KCS713 22-23 Solution
KCS713 22-23 Solution
SOLUTION
B.TECH. (SEM VII) THEORY
EXAMINATION 2022-23 CLOUD
COMPUTING
Time: 3 Hours Total Marks: 100
Note: Attempt all Sections. If require any missing data; then choose suitably.
SECTION A
SECTION C
(a) Describe in detail about cloud computing reference model with diagram.
Ans : The Cloud Computing Reference Model (CCRM) is a high-level architectural framework
that provides a common vocabulary and structure for understanding cloud computing. The
CCRM was developed by the National Institute of Standards and Technology (NIST) to provide
a standard approach to describing cloud computing architectures and to help organizations
develop and deploy cloud services.
The CCRM consists of five layers that represent the major functional areas of cloud computing:
i. The Cloud Service User Layer: This layer represents the end-users who access cloud
services over the internet. The users can be individuals, organizations, or machines that
consume cloud services.
ii. The Cloud Service Broker Layer: This layer represents the intermediaries or middlemen
who provide services to cloud service users. They help in selecting and integrating
multiple cloud services from different providers to meet the user's requirements.
iii. The Cloud Service Provider Layer: This layer represents the cloud service providers who
offer cloud services such as Infrastructure as a Service (IaaS), Platform as a Service
QP23DP1_029 | 13-01-2023 13:34:59 | 125.21.249.98
(PaaS), and Software as a Service (SaaS). They provide computing resources and
infrastructure to the cloud service users.
iv. The Cloud Service Infrastructure Layer: This layer represents the physical infrastructure
that supports cloud computing, including servers, storage devices, and networks. It
includes both the physical and virtual components of the cloud infrastructure.
v. The Cloud Service Management Layer: This layer represents the management and
control systems that operate and monitor the cloud infrastructure and services. It includes
cloud orchestration, monitoring, security, and governance.
The CCRM provides a standard framework for describing cloud computing architectures and
helps organizations develop and deploy cloud services. It enables users to compare and evaluate
different cloud service offerings, and it helps cloud service providers to design and implement
their services in a consistent and interoperable way.
(b) List out and discuss the innovative characteristic of cloud computing.
Ans : Cloud computing is a rapidly evolving technology that offers several innovative
characteristics, including:
i. On-demand self-service: Cloud computing provides users with the ability to provision and
deploy computing resources on demand, without the need for human intervention from
the service provider. This allows users to scale up or down their computing resources
according to their business needs.
ii. Rapid elasticity: Cloud computing allows for the rapid scaling up or down of computing
resources as required by the user. This means that users can quickly increase their
computing resources during peak usage periods and reduce them during periods of low
demand, allowing for optimal resource utilization.
iii. Resource pooling: Cloud computing provides users with access to a shared pool of
computing resources, including servers, storage, and networks. This allows users to take
advantage of economies of scale, reducing costs and improving efficiency.
iv. Ubiquitous network access: Cloud computing enables users to access their computing
resources from anywhere, using any device with an internet connection. This provides
users with greater flexibility and mobility, and allows for remote collaboration and access
to resources.
v. Metered service: Cloud computing provides users with the ability to pay for computing
resources on a metered basis, allowing users to only pay for the resources they use. This
provides cost savings and helps to optimize resource utilization.
vi. Multi-tenancy: Cloud computing allows multiple users to share the same physical
resources while maintaining data security and privacy. This provides greater resource
utilization and cost savings.
vii. Automation: Cloud computing provides users with the ability to automate tasks such as
resource provisioning, configuration, and management. This reduces the need for manual
intervention and improves efficiency.
ii. Stateless: REST is stateless, meaning that each request from the client
contains all the necessary information to be processed by the server. The
server does not maintain any state between requests, which allows for
better scalability and fault tolerance.
iv. Increased availability: Virtualization enables high availability and disaster recovery
capabilities through live migration and replication of virtual machines.
Cons of Virtualization:
i. Performance overhead: Virtualization introduces a performance overhead due to the
additional layer of software and hardware abstraction. This can lead to reduced performance
of virtual machines compared to physical machines.
ii. Security concerns: Virtualization introduces new security concerns such as the risk of virtual
machine escape, hypervisor vulnerabilities, and inter-VM attacks.
iii. Complexity: Virtualization adds complexity to the infrastructure, which can lead to increased
management and troubleshooting efforts.
iv. Licensing: Virtualization can lead to licensing challenges as some software vendors require
licenses per physical server, while others require licenses per virtual machine.
v. Single point of failure: Virtualization introduces a single point of failure in the form of the
hypervisor, which can lead to downtime for all virtual machines running on the affected
physical server.
vi.
In conclusion, virtualization provides significant benefits in terms of cost savings, improved resource
utilization, flexibility, availability, and scalability. However, it also has some drawbacks, such as
performance overhead, security concerns, complexity, licensing challenges, and a single point of
failure. Organizations need to carefully evaluate their needs and requirements to determine if
virtualization is the right solution for their infrastructure.
5. Attempt any one part of the following: 10x1=10
(a) List and discuss the principles for designing public cloud, private cloud
and hybrid cloud.
