Cloud Computing Solved Model Question Paper
Cloud Computing Solved Model Question Paper
Note: 01. Answer any FIVE full questions, choosing at least ONE question from each MODULE.
1. Physical Model
Represents the hardware layout of the system.
Nodes: Devices (servers, PCs) that process and communicate.
Links: Communication channels (wired/wireless) like point-to-point or
broadcast.
Middleware: Software that enables communication, fault tolerance,
synchronization. L2 10
Network Topology: Structure of node connections (bus, star, ring, mesh).
Protocols: TCP, UDP, MQTT used for secure and efficient data exchange.
2. Architectural Model
Defines the system's organization and interaction patterns.
Client-Server Model: Centralized server responds to client requests (e.g.,
web services).
Peer-to-Peer (P2P): All nodes are equal and share services (e.g.,
BitTorrent).
Layered Model: Organized into layers for modular design and abstraction.
Microservices Model: Small, independent services performing specific
functions, enhancing scalability.
3. Fundamental Model
Covers key concepts and formal behaviors.
Interaction Model:
o Message Passing: Synchronous/asynchronous communication.
o Publish/Subscribe: Topics-based messaging.
Failure Model:
o Types: Crash, omission, timing, Byzantine failures.
o Handling: Replication, fault detection, recovery methods.
Security Model:
o Authentication: Passwords, keys, multi-factor verification.
o Encryption: Protects data confidentiality.
o Data Integrity: Hashing and digital signatures to prevent tampering.
OR
Q.02 a Write short notes on Peer-to-Peer network families.
Definition
P2P architecture is a distributed model where each node (peer) acts as
both client and server, sharing resources without a central authority.
2. Characteristics
Decentralization: No central server; peers communicate directly.
L2 10
Scalability: Easily grows to support more users.
Fault Tolerance: Network survives even if some nodes fail.
Resource Sharing: Peers contribute bandwidth, storage, and data.
Autonomy: Each peer manages its own data and functions.
5. Bootstrapping in P2P
Helps new peers discover others and connect.
Can use centralized servers, peer exchange, or DHTs.
6. Data Management
Storage: Distributed across peers.
Retrieval: Uses search algorithms.
Replication: Increases availability.
Consistency: Ensures all replicas are up to date.
7. Routing Algorithms
Flooding: Sends to all neighbors — high traffic.
Random Walk: Selects random paths — less overhead.
DHTs: Efficient lookups via hash tables (e.g., Kademlia).
Small-World Routing: Uses short paths and local/global links.
8. Advantages
No central point of failure
Efficient resource utilization
Cost-effective
High availability due to replication
9. Challenges
Difficult to scale with efficiency
Security risks from malicious nodes
Inconsistent content quality
Complex consistency and data management
2. Data Loss
(i) Attacks such as malware, hacking, or unauthorized access can result in
loss or theft of sensitive data.
(ii) Loss of intellectual property, customer information, or confidential
business records affects compliance and trust.
3. Reputational Loss
(i) A successful cyber attack damages an organization’s public image and
brand value.
(ii) Customers may lose confidence, leading to a decline in user base and
revenue.
4. Operational Loss
(i) Cyber threats like Denial of Service (DoS) can bring down servers,
disrupting business operations.
(ii) Delays in service delivery and system downtime reduce productivity
and efficiency.
Module-2
Q. a Explain in detail about Implementation Levels of virtualization.
03
1. Instruction Set Architecture (ISA) Level Virtualization
1. Emulates a guest ISA on a host with a different ISA.
2. Allows execution of legacy or cross-platform binary code.
3. Achieved through code interpretation or dynamic binary translation.
4. Very flexible but has low performance due to instruction overhead.
5. Adds a software translation layer between compiler and processor.
L2 10
4. Library Support Level Virtualization
1. Virtualizes the API layer between apps and OS.
2. Allows apps to run in different environments (e.g., WINE for Windows
apps on UNIX).
3. Less overhead than full system virtualization.
4. Not all applications may work correctly.
5. Useful for GPU virtualization (e.g., vCUDA).
5. User/Application-Level Virtualization
1. Virtualizes individual applications as isolated units.
2. Examples include JVM (.java) and .NET CLR (.NET apps).
3. Easy to deploy and portable across platforms.
4. Limited isolation compared to lower-level virtualization.
5. Used in sandboxing, application streaming, and secure app deployment.
b Explain how Migration of Memory, Files, and Network Resources happen in 2, 3 7
cloud computing.
