Cloud Computing Answers
Cloud Computing Answers
Database security involves protecting the database from unauthorized access, misuse, or threats. It
- Authentication & Authorization: Ensures that only authorized users can access specific data or
- Auditing & Monitoring: Tracks access patterns and detects abnormal activities to prevent breaches.
- Backup & Recovery: Ensures data can be recovered in case of corruption or attacks like
ransomware.
- Firewall and Intrusion Detection Systems: Prevents malicious access to database systems.
Database security is essential for preserving confidentiality, integrity, and availability of critical
business data.
Xoar is a research platform designed to provide security and performance in cloud environments. Its
- Security Isolation: Xoar ensures strong isolation between virtual machines (VMs) to prevent
malicious access.
- Minimized TCB (Trusted Computing Base): Reduces the amount of code that must be trusted,
- Efficient Performance: Maintains low overhead to deliver performance close to native execution.
- Support for Fine-grained Policies: Enables administrators to enforce security at detailed levels.
3. Explain the Security Risks Faced by Cloud Users and Cloud Service Providers
Google File System (GFS) is a scalable distributed file system developed by Google for large
data-intensive applications.
Architecture Components:
- Master Server: Manages metadata like namespace, access control, and file-to-chunk mapping.
- Chunk Servers: Store actual data in fixed-size chunks (usually 64MB). Each chunk is replicated
- Clients: Interact with the master to get metadata and communicate directly with chunk servers for
reading/writing data.
Key Features:
- Fault Tolerance: Automatic recovery and replication of data.
- High Throughput: Optimized for large data sets and sequential operations.
1. Input Splits: The input data is split into blocks (default 128MB).
2. Map Phase: Each block is processed by a Map Task that produces intermediate (key, value)
pairs.
3. Shuffle and Sort: Intermediate data is sorted and shuffled by key and sent to the appropriate
Reduce Task.
Diagram:
|
v
race conditions.
systems.
- Fault Tolerance: Systems must handle node failures without losing progress.
- Latency and Bandwidth: Network delays and limits impact distributed performance.
- Debugging Complexity: Parallel and distributed programs are harder to test and debug.