CLOUD COMPUTING Notes
CLOUD COMPUTING Notes
Salem-636 003
STUDY MATERIAL
2024-2025
1
QUESTION PAPER PATTERN
2
Course Overview:
Learning Objectives:
1. Understand the concepts of Cloud and its services K1,K2
2. Collaborate Cloud for Event & Project Management K3,K4
Analyze on cloud in – Word Processing, Spread Sheets, Mail,
3. K4,K5
Calendar, Database
4 Analyze cloud in social networks K5,K6
3
CLOUD COMPUTING
UNIT – 1
UNIT – 3
UNIT – 4
OUTSIDE THE CLOUD Evaluating web mail services, Evaluating instant messaging,
Evaluating web conference tools, creating groups on social networks, Evaluating on line
groupware, collaborating via blogs and wikis.
UNIT – 5
4
Text Book(s)
1. Michael Miller, ―Cloud Computing‖, Pearson Education, New Delhi, 2009.
Reference Books:
1. Anthony T. Velte, ―Cloud Computing-A Practical Approach‖, 1st Edition, Tata McGraw Hill
Education Private Limited, 2009.
Related Online Contents (MOOC, SWAYAM, NPTEL, Websites etc.)
1. https://nptel.ac.in/courses/106/105/106105167/
2. https://www.tutorialspoint.com/cloud_computing/index.htm
3. https://www.javatpoint.com/cloud-computing-tutorial
5
CLOUD COMPUTING
UNIT – 1
Introduction to Cloud
Computing
6
The cloud environment provides an easily accessible online portal that makes handy for
the user to manage the compute, storage, network, and application resources. Some cloud
service providers are in the following figure.
7
Types of Cloud Computing
o Public Cloud: The cloud resources that are owned and operated by a third-party cloud
service provider are termed as public clouds. It delivers computing resources such as
servers, software, and storage over the internet
o Private Cloud: The cloud computing resources that are exclusively used inside a single
business or organization are termed as a private cloud. A private cloud may physically be
located on the company’s on-site datacentre or hosted by a third-party service provider.
o Hybrid Cloud: It is the combination of public and private clouds, which is bounded
together by technology that allows data applications to be shared between them. Hybrid
cloud provides flexibility and more deployment options to the business.
8
1. Infrastructure as a Service (IaaS): In IaaS, we can rent IT infrastructures like servers
and virtual machines (VMs), storage, networks, operating systems from a cloud service
vendor.
2. Platform as a Service (PaaS): This service provides an on-demand environment for
developing, testing, delivering, and managing software applications. The developer is
responsible for the application, and the PaaS vendor provides the ability to deploy and
run it.
3. Software as a Service (SaaS): It provides a centrally hosted and managed software
services to the end-users. It delivers software over the internet, on-demand, and typically
on a subscription basis. E.g., Microsoft One Drive, Dropbox, WordPress, Office 365, and
Amazon Kindle. SaaS is used to minimize the operational cost to the maximum extent.
9
What is cloud collaboration?
Employees use a cloud-based collaboration platform to share, edit and work together on
projects. Cloud collaboration lets two or more people work on a project at once.
Why is cloud collaboration important?
The increasing availability of remote work has contributed to cloud collaboration's
popularity. Remote workers must access documents and communicate with teammates
from various locations and at different times.
Cloud collaboration gives geographically distributed workers the flexibility to work with
teammates in real time.
McKinsey and Company's 2022 American Opportunity Survey found that 35% of
respondents said they have the option to work full time remotely, presenting
opportunities to use cloud collaboration.
Cloud collaboration also centralizes access control. These tools let a company efficiently
decide which team members have access to other team members and content as well as
the best way to facilitate team collaboration.
Cloud collaboration benefits and drawbacks
Cloud-based collaboration tools can have a positive effect on group communication and
teamwork. The benefits of cloud collaboration include the following:
Flexibility. The cloud lets team members work from anywhere and across a range of time
zones. All
Access control. Cloud computing and cloud collaboration tools help project managers and
team members control permission levels as well as access to information and who can make
changes.
10
Inclusivity. Collaboration tools allow many team members to contribute to a project if broad
participation is needed.
Version control. Team members can see a document or a conversation's history to optimize
workflow and processes and then backtrack, if necessary.
Cloud collaboration also has downsides:
Application overlap. It can be difficult to find one app or cloud service that suits all
collaboration needs.
Difficulty monitoring. When employees work remotely and collaborate over the internet, it
can be difficult to track progress and workflow.
Information overload. Ensuring employees have the permissions and access they need to do
their work can get complicated.
Lack of collaboration strategy. Even if a team has one or several suitable cloud
collaboration tools, it won't be effective without an established communication strategy.
11
The back end consists of all things needed for cloud computing services. This is the side of the
cloud computing provider.
This includes servers, computers, data storage systems, programs, and all necessary
means to provide different cloud computing services.
The cloud computing system houses various applications.
It provides an exclusive dedicated server for each computer program.
All of these can help us understand cloud computing.
It acts as the connection between clients and the cloud.
How Does Cloud Storage Work?
Using the Internet, cloud capacity works as a store of all information, applications, and
computing resources.
This provides access to any device utilizing the Internet. It can be a laptop, a smartphone,
or a tablet.
As long as there’s Internet access, the data and information uploaded into the cloud
computing system will be available.
This information can be modified, downloaded, and transferred. The availability and
mobility that cloud storage provides can offer assistance to us to comprehend cloud
computing, what it is and how it works.
Since access to the cloud is possible as long as there is the Internet, cloud storage allows
work collaboration.
The simultaneous access of one data makes it easier for several users to incorporate ideas
and work together despite the distance.
Thus, cloud storage made remote work environments possible. Understanding how
storage made the cloud functional for data accessibility helps us understand cloud
computing, what is it and how it works.
12
1. REDUCE INFRASTRUCTURE COSTS
In-house data storage costs companies a significant amount of money.
There’s the up-front price tag of purchasing each new server as well as the cost
of installing them.
Then you need to ensure the equipment is maintained properly and backed up regularly.
2. IMPACT TO PERSONNEL
Maintaining an in-house IT team big enough to manage local servers can quickly lead to
a ballooning budget.