Ans : Public Cloud Principles:
i. Multi-tenancy: Public clouds are designed to serve multiple customers
or tenants simultaneously. This requires the cloud to provide a highly
scalable and distributed infrastructure that can handle the varying
demands of different customers.
ii. Self-service: Public clouds are designed to be highly self-service
oriented, meaning that customers should be able to quickly and easily
provision resources and services without any human intervention.
iii. Resource pooling: Public clouds provide a shared pool of resources
such as compute, storage, and networking, which can be dynamically
allocated to different customers based on demand.
iv. Elasticity: Public clouds are designed to be highly elastic, allowing
customers to quickly and easily scale up or down their resources as
needed to meet changing demand.
v. Pay-per-use: Public clouds are typically billed based on usage, with
customers only paying for the resources they consume. This allows for
QP23DP1_029 | 13-01-2023 13:34:59 | 125.21.249.98
a highly cost-effective model where customers can quickly and easily
adjust their spending based on their needs.
Public Cloud:
Public cloud deployment model is hosted and managed by third-party service providers who
offer computing resources, such as servers, storage, and applications, over the internet. This
model is suitable for businesses of all sizes that require an affordable and scalable computing
environment.
In a public cloud deployment, the infrastructure is shared among multiple customers, and each
customer's data is isolated from others. The provider is responsible for maintaining the security
and availability of the cloud environment.
QP23DP1_029 | 13-01-2023 13:34:59 | 125.21.249.98
Private Cloud:
Private cloud deployment model is owned and managed by a single organization or a dedicated
third-party provider, and the infrastructure is not shared with other customers. This model is
suitable for businesses that require more control and customization of their cloud environment.
In a private cloud deployment, the infrastructure can be located on-premises or hosted in a third-
party data center. The organization is responsible for maintaining the security and availability
of the cloud environment.
Hybrid Cloud:
Hybrid cloud deployment model combines the features of both public and private clouds to
provide a unified computing environment. This model is suitable for businesses that require the
flexibility to move their workloads between public and private clouds.
In a hybrid cloud deployment, some applications and data can be hosted on-premises or in a
private cloud, while others can be hosted in a public cloud. The organization is responsible for
managing the security and availability of the cloud environment.
Multi-Cloud:
Multi-cloud deployment model involves the use of multiple public clouds or a combination of
public and private clouds. This model is suitable for businesses that require a high level of
resilience, scalability, and vendor flexibility.
In a multi-cloud deployment, the organization can choose different cloud providers for different
workloads or applications. The organization is responsible for managing the security and
availability of the cloud environment across different cloud providers.
ii. Design: In this phase, the software design is created. This includes
identifying the architecture, components, and interfaces of the system.
Security requirements are also identified and incorporated into the
design.
iv. Testing: In this phase, the software is tested to ensure that it meets the
requirements and is secure. This includes functional testing,
performance testing, and security testing.
Security Monitoring:
Security monitoring is an ongoing process that involves the collection, analysis, and correlation
of various security-related events and alerts generated by the organization's security
infrastructure. The objective of security monitoring is to detect potential security threats before
they can cause damage to the organization's assets or data.
There are various tools and techniques used for security monitoring, such as intrusion detection
systems (IDS), intrusion prevention systems (IPS), security information and event management
(SIEM) systems, and network traffic analysis tools. These tools are used to monitor network
traffic, system logs, and other security-related events to detect potential security incidents.
Incident Response:
Incident response is a set of procedures that are followed when a security incident is detected.
The incident response process involves the following steps:
i. Identification: The first step in the incident response process is to identify the security
incident. This can be done through various means, such as alerts generated by security
monitoring systems, user reports, or other indications of suspicious activity.
ii. Containment: Once the security incident has been identified, the next step is to contain
it to prevent further damage. This can involve isolating affected systems or network
segments, blocking network traffic from known malicious IP addresses, or disabling
user accounts.
iii. Investigation: After the security incident has been contained, the next step is to
investigate the incident to determine its root cause and scope. This can involve
analyzing system logs, network traffic, and other sources of information to determine
the extent of the incident.
iv. Mitigation: Once the incident has been investigated, the next step is to mitigate the
impact of the incident. This can involve applying patches to affected systems, updating
security configurations, or implementing new security measures to prevent similar
incidents in the future.
v. Recovery: The final step in the incident response process is to recover from the
incident. This can involve restoring affected systems and data from backups,
reconfiguring security controls, or implementing new security measures to prevent
future incidents.
In conclusion, security monitoring and incident response are two essential components of an
organization's security strategy. By implementing robust security monitoring processes and
following established incident response procedures, organizations can detect and mitigate
potential security incidents before they can cause significant damage to their assets or data.
The GAE architecture consists of several components that work together to provide the
necessary functionality for developing and deploying web applications. These
components include:
i. Front-end servers: These servers handle incoming HTTP requests from users
and direct them to the appropriate backend servers.
ii. Backend servers: These servers process requests from the front-end servers and
execute the necessary code to generate a response.
iii. Datastore: This is a NoSQL database that is used to store and retrieve data used
by the application.
iv. Task queues: These queues allow developers to perform background processing
tasks asynchronously.
vi. APIs: GAE provides a set of APIs for developers to interact with various
QP23DP1_029 | 13-01-2023 13:34:59 | 125.21.249.98
Google services, including Google Cloud Storage and Google Cloud SQL.
The GAE architecture is designed to scale automatically based on the incoming traffic
to the application. This means that as the traffic increases, GAE will automatically spin
up additional front-end and backend servers to handle the increased load. Additionally,
GAE provides built-in security features, such as SSL support and a firewall, to help
protect applications from malicious attacks.
Overall, the GAE architecture provides developers with a scalable, reliable, and secure
platform for building and deploying web applications on Google's infrastructure.