. Here are some of the key challenges:
                                                                                                                     1. Security, Trust, and Privacy : One of the most significant obstacles to widespread
b Describe the fundamental features of the economic and business                                 2,   7              cloud adoption is the concern over security, trust, and privacy. Traditional
  model behind cloud computing.                                                                  3                   cryptographic technologies are employed to protect sensitive data from tampering and
                                                                                                                     unauthorized access. However, the use of virtualization technologies introduces new
  The economic and business model behind cloud computing is primarily driven by
                                                                                                                     vulnerabilities that were not previously considered. For instance, while data may be
  several key features that enhance efficiency and reduce costs for organizations. Here are
                                                                                                                     encrypted and stored securely in the cloud, it must be decrypted by applications that
  the fundamental aspects:
                                                                                                                     process it. This creates potential risks, especially if those applications are hosted in a
                                                                                                                     managed virtual environment. Determining liability for data breaches and ensuring that
  1. Pay-as-you-go Model : One of the most significant advantages of cloud computing is
                                                                                                                     systems are secure and trustworthy from technical, social, and legal perspectives are
  its financial model, which allows businesses to pay only for the resources they use. This
                                                                                                                     ongoing challenges.
  eliminates the need for large upfront capital investments in IT infrastructure, making it
  more accessible for startups and smaller enterprises.
                                                                                                                     2. Interoperability and Standards : The lack of standardized protocols and
                                                                                                                     interoperability between different cloud services can hinder seamless integration and
  2. Reduction of Capital Costs : Cloud computing helps organizations reduce capital
                                                                                                                     migration between platforms. Vendor lock-in is a major concern, as organizations may
  costs associated with purchasing and maintaining IT infrastructure. Instead of investing
                                                                                                                     find it difficult to switch providers without incurring significant costs or disruptions.
  heavily in hardware and software, companies can leverage cloud services, which
                                                                                                                     Establishing common standards is essential to facilitate interoperability and reduce the
  transform these capital expenses into operational costs.
                                                                                                                     risks associated with vendor lock-in.
  3. Elimination of Depreciation Costs : By using cloud services, businesses can avoid
                                                                                                                     3. Organizational Aspects : Cloud computing fundamentally changes how IT services
  the depreciation costs associated with owning IT assets. This is particularly beneficial
                                                                                                                     are consumed and managed. This shift requires organizations to adapt their business
  as technology evolves rapidly, and organizations often find themselves with outdated
                                                                                                                     processes and cultural attitudes towards IT. The introduction of a pay-as-you-go billing
  equipment.
                                                                                                                     model necessitates a new level of maturity in organizational processes. IT departments
                                                                                                                     may need to redefine their roles and responsibilities, which can lead to challenges in
  4. Subscription-Based Software Licensing : Cloud computing typically replaces
                                                                                                                     workforce management and skill requirements. The transition may also create tensions
  traditional software licensing with subscription models. This means that organizations
                                                                                                                     between different groups within an organization as they adjust to new ways of working.
  can access the latest software without the burden of purchasing licenses upfront,
  allowing for more flexibility and cost management.
                                                                                                                     4. Scalability and Fault Tolerance : Designing cloud systems that are both highly
                                                                                                                     scalable and fault-tolerant is a significant technical challenge. As demand for services
  5. Lower Maintenance and Administrative Costs : Cloud providers handle the
                                                                                                                     fluctuates, cloud infrastructures must be able to scale up or down efficiently while
  maintenance and administration of IT resources, which reduces the burden on internal
                                                                                                                     maintaining performance. Additionally, ensuring that these systems can recover quickly
  IT teams. This can lead to significant savings in terms of labor costs and allows IT staff
                                                                                                                     from failures is crucial for maintaining service availability and reliability.
  to focus on more strategic initiatives.
                                                                                                                     5. Management of Cloud Systems : The management of cloud computing systems
  6. Tiered and Per-Unit Pricing Models : Cloud providers often offer tiered pricing,
                                                                                                                     involves complexities that differ from traditional IT environments. Organizations must
  where services are available at different levels of performance and cost, as well as per-
                                                                                                                     develop new strategies for monitoring, managing, and optimizing cloud resources,
  unit pricing based on specific usage metrics (like data transfer or memory allocation).