The time spent recruiting and the money spent training are all with the hopes that
you’re developing a highly effective and dedicated employee — but that’s not always
the case.
3. CONSOLIDATE YOUR DATA
With cloud storage, data is distributed amongst bi-costal data centers.
Syncing technology makes it possible to link up and update data quickly, but storing data
in the cloud makes syncing unnecessary.
4. DEFEND AGAINST DISASTER
Data loss can spell disaster for a company of any size.
Data breaches cost an average of $3.86 million worldwide, and an average of
$7.91 million for companies in the United States.
5. MAXIMIZE UPTIME
The financial impact of unplanned downtime cannot be understated. For every minute
of unplanned downtime due to a data center outage, a company loses $5,600 on average.
The leading causes of unplanned downtime are system failure and human error, both
of which can be avoided.
6. ENHANCE COLLABORATION
Businesses today are thriving thanks to the ability to collaborate digitally.
Cloud computing allows multiple employees to view and make changes to files and
documents in real time, providing a much more efficient way for workers to
collaborate on projects.
7. STAY SCALABLE
Increasing cloud also comes with a predictable cost, eliminating the risk associated with
investing in additional storage infrastructure.
8. INCREASE AUTOMATION
A significant portion of maintaining in-house data storage is performing regular
backups. The IT team has to take time to create backups and schedule them around daily
operations.
13
9. SAVE ON SPACE
Servers and all their associated equipment take up significant square footage, and
expanding an in-house system often requires careful planning to secure the right
amount of space.
Larger ventures may have some excess space to grow into, but small businesses are
often fighting to make the most of every square inch.
10. ENHANCE COMPLIANCE
The hundreds of regulations that govern different types of data are complex
to understand, time-consuming to apply and laborious to maintain.
A good provider operates in full compliance with all applicable regulations, so you
don’t have to worry about incurring violations.
What Are the Cons of Cloud Computing?
These are the top five concerns companies have about transitioning to the cloud.
1. UNDERSTANDING THE COSTS
Though the cloud can help reduce costs in some areas, it is important to make sure
that when you move to the cloud, it truly makes sense.
It is important to put a proper plan in place and look at all systems within
the organization.
2. MOVING FROM CLOUD TO ON-PREMISES
Moving from on-premises servers to cloud data centers is usually an easy process
for your organization.
Though this is the case, moving to another cloud supplier or back to an on-
premises server is not as easy.
3. LIMITED CONTROL
The infrastructure of the cloud is owned and managed by the service provider,
businesses may worry about not having enough control over the service.
4. VENDOR LOCK-IN
One of the disadvantages of cloud computing can come in the form of
vendor mismatches.
Organizations might run into complications when migrating services to a different
vendor with a different platform
14
5. SLOWER BACKUPS AND RESTORES
Because moving data to the cloud involves some significant communication
latency, backups can end up taking longer than they would with an in-house system.
The longest backups can run in the background without disrupting networks, and
the subsequent smaller backups take less time.
6. INTERNET RELIANCE
One minor drawback to cloud computing is the fact that it’s completely reliant on
the internet.
If your internet connection goes down, you won’t have access to data stored in the
cloud for the duration of the outage.
7. INTERNET USE
If you’re running backups during working hours when people are heavily using the
internet, a large backup to the cloud has the potential to increase congestion and
reduce your internet performance.
This issue primarily affects small businesses without the resources to invest in the
highest internet bandwidth and speeds.
DEVELOPING CLOUD COMPUTING SERVICES:
1. Identifying Needs: Understanding the requirements of potential users and industries.
2. Designing Solutions: Creating scalable and reliable architectures that meet those needs.
3. Implementation: Developing the necessary infrastructure, software, and services.
4. Testing: Thoroughly testing the services for performance, security, and reliability.
5. Deployment: Rolling out the services to users, possibly through a phased approach.
6. Monitoring and Maintenance: Continuously monitoring the services for issues and making
necessary updates and improvements.
7. Customer Support: Providing ongoing support to users to address any questions or
problems they encounter.
CLOUD SERVICE DEVELOPMENT:
Cloud service development involves creating software applications, platforms, or
infrastructure that are hosted and accessed over the internet, rather than locally on individual
devices. Here's a breakdown of the steps involved:
1. Conceptualization: Define the purpose, scope, and target audience for the cloud service.
Understand the problem it solves or the value it provides.
15
2. Planning: Create a detailed roadmap for development, including technical requirements,
feature sets, timelines, and resource allocation.
3. Architecture Design: Design the architecture of the cloud service, including components such
as data storage, compute resources, networking, security, and scalability.
4. Development: Write code to implement the functionality outlined in the design phase. This
may involve front-end development, back-end development, database design, integration with
third-party services, and more.
5. Testing: Thoroughly test the cloud service to ensure it functions correctly, is secure, and
performs well under various conditions. This includes unit testing, integration testing,
performance testing, and security testing.
6. Deployment: Deploy the cloud service to the chosen cloud infrastructure provider, such as
Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP). This may
involve setting up servers, databases, networking configurations, and other resources.
7. Monitoring and Maintenance: Continuously monitor the performance, availability, and
security of the cloud service. Make necessary updates, patches, and optimizations to ensure it
remains reliable and efficient.
8. Customer Support: Provide ongoing support to users of the cloud service, addressing any
issues, answering questions, and collecting feedback for future improvements.
Throughout the development process, it's crucial to follow best practices for cloud
computing, such as implementing security measures, optimizing performance, and designing for
scalability and resilience.
DISCOVERING CLOUD SERVICES:
1. Research: Begin by researching different types of cloud services available in the
market. Understand their features, benefits, and pricing models.
2. Assessment: Assess your specific needs and requirements. Determine what you want to
achieve with cloud services, whether it's storage for personal files, hosting a website,
deploying applications, or running big data analytics.
3. Provider Selection: Choose a cloud service provider that aligns with your requirements and
budget. Major players include Amazon Web Services (AWS), Microsoft Azure, Google Cloud
Platform (GCP), IBM Cloud, and others. Consider factors like reliability, security, scalability,
and customer support.
16
4. Service Exploration: Dive into the offerings of your chosen cloud provider. Explore
their dashboard, documentation, tutorials, and resources to understand how to use their
services effectively. Experiment with free tiers or trial periods to get hands-on experience.