1. Memory Migration
Moves the VM’s memory state from source to destination host.
Internet Suspend-Resume (ISR) technique uses temporal locality to avoid
redundant transfers.
Tree-based file structures allow only changed files to be sent.
ISR results in high downtime, suitable for non-live migrations.
Efficient memory handling is essential due to large size (MBs to GBs) and
need for speed.
3. Network Migration
Migrated VMs must retain all open network connections.
VMs use virtual IP/MAC addresses, independent of host hardware.
ARP replies notify the network of new locations (on LAN).
Live migration enables no downtime, with iterative precopy or postcopy
techniques.
Precopy allows continuous execution but may suffer network load;
postcopy reduces data size but increases downtime.
4. Live Migration Using Xen
Xen supports live VM migration with minimal service interruption.
Dom0 manages migration, using send/receive and shadow page tables.
RDMA enables fast transfer by bypassing TCP/IP stack and CPU.
Memory compression is used to reduce data size and overhead.
Migration daemons track and send modified pages based on dirty
bitmaps.
OR
Q.04 a Explain VM based intrusion detection system. L2 10
Responsibility Clarification
Providers:
o Deploy and manage IDS (host, hypervisor, virtual network).
o Must notify customers (via SLA) of any relevant attacks.
Customers:
o Deploy HIDS inside VMs.
o Integrate IDS into their monitoring systems.
o Must negotiate visibility/alerts via contracts.
b Write steps for Creating a Virtual Machine: Configure and deploy a virtual L2 7
machine with specific CPU and memory requirements in Google Cloud.
[or]
Example:
Run:
✅ 1. Definition
IaaS (Infrastructure as a Service): Provides virtualized computing
resources like servers, storage, and networking.
PaaS (Platform as a Service): Offers a development environment with
tools to build, test, and deploy applications.
SaaS (Software as a Service): Delivers fully functional software
applications over the internet.
✅ 2. Users
IaaS: Network architects, IT administrators, skilled developers.
PaaS: Software developers and programmers.
SaaS: End-users, business teams, consumers.
✅ 3. Technical Knowledge Required
IaaS: High technical knowledge.
PaaS: Moderate coding knowledge.
SaaS: No technical knowledge needed.
✅ 4. User Controls
IaaS: Full control (OS, runtime, middleware, applications).
PaaS: Control over app and data only.
SaaS: No control (everything managed by provider).
✅ 5. Examples
IaaS: AWS EC2, Microsoft Azure, Google Compute Engine.
PaaS: Google App Engine, AWS Elastic Beanstalk, IBM Cloud.
SaaS: Google Workspace, Salesforce, Zoom, Microsoft 365.
✅ 6. Use Cases
IaaS: Hosting websites, big data analytics, backup and recovery.
PaaS: Developing web/mobile apps, APIs, microservices.
SaaS: Email, CRM, video conferencing, document collaboration.
L2 7
2. Private Cloud
Used by a single organization; exclusive access.
Hosted on-premises or by a third party.
Offers greater control and security.
Advantages:
Full control over resources and policies.
High data security and privacy.
Supports legacy systems.
Customizable for specific needs.
Disadvantages:
Expensive to implement and maintain.
Limited scalability compared to public cloud.
3. Hybrid Cloud
Combines public and private clouds using proprietary software.
Allows data and apps to move between environments.
Advantages:
Flexible and customizable.
Cost-effective (uses public cloud scalability).
Better security with data segmentation.
Disadvantages:
Complex to manage.
Slower data transmission due to integration.
4. Community Cloud
Shared by multiple organizations with similar interests or concerns.
Managed internally or by a third-party.
Advantages:
Cost-effective due to shared resources.
Good security and collaboration.
Enables efficient data and infrastructure sharing.
Disadvantages:
Limited scalability.
Customization is difficult due to shared setup.
5. Multi-Cloud
Uses multiple public cloud providers simultaneously.
Not limited to a single vendor or architecture.
Advantages:
Mix and match best features of different providers.
Low latency (choose nearest regions).
High availability and fault tolerance.
Disadvantages:
Complex architecture.
Potential security risks due to integration gaps.
✅ Choosing the Right Cloud Deployment Model
Factors to Consider:
Cost – Budget for infrastructure and service.