                                                                                                                     which can be more dynamic and distributed than on-premises systems. This includes
  This flexibility allows businesses to tailor their cloud usage to their specific needs and
                                                                                                                     addressing issues related to resource allocation, performance monitoring, and cost
  budget.
                                                                                                                     management.
  7. Environmental and Indirect Cost Savings : Utilizing cloud services can also lead to a                           while cloud computing offers numerous benefits, these challenges must be carefully
  reduction in indirect costs, such as carbon footprint emissions. For instance, by                                  navigated to ensure successful implementation and operation.
  consolidating data centers and optimizing resource usage, companies can lower their                                                                Module-4
  environmental impact and potentially reduce taxes related to emissions in certain                                                                  Download
  regions.                                                                                                 Q. 07   a Explain operating system security and virtual machine security.
                                                                                                                                                                                                                   3,   10
   the economic model of cloud computing not only provides financial benefits but also                                                                                                                             4
                                                                                                                     Operating system security and virtual machine security are two critical aspects of
   promotes operational efficiency, scalability, and flexibility, making it an attractive
                                                                                JOIN WHATSAPP CHANNEL                                                                                              JOIN WHATSAPP CHANNEL
                                                                                            OR GROUP                                                                                                           OR GROUP
                                                                                               21CS72                                                                                                            21CS72
  ensuring the integrity and confidentiality of data in computing environments, especially                            Shared Images:
  in cloud computing.                                                                                                When users opt to utilize shared images, such as Amazon Machine Images (AMIs) in
                                                                                                                     the Infrastructure as a Service (IaaS) model, they expose themselves to various security
   Operating System Security :                                                                                       vulnerabilities. One major concern is that these images can be accessed by multiple
  Operating systems (OS) are complex software systems that manage hardware and                                       users, which increases the risk of unauthorized access and data breaches. For instance,
  software resources on a computer. They consist of millions of lines of code, making                                if a user employs a popular AMI, they may inadvertently inherit vulnerabilities or
  them vulnerable to a wide range of attacks. One of the main challenges in OS security is                           malicious code embedded within that image. This can lead to issues such as:
  the inadequate isolation between applications. If one application is compromised, it can
  potentially affect the entire platform and all other applications running on it. This is                           1. Data Leakage: Sensitive data may be exposed if the shared image contains remnants
  because the security level of the platform is reduced to that of the most vulnerable                               of previous users' data or configurations.
  application. Additionally, traditional operating systems provide weak mechanisms for                               2. Malicious Code: Attackers can exploit shared images to distribute malware, which
  applications to authenticate each other, and there is often no trusted path for users to                           can then affect all users utilizing that image.
  interact with applications securely. This lack of robust security measures can lead to                             3. Unsolicited Connections: Instances running on shared images may establish
  unauthorized access and data theft.                                                                                outgoing connections that leak privileged information, such as IP addresses or system
                                                                                                                     logs, to unauthorized entities.
   Virtual Machine Security:
  Virtual machine (VM) security, on the other hand, leverages virtualization technology                               Management Operating System (OS):
  to enhance security. A Virtual Machine Monitor (VMM), or hypervisor, is responsible                                The management OS, which is responsible for creating and managing virtual machines
  for managing multiple VMs on a single physical machine. One of the key advantages of                               (VMs), also introduces several security risks:
  virtualization is that it provides stronger isolation between VMs compared to the
  isolation between processes in a traditional OS. This means that if one VM is                                      1. Vulnerabilities in the Management OS: The management OS can be a target for
  compromised, the others can remain secure. The VMM controls access to hardware and                                 attacks, as it has control over the hypervisor and the VMs. If compromised, an attacker
  can enforce memory isolation, disk access, and network access, which helps mitigate                                could manipulate the VMs or access sensitive data.
  security risks.                                                                                                    2. Dynamic MAC Address Assignment: In virtual environments, VMs are often
                                                                                                                     assigned random MAC addresses to avoid collisions. This can complicate the
                                                                                                                     identification of malicious systems, making it harder to secure the network.