5. Training and Certification: Consider undergoing training or obtaining certifications in
cloud technologies. Many providers offer certification programs that validate your expertise and
enhance your career prospects in cloud computing
6. Deployment and Integration: Start deploying your workloads or applications on the cloud.
Integrate cloud services into your existing infrastructure or workflows seamlessly. Utilize
automation and orchestration tools to streamline deployment and management processes.
7. Optimization: Continuously monitor and optimize your cloud usage to ensure cost-
effectiveness and performance. Take advantage of cost management tools, auto-scaling
capabilities, and performance optimization techniques to maximize the value of your
cloud investment.
8. Security and Compliance: Implement robust security measures to protect your data and
resources in the cloud. Follow best practices for encryption, access control, identity
management, and compliance with regulations like GDPR, HIPAA, or PCI-DSS.
9. Continuous Learning: Stay updated with the latest trends, technologies, and advancements
in cloud computing. Attend webinars, conferences, and online courses to expand your
knowledge and skills in this rapidly evolving field.
17
ONE MARK:
18
8. Applications and services that run on a distributed network using virtualized resources
is known as
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing
Answer: d
9. Which of the following is an example of a PaaS cloud service?
a) Heroku
b) AWS Elastic Beanstalk
c) Windows Azure
d) All of the above
Answer: d
10. Which of the following is an example of an IaaS Cloud service?
a) DigitalOcean
b) Linode
c) Rackspace
d) All of the above
Answer: d
11. Which of the following is the correct statement about cloud computing?
a) Cloud computing abstracts systems by pooling and sharing resources
b) Cloud computing is nothing more than the Internet
c) The use of the word ―cloud‖ makes reference to the two essential concepts
d) All of the mentioned
Answer: a
12. Point out the wrong statement.
a) Azure enables .NET Framework applications to run over the Internet
b) Cloud Computing has two distinct sets of models
c) Amazon has built a worldwide network of datacenters to service its search engine
d) None of the mentioned
Answer: c
13. Which of the following model attempts to categorize a cloud network based on four
dimensional factors?
a) Cloud Cube
b) Cloud Square
c) Cloud Service
d) All of the mentioned
Answer: a
14. Which of the following is the correct statement about cloud types?
a) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
b) A deployment model defines the purpose of the cloud and the nature of how the cloud is
located
c) Service model defines the purpose of the cloud and the nature of how the cloud is located
d) All of the mentioned
Answer: b
19
15. Which architectural layer is used as a backend in cloud computing?
a) cloud
b) soft
c) client
d) all of the mentioned
Answer: a
16. All cloud computing applications suffer from the inherent that is intrinsic in their
WAN connectivity.
a) noise
b) propagation
c) latency
d) all of the mentioned
Answer: c
17. Which of the following architectural standards is working with cloud computing industry?
a) Web-application frameworks
b) Service-oriented architecture
c) Standardized Web services
d) All of the mentioned
Answer: b
18. Which of the following is the correct statement?
a) Cloud computing presents new opportunities to users and developers
b) Service Level Agreements (SLAs) is small aspect of cloud computing
c) Cloud computing does not have impact on software licensing
d) All of the mentioned
Answer: a
19. What is the correct formula to calculate the cost of a cloud computing deployment?
a) CostCLOUD = Σ(UnitCostCLOUD / (Revenue + CostCLOUD))
b) CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))
c) CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
d) None of the mentioned
Answer: b
20. Which of the following is the wrong statement about cloud computing?
a) Private cloud doesn’t employ the same level of virtualization
b) Data center operates under average loads
c) Private cloud doesn’t pooling of resources that a cloud computing provider can achieve
d) Abstraction enables the key benefit of cloud computing: shared, ubiquitous
access Answer: a
21. Identify the wrong statement about cloud computing.
a) Virtualization assigns a logical name for a physical resource and then provides a pointer
to that physical resource when a request is made
b) Virtual appliances are becoming a very important standard cloud computing deployment
object
c) Cloud computing requires some standard protocols
d) None of the mentioned
Answer: d
20
22. Identify the correct statement about cloud computing.
a) Cloud computing relies on a set of protocols needed to manage interprocess communications
b) Platforms are used to create more complex software
c) Cloud architecture can couple software running on virtualized hardware in multiple
locations to provide an on-demand service
d) All of the mentioned
Answer: d
23. Point out the wrong statement.
a) Cloud services span the gamut of computer applications
b) The impact of cloud computing on network communication is to discourage the use of
open source network protocols in place of proprietary protocol
c) Atom is a syndication format that allows for HTTP protocols to create and update
informations
d) None of the mentioned
Answer: b
24. Which of the following is required by Cloud Computing?
a) That the identity be authenticated
b) That the authentication be portable
c) That you establish an identity
d) All of the mentioned
Answer: d
25. Cloud computing is a concept that involves pooling physical resources and offering them
as which sort of resource?
a) cloud
b) real
c) virtual
d) none of the mentioned
Answer: c
26. Which of the following is the Cloud Platform provided by Amazon?
a) AWS
b) Cloudera
c) Azure
d) All of the mentioned
Answer: a
27. Into which expenditures does Cloud computing shifts capital expenditures?
a) local
b) operating
c) service
d) none of the mentioned
Answer: b
28. Point out the wrong statement.
a) With a pay-as-you-go, endlessly expandable, and universally available system,
cloud computing realises the long-held goal of utility computing
b) The widespread use of the Internet enables the huge size of cloud computing systems
c) Soft computing represents a significant change in the way computers are delivered
d) All of the mentioned Answer: c
21
29. Which of the following is the most essential element in cloud computing by CSA?
a) Virtualization
b) Multi-tenancy
c) Identity and access management
d) All of the mentioned
Answer: b
30. Which of the following monitors the performance of the major cloud-based services in
real time in Cloud Commons?
a) CloudWatch
b) CloudSensor
c) CloudMetrics
d) All of the mentioned
Answer: b
31. Which of the following model consists of the service that you can access on a
cloud computing platform?
