Question 2: (5 Marks)
An increasing number of organizations in industry and business adopt cloud systems. Answer the following questions regarding cloud computing:
Question 3: (5 Marks)
Evaluate the Cloud computing security mechanisms in terms of:
Question 4: (5 Marks)
There is various storage mechanism used for storing, retrieving and updating enormous amount of data on cloud. Evaluate and explain the enterprise cloud storage solutions with respect to:
Ans 2 a) The five main characteristics of cloud computing systems are given below:
b) The five key enabling technologies in cloud computing systems are given below:
c) The three different ways for cloud service providers to maximize their revenues:
d) The characteristics of three cloud computing models using suitable examples is given below:
Ans.3 Encryption : In Symmetric similar keys are used both at sender and receiver side whereas in Asymmetric two keys are used i.e public and private keys which makes it more secured. Encryption is necessary for privacy of critical data in cloud computing paradigm.
Hashing: This is used to enable security in the process of message transmission. Especially when the message is intended for a particular recipient only by using a formula which generates the hash(mapping code), which is in turn used to protect the security of the transmission against tampering.
Digital Signature: This is an authentication mechanism which is basically a mathematical scheme used for verifying the authenticity of digital messages . These can be literal messages, passed documents, protocol conversations etc.
Public Key Infrastructure: PKI allows users(who are over the Internet, public networks, internal networks or cloud) to engage in secure communication. This involves securing data exchange and money exchange as well. This is achieved by public and private cryptographic key pairs. These pairs are issued by a certificate authority.
IAM: This stands for Identity and Access Management.Through IAM policy the cloud security mechanisms verify whether any user access requests are valid or not and whether to either grant or deny permission to protected company materials.
Single Sign On: SSO is a session and user authentication service. It is used to permits a user to use one set(that is the same one set) of login credentials (which can be for example name and password) to access multiple applications over the cloud.
Question 2: (5 Marks) An increasing number of organizations in industry and business adopt cloud systems. Answer the fol...
Question 1: (5 Marks) Compare the similarities and differences between traditional computing and the computing clouds launched in recent years. Consider all technical and economic aspects as listed below. Answer the following questions against real example systems or platforms built in recent years. Also discuss possible convergence of the two computing paradigms in the future. Question 2: (5 Marks) An increasing number of organizations in industry and business adopt cloud systems. Answer the following questions regarding cloud computing: List and...
Question 1: (5 Marks) Compare the similarities and differences between traditional computing and the computing clouds launched in recent years. Consider all technical and economic aspects as listed below. Answer the following questions against real example systems or platforms built in recent years. Also discuss possible convergence of the two computing paradigms in the future. Question 2: (5 Marks) An increasing number of organizations in industry and business adopt cloud systems. Answer the following questions regarding cloud computing: List and...