Scalability – Ability to scale with growing demand.
Ease of Use – Skill level required to manage the cloud.
Compliance – Adherence to legal and regulatory standards.
Privacy – Type and sensitivity of data being stored/processed.
➡ No one-size-fits-all – the best deployment model depends on current business
requirements. You can switch models as your needs evolve.
OR
Q. a Write short notes on global exchange of cloud resources L2 10
06
Global Exchange of Cloud Resources is the process of using cloud
services in different parts of the world and countries.
It allows businesses and organizations to deploy, manage, and grow their
infrastructure all over the world.
This process is made possible by cloud providers such as Amazon Web
Services (AWS), Microsoft Azure, and Google Cloud, which provide data
centers in different regions of the world.
Such services enable organizations to provide resources cost-effectively,
with little delay, and achieve high availability as well as regional
compliance.
1. Geographical Distribution
Cloud resources are hosted across a network of global data centers
spread across various regions.
This allows organizations to serve users from different locations with
minimal delay, improving the overall user experience.
2. Load Balancing
Cloud service providers offer load balancing across regions.
This ensures that computing power and resources are efficiently distributed
to meet fluctuating demands across different regions.
3. Redundancy and Availability
The global exchange enables redundancy by hosting data in multiple
locations.
In the event of a system failure in one region, data and applications can still
be accessed from other regions, ensuring high availability.
4. Latency Reduction
By locating resources closer to the end-users, latency is reduced
significantly.
This enhances the performance of cloud-hosted applications, providing
users with faster access to services regardless of their physical location.
5. Cost Efficiency
Pay-as-you-go models and cost-effective regional pricing allow
businesses to optimize their cloud expenditures.
Companies only pay for the resources they use in specific regions, enabling
better cost management.
6. Disaster Recovery
The global nature of cloud resources ensures that businesses can
implement effective disaster recovery strategies.
By storing data across different regions, organizations can recover from
outages in one region by switching to another region with no significant
data loss or downtime.
7. Regulatory Compliance
Many countries have strict data residency and privacy laws.
The global distribution of cloud resources allows companies to adhere to
local regulations by keeping data within the country or region where
required.
Module-4
Q. a Discuss security of database services.
07
Cloud Database Security refers to the strategies, technologies, and tools employed
to protect cloud-hosted databases from unauthorized access, cyberattacks, data
breaches, and other malicious threats. It ensures the integrity, confidentiality, and
availability of data stored in cloud environments, and is essential for preventing
data loss, exposure, and misuse.
L2 10
Importance of Cloud Database Security
1. Protection Against Cyber Threats: As more enterprises migrate to the
cloud, protecting sensitive data from hackers, malware, and unauthorized
access becomes a significant concern.
2. Governance and Compliance: Maintaining regulatory compliance and
meeting industry standards is crucial for avoiding legal repercussions and
fines.
3. Maintaining Customer Trust: Proactive security measures ensure that
customers’ data is protected, helping businesses retain trust.
4. Data Availability: Cloud database security ensures that critical data
remains accessible while preventing unauthorized disruptions.
5. Business Continuity: Effective security protocols are vital for ensuring the
continuous operation of cloud services without unexpected downtime.
b Explain the security risks posed by shared images and management os. L2 10
Security Risks Posed by Shared Images:
1. Malicious Code Injection:
o Shared images can be pre-configured with malicious software that
might go undetected during the creation or deployment of the
image. When other users deploy the image, they might
unknowingly execute this malicious code.
2. Unpatched Vulnerabilities:
o If the shared image is not updated regularly, it may contain outdated
software with known vulnerabilities. This exposes the system to
exploits and attacks.
3. Data Leakage:
o Sensitive data stored in a shared image may be accessible to other
users or systems using the image. Improper data handling within
shared images can lead to unauthorized data access.
4. Privilege Escalation:
o Shared images might contain embedded administrator or root
privileges. If the image is not securely configured, it can allow
unauthorized users to escalate their privileges and gain control of
the system.
5. Lack of Isolation:
o In some cases, shared images may not have proper isolation
between different users or virtual machines. This can lead to
unintentional access to data or resources belonging to other users.
6. Compliance and Legal Risks:
o Shared images may not meet the required security and privacy
standards for regulated industries. This poses a risk of non-
compliance with laws such as GDPR, HIPAA, or PCI-DSS.