a) Deployment
b) Service
c) Application
d) None of the mentioned
Answer: b
1) Platform-as-a-Service
2) Software-as-a-Service
3) Infrastructure-as-a-Service
32. Which of the following is the most important area of concern in cloud computing?
a) Scalability
b) Storage
c) Security
d) All of the mentioned
Answer: c
33. Which of the following is the most refined and restrictive cloud service model?
a) PaaS
b) IaaS
c) SaaS
d) CaaS
Answer: a
34. Which of the following is not a property of cloud computing?
a) virtualization
b) composability
c) scalability
d) all of the mentioned
Answer: b
35. How many phases are there in Cloud Computing Planning?
a) 1
b) 5
c) 3
d) 6
Answer: c
22
36. Which of the following is an example of a SaaS cloud service?
a) Google Workspace
b) Dropbox
c) Salesforce
d) All of the above
Answer: d
37. Which is the most essential concept related to Cloud computing?
a) Abstraction
b) Reliability
c) Productivity
d) All of the mentioned
Answer: a
38. In which of the following service models the hardware is virtualized in the cloud?
a) NaaS
b) PaaS
c) CaaS
d) IaaS
Answer: d
39. Which of the following is the Virtual machine conversion cloud?
a) Amazon CloudWatch
b) AbiCloud
c) BMC Cloud Computing Initiative
d) None of the mentioned
Answer: c
40. Which of the following is a workflow control and policy based automation service by CA?
a) CA Cloud Compose
b) CA Cloud Insight
c) CA Cloud Optimize
d) CA Cloud Orchestrate
Answer: d
41. An application that provides for transaction overflow in a reservation system is an
example of
a) cloud bursting
b) cloud provisioning
c) cloud servicing
d) all of the mentioned
Answer: a
23
5 – MARKS
1. Write short notes on cloud computing.
2. Explain collaboration to cloud.
3. Give a note on benefits of cloud.
10 - MARKS
1. Illustrate pros and cons in cloud.
2. Give a detailed note developing cloud computing services
3. Briefly explain about the Cloud service development.
4. Describe about discovering cloud services
24
UNIT – II
25
2. Cost-effectiveness: By leveraging cloud services, communities can reduce the need for
expensive hardware infrastructure and maintenance costs. They can pay for only the resources
they use, scaling up or down as needed.
3. Collaboration: Cloud computing facilitates collaboration among community members by
providing shared access to documents, applications, and data. This fosters teamwork,
communication, and knowledge sharing.
4. Scalability: Cloud services offer scalability, allowing communities to easily adjust their
computing resources based on demand. Whether the community grows or experiences
fluctuations in usage, cloud resources can accommodate these changes.
5. Security: Cloud providers invest heavily in security measures to protect data and
infrastructure. This helps ensure that community members' data is secure, reducing the risk of
breaches and unauthorized access.
6. Flexibility: Cloud computing offers a wide range of services, including Infrastructure as a
Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), providing
flexibility in choosing the right services for the community's needs
7. Disaster recovery: Cloud computing provides robust disaster recovery capabilities, with data
replication and backup services to ensure that community data is protected in the event of a
disaster or outage.
8. Environmental sustainability: Cloud computing can contribute to environmental
sustainability by optimizing resource utilization and reducing energy consumption compared to
traditional on-premises infrastructure.
Overall, cloud computing for community empowers groups to leverage advanced technology
resources, improve collaboration, and enhance efficiency while reducing costs and
environmental impact.
COLLABORATING ON SCHEDULES:
Collaborating on schedules in the cloud offers several advantages:
1. Real-time Updates: Cloud-based scheduling tools allow multiple users to access and update
schedules simultaneously, ensuring that everyone has access to the most up-to-date information.
2. Accessibility: Users can access cloud-based schedules from anywhere with an internet
connection, whether they're in the office, at home, or on the go. This flexibility is especially
valuable for teams that work remotely or have members in different locations.
26
3. Centralized Storage: Cloud-based scheduling platforms provide a centralized location for
storing schedules, making it easy for team members to find the information they need without
digging through emails or shared folders.
4. Collaborative Editing: Cloud-based tools often support collaborative editing, allowing
multiple users to make changes to schedules in real-time. This promotes teamwork and ensures
that everyone's input is reflected in the final schedule.
5. Notifications and Reminders: Many cloud-based scheduling tools offer notifications and
reminders to keep team members informed about upcoming events or changes to the schedule.
This helps prevent missed appointments and ensures that everyone stays on track.
6. Integration with Other Tools: Cloud-based scheduling platforms often integrate with other
productivity tools, such as email, calendars, and project management software. This streamlines
workflows and eliminates the need to switch between different applications.
7. Security: Cloud-based scheduling tools typically offer robust security features to protect
sensitive schedule information from unauthorized access or data breaches. This includes
encryption, user authentication, and access controls.
27
4. Document Sharing and Editing: Cloud storage solutions enable team members to easily
share documents, presentations, and other files related to the project or event.
5. Communication: Cloud-based collaboration platforms typically include communication tools
such as chat, video conferencing, and commenting features.
6. Access Control: Cloud computing platforms offer robust access control mechanisms,
allowing project managers to control who has access to specific documents and resources.
7. Scalability: Cloud computing resources can easily scale up or down to accommodate the
needs of the project or event.
Overall, collaborating on group projects and events in the cloud enables teams to work more
efficiently, communicate effectively, and ultimately achieve their goals in a timely manner.
28
CLOUD COMPUTING FOR MAPPING:
Cloud computing for mapping refers to the use of cloud-based technologies and services to
process, store, analyze, and distribute geographic data and maps.
1. Data Storage: Cloud platforms offer scalable and secure storage solutions, allowing mapping
companies to store large volumes of spatial data efficiently. This data can include satellite
imagery, aerial photographs, terrain models, and vector data such as roads, buildings, and points
of interest.
2. Data Processing: Cloud computing enables parallel processing and distributed computing,
which are essential for handling the vast amounts of data involved in mapping tasks. Algorithms
for image processing, feature extraction, and spatial analysis can be run on cloud servers, taking
advantage of their computational power and scalability.
3. Collaboration: Cloud-based mapping platforms facilitate collaboration among teams working
on mapping projects. Multiple users can access and edit spatial data simultaneously, with
changes synchronized in real-time. This enhances productivity and enables geographically
dispersed teams to collaborate effectively.