                                                                                                                     3. Limited User Control: Users have minimal control over where their sensitive data is
                                                                                                                     stored, as it may be distributed across multiple servers. This lack of control can lead to
                                                                                                                     data being left on servers indefinitely, increasing the risk of unauthorized access.
                                                                                                                     4. Data Recovery Risks: The management OS may retain snapshots or backups of
                                                                                                                     VMs, which can lead to situations where deleted data is not truly erased, allowing
                                                                                                                     potential recovery by unauthorized users.
                                                                                                                     shared images and the management OS present critical security challenges in cloud
                                                                                                                     environments, necessitating robust security measures and user awareness to mitigate
                                                                                                                     these risks effectively.
                                                                                                                                                        OR
  FIGURE 9.2 (a) Virtual security services provided by the VMM. (b) A dedicated                            Q. 08   a Explain the concept of privacy impact assessment and its importance in cloud
  security VM                                                                                                                                                                                                      3,   10
                                                                                                                     computing.
                                                                                                                                                                                                                   4
  the security of a virtualized environment is contingent upon the integrity of the VMM                              Privacy Impact Assessment (PIA) is a crucial process designed to evaluate the potential
  and the management operating system (often referred to as Dom0 in Xen                                              effects that a project or system may have on the privacy of individuals. In the context of
  environments). If either of these components is compromised, the security of all VMs                               cloud computing, where sensitive data is often stored and processed, conducting a PIA
  can be jeopardized. Moreover, while VMMs are generally smaller and less complex                                    is particularly important.
  than traditional operating systems, they still introduce their own set of vulnerabilities.
  For instance, the management OS is responsible for creating VMs and transferring data,                             As of mid-2012, there were no international standards for PIAs, although various
  which can also be a point of attack.                                                                               countries and organizations require PIA reports. The assessment typically involves
                                                                                                                     analyzing legal implications, such as compliance with regulations like the U.K.-U.S.
b Explain the security risks posed by shared images and management os.                           3,   10             Safe Harbor process, which helps U.S. companies adhere to European data protection
                                                                                                 4                   laws. This proactive approach encourages organizations to embed privacy
  The security risks posed by shared images and the management operating system (OS)                                 considerations into their systems from the outset, rather than making reactive changes
  in cloud computing environments are significant and multifaceted.                                                  later that could disrupt functionality.
                                                                                                                      3. Third-Party Data Control Threats : With multitenancy, where multiple users share the
                                                                                                                      same cloud resources, there are risks associated with data isolation. Vulnerabilities in the
                                                                                                                      virtualization management layer (VMM) can open new attack channels, making it
                                                                                                                      difficult to trace the actions of an attacker. Additionally, the rapid write operations in
                                                                                                                      cloud storage can erase forensic evidence, complicating investigations into security
                                                                                                                      incidents.
                                                                                                                      - Unauthorized Access and Data Theft : Users worry about their confidential
                                                                                                                      information being accessed without permission. Data is particularly vulnerable when
                                                                                                                      stored, as it remains exposed for longer periods compared to when it is actively
                                                                                                                      processed.
                                                                                                                      - Malicious Insiders : The risk posed by rogue employees within a CSP is significant, as
                                                                                                                      these individuals may have access to sensitive data without adequate oversight.
                                                                                                                      - Account or Service Hijacking : Users must be vigilant against credential theft, which
                                                                                                                      can lead to unauthorized access to their cloud services.
                                                                                                                      - Unknown Risk Profile : Users often face risks stemming from their lack of knowledge
                                                                                                                      about the security measures in place at the CSP, including potential vulnerabilities in the
                                                                                                                      cloud infrastructure itself.