7. Insecure Configuration:
o Misconfigured settings in a shared image could lead to weak
security controls, allowing attackers to exploit weaknesses in the
system.
8. Inadequate Monitoring:
o Without adequate monitoring, it becomes difficult to detect
suspicious activities related to shared images, such as unauthorized
access or malicious activity.
7. Unpatched Vulnerabilities:
o The management OS may contain vulnerabilities that can be
exploited by attackers if not properly patched. This makes the OS a
prime target for security breaches.
8. Insider Threats:
o Employees or individuals with access to the management OS may
intentionally or unintentionally cause damage, leak data, or
compromise system security.
9. Misconfigurations:
o Misconfigurations in the management OS can lead to
vulnerabilities, including incorrect user permissions, weak
passwords, or incorrect networking settings, all of which increase
the risk of exploitation.
10. Lack of Auditing and Monitoring:
Without proper logging and monitoring, it becomes difficult to detect
unusual activities or potential security breaches in the management OS,
leaving the system vulnerable to attacks.
OR
Q. a Discuss how virtual machines are secured
08 1. Hypervisor Security
Ensure the integrity of the hypervisor through write protection and
restricted access to prevent unauthorized modifications.
Implement isolation between VMs to prevent cross-VM attacks and
intrusion detection to monitor hypervisor activity.
2. Virtual Machine Isolation
Enforce memory, network, and resource isolation to prevent unauthorized
access between VMs.
Use strict access controls to limit communication and interactions between
VMs.
3. Access Control and Authentication
Implement multi-factor authentication (MFA) and role-based access
control (RBAC) to restrict access to VMs.
3, 4 10
Maintain audit logs and enforce strong password policies to ensure only
authorized access.
4. VM Monitoring and Logging
Continuously monitor VM behavior and maintain centralized logs for
tracking potential security threats.
Set up real-time alerting to notify administrators of suspicious activities.
5. Guest Operating System and Application Security
Regularly update the guest OS and use security software like antivirus to
protect against vulnerabilities.
Configure firewalls, IDS, and whitelisting to limit unauthorized access and
application execution.
6. VM Image Security
Harden VM images before deployment and restrict image creation to
trusted sources.
Perform virus scanning on VM images to ensure they are free from
malware or malicious content.
7. Data Encryption
Encrypt data at rest and in transit to protect sensitive information on VMs.
Use secure key management to ensure that encryption keys are properly
managed and rotated.
8. VM Backup and Recovery
Perform regular backups and store them offsite to ensure data recovery in
case of a breach.
Test disaster recovery plans to ensure VMs can be restored quickly after an
incident.
9. Virtual Machine Patching and Updates
Apply automated patch management to ensure VMs are updated with the
latest security patches.
Test patches in non-production environments before deployment to avoid
disruptions.
10. VM Resource Management
Monitor VM resource usage to detect abnormal consumption patterns that
could signal security threats.
Set resource allocation limits to prevent overuse by any single VM,
maintaining performance and security.
BCS502
b Explain reputation system design options. L2 10
1. Centralized Reputation System
A centralized system relies on a single authority or server to collect, store,
and process reputation data for all users or services.
Advantages:
o Simplified management with a single point of control.
o Easier to monitor and track user or service performance.
Disadvantages:
o A single point of failure can disrupt the entire system.
o Potentially vulnerable to manipulation or attack if the central server
is compromised.
2. Decentralized Reputation System
In this design, reputation data is stored and processed across multiple
nodes, with no central authority. Each participant or service maintains their
own reputation scores, and data is distributed among peers.
Advantages:
o Increased robustness since there’s no single point of failure.
o Better suited for distributed or peer-to-peer cloud environments.
Disadvantages:
o More complex to manage and ensure consistency across the
system.
o Higher computational and storage overhead as data needs to be
distributed and verified across multiple nodes.
3. Hybrid Reputation System
A hybrid system combines elements of both centralized and decentralized
models. Typically, reputation data is stored centrally, but peer-to-peer
evaluations or ratings are used to influence the final score.
Advantages:
o Flexibility in adapting to different cloud environments.
o Provides a balance of reliability and robustness.
Disadvantages:
o May suffer from the complexity of managing multiple systems.
o Still subject to the risks of centralization (e.g., targeted attacks).
4. Reputation Based on Feedback Mechanisms
This system relies on user feedback or ratings after interacting with a
service or user. Ratings from multiple users are aggregated to generate a
reputation score for the service or user.