4. Scalability: Cloud computing allows mapping applications to scale up or down based on
demand.
5. Accessibility: By hosting mapping services in the cloud, organizations can provide access to
geographic data and mapping applications over the internet. This enables users to access maps
and spatial analysis tools from any location and device with an internet connection, fostering
greater accessibility and usability.
6. Cost-Effectiveness: Cloud computing offers a pay-as-you-go pricing model, where users only
pay for the resources they consume.
Overall, cloud computing plays a crucial role in modern mapping by providing scalable, cost-
effective, and accessible solutions for storing, processing, and distributing geographic data and
maps.
30
based pricing model, where users pay only for the features and resources they need.
ONE MARKS:
1. Which of the following factor has helped spur the popularity of collaborative software
for conferencing and workgroup support?
a) emergence of cloud networks
b) high cost of computing
c) lowered cost of travel
d) all of the mentioned
Answer: a
Explanation: Collaborative software is an old concept with roots in many different types of
systems.
2. Point out the wrong statement.
a) Yahoo’s Exchange platform added features to compete with Notes
b) SIP stands for Session Initiation Protocol
c) Citrix GoToMeeting is one of the best-known collaboration software product
d) All of the mentioned
Answer: a
3. Which of the following software enables real-time or near-real-time communication?
a) Focusware
b) Collaborative
c) Cooperative
d) IMPS
Answer: b
4. Which of the following is first ever true collaboration platform?
a) Lotus Notes
b) Citrix GoToMeeting
c) XAMPP
d) None of the mentioned
Answer: a
5. Point out the wrong statement.
a) ZCS can synchronize email, contacts, and calendars with a number of mail services,
including mobile phones
b) ZCS is a groupware product
c) Yahoo!, the owner of ZCS, makes the source code available under their Yahoo!
Public License (YPL)
d) None of the mentioned
Answer: d
6. Which of the following product allows users to share their desktop, do presentations, and
even let a user remotely take over another user’s computer in real time?
a) Citrix
b) Zimbra
c) Trillian
d) All of the mentioned
Answer: a
31
7. Which of the following platform is a direct competitor to GoToMeeting?
a) Zimbra
b) DimDim
c) RimRim
d) None of the mentioned
Answer: b
8. Which of the following is a good example of an SMS service organized into a social
network and blog?
a) Twitter
b) Facebook
c) Instagram
d) None of the mentioned
Answer: a
9. Which of the following sites let you create your own small personal Website, which you
give people access to view?
a) Friendster
b) MySpace
c) Facebook
d) All of the mentioned
Answer: d.
10. Which of the following is a central element of social networking site?
a) Personal profile
b) Friends
c) Groups
d) All of the mentioned
Answer: d
11. Which of the following was one of the top 5 cloud applications in 2010?
a) Cloud backup
b) Web applications
c) Business applications
d) All of the mentioned
Answer: d
12. Point out the correct statement.
a) Google’s cloud includes perhaps some 10 data centers worldwide
b) Flipkart.com’s infrastructure was built to support elastic demand so the system
could accommodate peak traffic
c) Data centers have been sited to optimize the overall system latency
d) All of the mentioned
Answer: c
13. Which of the following benefit is related to creates resources that are pooled together in
a system that supports multi-tenant usage?
a) On-demand self-service
b) Broad network access
c) Resource pooling
d) All of the mentioned
Answer: a
32
14. The is something that you can obtain under contract from your vendor.
a) PoS
b) QoS
c) SoS
d) All of the mentioned
Answer: b
15. Point out the wrong statement.
a) Internet consumes roughly 1 percent of the world’s total power
b) The cost advantages of cloud computing have enabled new software vendors to
create productivity applications
c) A client can provision computer resources without the need for interaction with cloud
service provider personnel
d) None of the mentioned
Answer: a
16. All cloud computing applications suffer from the inherent that is intrinsic in their
WAN connectivity.
a) propagation
b) latency
c) noise
d) all of the mentioned
Answer: b
17. Cloud computing is a system and it is necessarily unidirectional in nature.
a) stateless
b) stateful
c) reliable
d) all of the mentioned
Answer: a
18. Which of the following is the most important area of concern in cloud computing?
a) Security
b) Storage
c) Scalability
d) All of the mentioned
Answer: a
19. You can’t count on a cloud provider maintaining your in the face of government
actions.
a) scalability
b) reliability
c) privacy
d) none of the mentioned
Answer: c
20. Which of the following architectural standards is working with cloud computing industry?
a) Service-oriented architecture
b) Standardized Web services
c) Web-application frameworks
d) All of the mentioned Answer: a
33
21. Which of the following is one of the unique attributes of Cloud Computing?
a) utility type of delivery
b) elasticity
c) low barrier to entry
d) all of the mentioned
Answer: d
22. Point out the correct statement.
a) Service Level Agreements (SLAs) is small aspect of cloud computing
b) Cloud computing does not have impact on software licensing
c) Cloud computing presents new opportunities to users and developers
d) All of the mentioned
Answer: c
23. Applications that work with cloud computing that have low margins and usually low risk are
a) high touch
b) low touch
c) moderate touch
d) all of the mentioned
Answer: b
24. A service that concentrates on hardware follows the as a Service model.
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
Answer: a
25. Point out the wrong statement.
a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability to
provision hardware and software
b) High touch applications are best done on-premises
c) The Google App Engine follows IaaS
d) None of the mentioned
Answer: c
26. When you add a software stack, such as an operating system and applications to the
service, the model shifts to model.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
Answer: a
27. Which of the following is the most refined and restrictive service model?
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
Answer: c
34
28. is a pay-as-you-go model matches resources to need on an ongoing basis.
a) Utility
b) Elasticity
c) Low barrier to entry
d) All of the mentioned
Answer: a
29. feature allows you to optimize your system and capture all possible transactions.
a) scalability
b) reliability
c) elasticity
d) none of the mentioned
Answer: c
30. enables batch processing, which greatly speeds up high-processing applications.
a) Scalability
b) Reliability
c) Elasticity
d) Utility
Answer: a
5 - marks
1. Write short notes on Centralizing email communications?
2. Explain managing projects.
3. Give a note on mapping.
4. Write short notes on schedules.
10- marks
1. Narrate collaborating on group projects and events
2. Expound briefly on cloud computing for corporation
3. Write a note on collaborating on schedules
4. Summarize in detail about presenting on road.
5.Discuss briefly cloud computing for community
35
UNIT – III
USING CLOUD SERIVICES:
COLLABORATIONG ON CALENDERS:
1. Sharing Calendars: Most cloud-based calendar services allow you to share your calendar
with others. You can typically do this by inviting specific individuals via email or by generating
a shareable link.