                                                                                                                                                     Module-5
                                                                                                                                                     Download
                                                                                                          Q. 09   a    Explain the core components of Google app engine.                                             3, 4   10
                                                                                  JOIN WHATSAPP CHANNEL                                                                                                JOIN WHATSAPP CHANNEL
                                                                                              OR GROUP                                                                                                             OR GROUP
                                                                                                21CS72                                                                                                               21CS72
  Google App Engine is a powerful platform as a service (PaaS) that allows developers                                  i)      Animoto
  to build and host scalable web applications. It is structured around four core
  components:
  1. Infrastructure : This is the backbone of App Engine, designed to efficiently serve                               Animoto is a popular cloud-based application that allows users to create videos easily
  user requests. It utilizes a vast network of servers located in Google’s data centers.                              and quickly. The platform provides a user-friendly interface where individuals can
  When an HTTP request is made, App Engine identifies the servers hosting the                                         upload images, music, and video clips. Users can select a specific theme for their
  application, assesses their load, and allocates additional resources if necessary. This                             video, arrange the media in the desired order, and choose a soundtrack. Once the
  design allows for seamless handling of requests without the need for state information                              storyboard is set, the rendering process occurs in the background, and users are notified
  to be maintained between them, simplifying the infrastructure's workload.                                           via email when their video is ready.
  2. Runtime Environment : App Engine supports multiple programming languages,                                        The core innovation of Animoto lies in its proprietary artificial intelligence (AI)
  including Java, Python, and Go. This environment provides the necessary tools and                                   engine, which automatically selects animation and transition effects based on the
  services that developers need to create applications. It includes features for data access,                         uploaded media. This means users can create visually stunning videos without needing
  account management, messaging, and more, which streamline common web                                                extensive video editing skills or intervention. The service is particularly appealing for
  application operations.                                                                                             those looking to produce high-quality videos for personal or professional use without
                                                                                                                      the steep learning curve typically associated with video editing software.
  3. Storage : App Engine offers a service called DataStore, which is optimized for
  storing semi-structured data. Unlike traditional relational databases, DataStore allows                              ii)     Maya Rendering with Aneka
  for more flexibility in data structure and access patterns, making it suitable for web
  applications that require quick data retrieval without strict constraints.
             iii) Video Encoding on Cloud: Encoding.com                                                            - Elasticity and Cost-Effectiveness : One of the primary advantages of using cloud
            Video encoding and transcoding are computationally intensive tasks that can be                         infrastructure for ECG analysis is its elasticity. The cloud can dynamically scale
            effectively managed using cloud technologies. Encoding.com is a prime example of a                     resources up or down based on demand, which means hospitals do not need to invest
            cloud-based service that specializes in these operations. With the increasing demand                   heavily in physical infrastructure. This flexibility allows for more effective budget
            for video content across various devices and formats, cloud solutions provide the                      utilization.
            necessary infrastructure to handle the complexities of video encoding.
                                                                                                                   - Ubiquity and Accessibility : Cloud-hosted systems can be accessed from any
            Cloud technologies allow for flexible and scalable video processing, enabling users to                 internet-enabled device, ensuring that healthcare providers can retrieve and analyze
            convert videos from one format to another without the prohibitive costs associated with                ECG data without being tied to specific locations or hardware. This accessibility is
            traditional software and hardware solutions. This service is particularly beneficial for               crucial for timely medical interventions.
            businesses and individuals who need to deliver video content across multiple
            platforms, ensuring compatibility and quality without the need for extensive in-house                  - Integration with Existing Systems : Cloud technologies can be easily integrated with
            resources.                                                                                             existing hospital systems, enhancing the overall workflow. For instance, a cloud-based
                                                                                                                   web service can store ECG data and process it using scalable cloud resources, ensuring
                                                  OR                                                               that healthcare professionals receive timely alerts if anomalies are detected.
Q. 10   a    Explain in detail about the application of cloud computing in                             3, 4   10
             i)Healthcare: ECG analysis in the cloud ii)Geoscience: satellite image processing                     - Cost Savings : Cloud services typically operate on a pay-per-use model, which
                                                                                                                   means healthcare providers only pay for the resources they actually use. This pricing
            Cloud computing has significantly transformed various sectors, including healthcare                    structure can lead to significant cost savings compared to traditional in-house systems.
            and geoscience, by providing scalable and efficient solutions. Let's delve into the
            applications in these two areas:                                                                        ii) Geoscience: Satellite Image Processing
             i) Healthcare: ECG Analysis in the Cloud
                                                                                                                   In the field of geoscience, cloud computing is revolutionizing the way satellite images
                                                                                                                   are processed and analyzed. Here are some details about this application:
                                                                                                       21CS72                                                                                                 21CS72
            - Handling Large Data Volumes : Satellite remote sensing generates vast amounts of
            data, often hundreds of gigabytes of raw images. Cloud computing provides the
            necessary infrastructure to process these large datasets efficiently, which is essential
            for generating various Geographic Information System (GIS) products.