Advantages:
o Provides direct, real-time feedback from users, improving service
accountability.
o Scalable and adaptable to a wide range of cloud services.
Disadvantages:
o Susceptible to fake or biased feedback if not properly monitored or
verified.
o May require additional mechanisms (e.g., reputation decay) to
ensure that scores remain relevant over time.
5. Reputation Based on Historical Behavior
This system tracks the past behavior of users or services (e.g., uptime,
reliability, or security events) and uses this data to predict future behavior.
The reputation score is dynamically updated based on ongoing
performance metrics.
Advantages:
o Provides a continuous, data-driven evaluation of trustworthiness.
o Reduces the impact of individual malicious actions since it focuses
on long-term patterns.
Disadvantages:
o Requires large volumes of data and historical tracking, leading to
increased storage and processing overhead.
o May not quickly adapt to sudden, drastic changes in behavior.
6. Trust Models in Reputation Systems
Trust models use algorithms or mathematical models to assign
trustworthiness scores. These models often factor in various metrics,
including past interactions, feedback, and service performance.
Advantages:
o Can be customized based on the needs of the specific cloud
environment (e.g., service reliability, data integrity).
o Provides a formal, quantifiable approach to reputation
management.
Disadvantages:
o Complex to design and implement.
o May need continuous refinement and updates to remain effective as
the cloud environment evolves.
7. Reputation Based on Third-party Evaluation
In this approach, a trusted third-party organization (e.g., an auditor or
certification body) evaluates the reputation of services or users in the
cloud.
Advantages:
o Enhances credibility as the third-party evaluation is independent.
o Useful for situations requiring external verification, such as
compliance with industry standards.
Disadvantages:
o Potentially slow and expensive due to the need for external
evaluation.
o May introduce a bottleneck if the third-party organization becomes
overwhelmed with requests.
Module-5
Q. 09 a What are the various system issues for running a typical parallel program in L2 10
either parallel or distributed manner?
1. Communication Overhead
Parallel systems (e.g., using threads or processes) may have lower
communication latency due to shared memory.
Distributed systems must send data over a network, leading to higher
latency and bandwidth constraints.
4. Load Balancing
Uneven workload distribution causes some nodes/threads to be idle while
others are overloaded.
Requires dynamic or static load balancing strategies.
6. Scalability
The ability of the system to maintain performance as more resources are
added.
Communication, synchronization, and data contention may limit
scalability.
7. Resource Management
Effective use of CPU, memory, network, and storage.
In distributed systems, resource heterogeneity (e.g., different hardware
capabilities) complicates management.
8. Programming Model Complexity
Writing efficient parallel/distributed programs is harder.
APIs like MPI, OpenMP, CUDA, or MapReduce help but require
expertise.
b With a neat diagram explaining the data flow in running a MapReduce job L2 10
at various task trackers using Hadoop Library
OR
Q. 10 a Discuss Programming the Google App Engine. 3, 4 10
Google App Engine (GAE) is a fully managed Platform as a Service
(PaaS) used for building and hosting scalable web applications on
Google’s infrastructure.
It dynamically scales web applications as traffic demand changes,
ensuring efficient resource usage and high availability.
GAE supports multiple programming languages like Python, Java, Go,
and PHP, each with its own runtime and SDK for local development and
testing.
The App Engine SDK allows developers to emulate the production
environment on local machines and later deploy their apps easily with cost-
control quotas.
GAE provides numerous in-built services including cron jobs, queues,
scalable datastores (Cloud SQL, Datastore, Memcached),
communication tools, and in-memory caching.
It offers a secure and high-performance execution environment with
general features (e.g., datastore, logs, blobstore, search) covered by
service-level agreements (SLA).
GAE has preview and experimental features (e.g., Sockets, MapReduce,
Prospective Search, OpenID) that may change and are accessible to
selected users.
Third-party services and helper libraries are integrated via partnerships,
enabling apps to perform extended tasks beyond core functionalities.
Key advantages include fast deployment, ease of use, rich APIs, built-in
security, automatic scaling, high reliability, platform independence,
and reduced infrastructure cost.
Overall, Google App Engine simplifies the development of robust,
scalable, and secure applications without managing server infrastructure,
making it ideal for rapid development and enterprise-scale solutions.
b With neat diagram explain OpenStack Nova system architecture. 3, 4 10