2. Permission Levels: You can usually specify different permission levels for those you share
your calendar with. These may include:
View Only: Allows others to see your calendar events but not make any
changes. Edit: Allows others to add, edit, and delete events on your calendar.
Manage: Grants full control over the calendar, including the ability to change sharing settings
and manage event invitations.
3. Collaborative Editing: With collaborative editing, multiple people can work on the same
calendar simultaneously. Changes made by one person are instantly visible to others who have
access to the calendar.
4. Notifications and Reminders: Cloud calendar services often provide notifications and
reminders for upcoming events. This ensures that all collaborators stay informed about important
dates and deadlines.
5. Integration with Other Tools: Many cloud calendar services integrate with other
productivity tools and platforms, such as email clients, project management software, and
messaging apps. This makes it easier to coordinate schedules and activities across different tools.
6. Access Across Devices: Since cloud-based calendars are accessible from any device with an
internet connection, collaborators can view and update events from smartphones, tablets, laptops,
or desktop computers.
7. Privacy and Security: It's important to consider privacy and security when collaborating on
calendars. Make sure to review and understand the sharing settings and access controls provided
by the cloud service to ensure that sensitive information remains protected.
Overall, using cloud services for collaborating on calendars can streamline communication,
enhance productivity, and facilitate teamwork by keeping everyone on the same page regarding
schedules and events.
36
SCHEDULES AND TASK MANAGEMENT:
1. Schedule Management: Cloud-based schedule management involves using applications like
Google Calendar, Microsoft Outlook, or Apple Calendar to plan and track events, appointments,
and deadlines. These tools allow you to create events, set reminders, and share your schedule
with others, ensuring everyone stays informed and coordinated.
2. Task Management: Cloud-based task management involves using platforms like Trello,
Asana, or To doist to create, assign, and track tasks and projects. These tools typically offer
features like task lists, due dates, labels, and collaboration options, enabling teams to manage
workflows efficiently and stay organized.
By leveraging cloud services for schedule and task management, users can access their
information from any device with an internet connection, collaborate with teammates in real-
time, and streamline their productivity workflows.
LINE SCHEDULING AND PLANNING:
Line scheduling and planning involve organizing tasks and activities in a linear fashion,
typically following a chronological order.
1. Sequential Order: Arrange tasks and activities in the order in which they need to be
completed, moving from one task to the next in a linear sequence.
2. Time Allocation: Allocate specific time slots for each task or activity based on their duration
and priority. This helps ensure that you have enough time to complete each task without
overcommitting yourself.
3. Identify Dependencies: Identify any dependencies between tasks, where the completion of
one task is dependent on the completion of another. Ensure that tasks are scheduled in the correct
order to avoid delays.
4. Critical Path Analysis: For complex projects with multiple tasks and dependencies, conduct a
critical path analysis to identify the sequence of tasks that determine the project's overall
duration. Focus on completing tasks on the critical path to minimize project delays.
5. Buffer Time: Allocate buffer time between tasks to account for unexpected delays or
emergencies. This helps mitigate the impact of delays on the overall schedule and allows for
flexibility in case tasks take longer than anticipated.
6. Regular Reviews: Regularly review your schedule and adjust it as needed based on changes
in priorities, new tasks, or unforeseen circumstances. This ensures that your schedule remains
up-to-date and adaptable to changing needs.
37
7. Use Tools and Software: Utilize scheduling tools and software to streamline the planning
process and manage your schedule more efficiently. Calendar apps, project management
software, and task management tools can help you organize tasks, set deadlines, and track
progress.
8. Communication and Collaboration: If you're working on a team project, communicate
effectively with team members to coordinate schedules, assign tasks, and ensure that everyone is
aligned on the project timeline.
By exploring line scheduling and planning techniques, you can effectively manage your time,
prioritize tasks, and stay organized to achieve your goals and objectives efficiently.
38
5. Task Management: Implement cloud-based task management tools such as Trello, Asana, or
Monday.com to create, assign, and track tasks related to event planning. These tools allow teams
to organize tasks, set deadlines, assign responsibilities, and monitor progress in a collaborative
and transparent manner.
6. File Storage and Sharing: Store event-related documents, presentations, images, and other
files in cloud storage platforms like Google Drive, Microsoft One Drive, or Drop box. This
ensures that team members have access to the latest version of documents and can easily share
files with each other.
7. Security and Access Control: Ensure that proper security measures are in place to protect
sensitive event information stored in the cloud. Implement access control mechanisms to restrict
access to confidential documents and data only to authorized users within the event planning
team.
By leveraging cloud computing technologies and collaboration tools, event planning teams
can streamline communication, enhance productivity, and effectively manage all aspects of event
planning and execution in a collaborative and efficient manner.
39
4. Integration with Communication Tools: Integrate the contact management system with
communication tools such as email clients, messaging apps, and collaboration platforms. This
allows users to easily access contact information while communicating with clients, partners, or
team members.
5. Tagging and Categorization: Organize contacts into groups, tags, or categories based on
criteria such as location, industry, or relationship status. This makes it easier to segment contacts
and target communications or marketing efforts more effectively.
6. Activity Tracking and History: Keep track of interactions and activities associated with each
contact, such as emails, calls, meetings, or purchases. This provides valuable context and history
that can be used to personalize future interactions and improve relationship management.
7. Mobile Accessibility: Ensure that the contact management system is accessible via mobile
devices, allowing users to access and update contact information on the go. Mobile accessibility
is especially important for sales teams or professionals who frequently interact with contacts
outside the office.