            - I/O and Compute-Intensive Tasks : The processing of satellite images involves both
            input/output operations and computationally intensive tasks. Cloud computing can
            handle these demands by providing scalable resources that can be adjusted based on
            the workload.
            - Efficient Workflow Management : The use of cloud computing allows for the                            1. Compute Services :
            creation of workflows that can process satellite images in a streamlined manner. For                     - Amazon Elastic Compute Cloud (EC2) : This is the cornerstone of AWS's compute
            instance, a workflow engine can manage the sequence of operations required to                          services, allowing users to deploy virtual servers (instances) based on specific images.
            transform raw satellite images into usable data products.                                              EC2 provides the flexibility to scale computing resources up or down as needed.
                                                                                                                     - AWS Elastic Beanstalk : A PaaS offering that simplifies the deployment and
            - Accessibility and Collaboration : Cloud computing enhances collaboration among                       management of applications by automatically handling the infrastructure provisioning,
            researchers and scientists by providing a centralized platform where data can be                       load balancing, and scaling.
            accessed and processed. This accessibility fosters innovation and allows for the sharing                 - AWS Lambda : A serverless computing service that lets you run code without
            of insights across different teams and organizations.                                                  provisioning or managing servers, automatically scaling based on the number of
                                                                                                                   requests.
                                                                                                                   2. Storage Services :
                                                                                                                     - Amazon Simple Storage Service (S3) : A highly scalable object storage service that
                                                                                                                   allows users to store and retrieve any amount of data from anywhere on the web. It
                                                                                                                   organizes data in "buckets" and "objects," making it easy to manage and access.
                                                                                                                     - Amazon Elastic Block Store (EBS) : Provides block-level storage volumes for use
                                                                                                                   with EC2 instances, offering persistent storage that can be attached to instances.
                                                                                                                     - Amazon RDS (Relational Database Service) : A managed database service that
                                                                                                                   supports various database engines, making it easier to set up, operate, and scale
                                                                                                                   relational databases in the cloud.
 Advantages of AWS:                                                                                  2
                                                                                                                Illustrate various virtualization concepts.
- Scalability : AWS services can scale up or down based on demand, allowing
businesses to handle varying workloads efficiently.
                                                                                                     3
- Cost-Effectiveness : With a pay-as-you-go pricing model, users only pay for the                               Identify the architecture, infrastructure and delivery models of cloud computing.
resources they consume, reducing upfront costs associated with traditional
infrastructure.
- Global Reach : AWS has data centers in multiple regions around the world, enabling                 4
                                                                                                                Understand the Security aspects of CLOUD.
low-latency access and compliance with local regulations.
- Security : AWS provides a robust security framework, including data encryption,
identity and access management, and compliance certifications.                                       5
                                                                                                                Define platforms for development of cloud applications
 Use Cases:
AWS is utilized across various sectors, including healthcare for managing patient data,
enterprise resource planning (ERP) systems for businesses, and collaborative tools like
Google Docs for document sharing and editing.
                                                                                                     PROGRAM OUTCOMES (POs)
                                                                                                     1   Engineering Knowledge             5   Modern tool usage              9     Individual and Team-Work
                                                                                                     2   Problem Analysis                  6   Engineer and Society           10    Communication
                                                                                                     3   Design    /    Development        7   Environment            and     11    Project Management and
                                                                                                         Solutions                             Sustainability                       Finance
                                                                                                     4   Conduct Investigations       of   8   Ethics                         12    Life-long Learning
                                                                                                         Complex problems
Page 02 of 02