8. Data Security and Compliance: Implement robust security measures to protect sensitive
contact information stored in the cloud, such as encryption, authentication, and regular data
backups. Ensure compliance with relevant data protection regulations, such as GDPR or CCPA,
to safeguard the privacy rights of contacts.
By collaborating on contact management in the cloud, teams can streamline communication,
improve relationship management, and enhance overall productivity in managing contacts and
relationships effectively.
40
2. Shared Access and Permissions: Grant access to the project management platform to team
members or collaborators based on their roles and responsibilities. Set permissions to control
who can view, edit, or delete project-related information to ensure data security and integrity.
3. Real-Time Collaboration: Enable real-time collaboration features in the project management
platform, allowing team members to work together on project tasks and updates simultaneously.
This fosters transparency, enhances communication, and ensures that everyone has access to the
most up-to-date project information.
4. Task Assignment and Tracking: Break down the project into tasks and assign them to
specific team members with deadlines and priorities. Use the project management platform to
track task progress, monitor deadlines, and identify any bottlenecks or issues that need to be
addressed.
5. File Sharing and Document Collaboration: Store project-related documents, files, and
resources in cloud storage platforms such as Google Drive, Microsoft OneDrive, or Dropbox.
Integrate these storage platforms with the project management tool to facilitate seamless file
sharing and collaboration among team members.
6. Communication and Messaging: Utilize built-in communication features within the project
management platform, such as comments, @mentions, or chat, to facilitate discussions, provide
updates, and resolve issues in real time. This reduces the need for separate communication
channels and keeps all project-related communication centralized.
7. Integration with Other Tools: Integrate the project management platform with other
productivity tools and software used by your team, such as calendars, email clients, time tracking
apps, or issue tracking systems. This ensures that project-related information is synced across
different tools and workflows are streamlined.
8. Reporting and Analytics: Use reporting and analytics features provided by the project
management platform to track project performance, analyze trends, and identify areas for
improvement. Generate reports on key metrics such as task completion rates, project timelines,
and resource utilization to keep stakeholders informed and make data-driven decisions.
By collaborating on project management in the cloud, teams can improve coordination,
enhance productivity, and achieve project goals more efficiently by leveraging the benefits of
cloud computing technologies and collaboration tools.
41
COLLABORATING ON WORD PROCESSING:
Collaborating on word processing in the cloud involves using cloud-based word processing
tools to create, edit, and share documents with others in real time. Here's how you can
collaborate on word processing in the cloud:
1. Cloud-Based Word Processors: Use cloud-based word processing tools such as Google
Docs, Microsoft Word Online, or Dropbox Paper. These tools allow multiple users to collaborate
on documents simultaneously from anywhere with an internet connection.
2. Real-Time Collaboration: Enable real-time collaboration features in the word processing
tool, allowing multiple users to edit the same document simultaneously. Changes made by one
user are immediately visible to others, facilitating seamless collaboration and communication.
3. Comments and Suggestions: Use commenting and suggestion features to provide feedback,
ask questions, or make recommendations within the document. This allows collaborators to
discuss and iterate on content without altering the original text.
4. Version History: Take advantage of version history features to track changes made to the
document over time and revert to previous versions if needed. This provides a safeguard against
accidental deletions or unwanted edits and allows collaborators to review the document's
evolution.
5. Access Control: Set access permissions to control who can view, edit, or comment on the
document. This ensures that sensitive information is only accessible to authorized users and
helps maintain data security and integrity.
6. Integration with Other Tools: Integrate the word processing tool with other productivity
tools and platforms used by your team, such as project management software, email clients, or
messaging apps. This allows for seamless communication and collaboration across different
workflows.
7. Offline Access: Ensure that collaborators can access and edit documents offline by enabling
offline access features or using compatible mobile apps. Changes made offline are automatically
synced with the cloud when an internet connection is restored.
8. Document Sharing and Distribution: Share documents with collaborators via email, link
sharing, or by embedding them on websites or intranet portals. Collaborators can access the
document using a web browser without the need to download or install any additional software.
42
COLLABORATING ON SPREADSHEETS:
Collaborating on spreadsheets in cloud computing involves using cloud-based spreadsheet
software to create, edit, and share spreadsheet documents with others in real time. Here's how
you can collaborate on spreadsheets in the cloud:
43
COLLABORATING ON DATABASES:
Collaborating on databases in cloud computing involves using cloud-based database
management systems (DBMS) to store, manage, and share data with multiple users or teams.
1. Cloud-Based Database Platforms: Choose a cloud-based database platform such as Amazon
Web Services (AWS) RDS, Google Cloud SQL, Microsoft Azure SQL Database, or Firebase.
These platforms provide scalable and reliable database services that can be accessed from
anywhere with an internet connection.
2. Multi-User Access: Set up user accounts and access permissions to control who can view,
edit, or manage data in the database. Assign appropriate roles and permissions to ensure that
each user has the necessary access rights based on their responsibilities.
3. Data Sharing and Collaboration: Share database access with collaborators or teams who
need to work with the data. This allows multiple users to collaborate on data analysis, reporting,
or application development tasks using the same dataset.
4. Version Control: Implement version control mechanisms to track changes made to the
database schema, queries, or stored procedures. This helps maintain data consistency and
integrity, especially when multiple users are making changes to the database structure or content.
5. Data Encryption and Security: Ensure that data stored in the cloud database is encrypted
both at rest and in transit to protect it from unauthorized access or breaches. Implement strong
authentication mechanisms and access controls to prevent unauthorized users from accessing
sensitive data.
6. Backup and Disaster Recovery: Regularly backup database data and configurations to
prevent data loss in case of hardware failures, accidental deletions, or security breaches. Set up
disaster recovery mechanisms to quickly restore data and services in the event of a disaster or
outage.
7. Data Monitoring and Performance Optimization: Monitor database performance metrics
such as CPU usage, memory utilization, and query execution times to identify bottlenecks and
optimize database performance. Implement indexing, caching, and query optimization techniques
to improve data retrieval speed and efficiency.
8. Integration with Development Tools: Integrate the cloud database with development tools
and frameworks such as IDEs (Integrated Development Environments), version control systems,
and continuous integration/continuous deployment (CI/CD) pipelines. This streamlines the
development process and enables developers to work with database resources seamlessly.
44
ONE MARK
1) In the Planning Phase, Which of the following is the correct step for performing the analysis?
a. Cloud Computing Value Proposition
b. Cloud Computing Strategy Planning
c. Both A and B
d. Business Architecture Development
Answer: C
2) In which one of the following, a strategy record or Document is created respectively to the
events, conditions a user may face while applying cloud computing mode.
a. Cloud Computing Value Proposition
b. Cloud Computing Strategy Planning
c. Planning Phase
d. Business Architecture Development
Answer: B
3) What is Business Architecture Development?
a. We recognize the risks that might be caused by cloud computing application from a
business perspective.
b. We identify the applications that support the business processes and the technologies
required to support enterprise applications and data systems.
c. We formulate all kinds of plans that are required to transform the current business to
cloud computing modes.
d. None of the above
Answer: A
4) Which one of the following refers to the non-functional requirements like disaster recovery,
security, reliability, etc.
a. Service Development
b. Quality of service
c. Plan Development
d. Technical Service
Answer: B
5) Which one of the following is a phase of the Deployment process?
a. Selecting Cloud Computing Provider
b. IT Architecture Development
c. Business Architecture Development
d. Transformation Plan Development
Answer: D
6) This phase involves selecting a cloud provider based on the Service Level Agreement (SLA),
which defines the level of service the provider receives.
a. Maintenance and Technical Service
b. Selecting Cloud Computing Provider
c. Both A and B
d. None of the above
Answer: B
45
7) In which one of the following phases, IT Architecture Development came?
a. Strategy Phase
b. Planning Phase
c. Deployment Phase
d. Development Phase
Answer: B
8) Which of the model involves the special types of services that users can access on a Cloud
Computing platform?
a. Service
b. Planning
c. Deployment
d. Application
Answer: A
9) Which one of the following is related to the services provided by Cloud?
a. Sourcing
b. Ownership
c. Reliability
d. PaaS
Answer: A
10) How many phases are present in Cloud Computing Planning?
a. 2
b. 3
c. 4
d. 5
Answer: B
11. Which of the following can be referred to as productivity software?
a) DBMS
b) Word processors
c) Presentation software
d) All of the mentioned
Answer: d
12. Point out the correct statement.
a) Management of cloud storage is performed by out-of-band management systems through a
data storage interface
b) Out-of-band refers to a management console that isn’t on the storage network
c) Out-of-band is most often on an Ethernet network inside a browser
d) All of the mentioned
Answer: d
13. Which of the following can be tagged as frequently used secondary category applications?
a) Personal Information Managers
b) Scheduler
c) HTML editors
d) All of the mentioned
Answer: c
46
14. Which of the following is characteristic of productivity software?
a) Standards for data interchange
b) User-centric
c) Static features
d) All of the mentioned
Answer: d.
15. Point out the wrong statement.
a) A CDMI container can be exported and then used as a virtual disk by Virtual Machines in
the cloud
b) CDMI and OCCI are meant to interoperate
c) The cloud infrastructure management console can be used to attach exported CDMI
containers to the Virtual Machine that is desired
d) None of the mentioned
Answer: d
16. Which of the following is the disadvantage of online office suite?
a) Generally lower costs for users
b) Platform independence
c) Reduced maintenance costs
d) An Internet connection is required to access your
documents Answer: d
17. Which of the following benefit is provided by the cloud computing office suite?
a) Easier document sharing
b) More secure
c) No full Control
d) None of the mentioned
Answer: a
18. Which of the following is Adobe’s application suite of cloud-based applications?
a) Acrobat.com
b) Openoffice
c) Gpdf
d) All of the mentioned
Answer: a
19. Which of the following tool cannot be found at Acrobat.com?
a) Buzzword
b) ConnectNow
c) Create Sheet
d) All of the mentioned
Answer: c
20. Which of the following Acrobat word processor offers a capable set of office
applications and makes good use of Adobe Flash animation in its interface?
a) Buzzword
b) ConnectNow
c) Create Sheet
d) All of the mentioned
Answer: a
47
5 – MARK
1. Write short notes on Collaborating on calendars.
2. Explain collaborating on project management
3. Give a note on collaborating on database
10 - MARK
48
UNIT-IV
OUTSIDE THE CLOUD
Introduction:
"Introduction outside the cloud," it typically refers to activities, processes, or technologies that
are not directly related to cloud computing. Here are a few examples:
1. *Traditional IT Infrastructure*: This includes physical servers, networking equipment, and
storage devices that are managed on-premises rather than being hosted on cloud platforms like
AWS, Azure, or Google Cloud.
2. *Legacy Software Systems*: Older software applications or systems that are not designed for
cloud deployment. These systems may require dedicated hardware and manual maintenance,
unlike cloud-native applications.
3. *Offline Data Storage and Processing*: Some organizations may still rely on offline
methods for storing and processing data, such as using local databases or spreadsheets instead of
cloud-based databases or analytics platforms.
4. *Non-Cloud Collaboration Tools*: These are tools used for communication, project
management, and collaboration that do not rely on cloud infrastructure. Examples include on-
premises email servers, local file storage solutions, and standalone project management software.
5. *Security Measures*: Some security practices and measures may focus on securing on-
premises infrastructure and endpoints rather than cloud-based security solutions like CASBs
(Cloud Access Security Brokers) or cloud-native security tools.
49
Cloud Classifications and Characteristics
Clouds are classified according to their height above and appearance (texture) from the
ground. The following cloud roots and translations summarize the components of this
classification system:
1) Cirro-: curl of hair, high;
2) Alto-: mid;
3) Strato-: layer;
4) Nimbo-: rain, precipitation; and
5) Cumulo-: heap.
High-level clouds:
High-level clouds occur above about 20,000 feet and are given the prefix “cirro.” Due to cold
tropospheric temperatures at these levels.
The clouds primarily are composed of ice crystals, and often appear thin, streaky, and white
(although a low sun angle, e.g., near sunset, can create an array of color on the clouds).
The three main types of high clouds are cirrus, cirrostratus, and cirrocumulus.
Cirrus clouds are wispy, feathery, and composed entirely of ice crystals.
Mid-level clouds:
These clouds may be composed of liquid water droplets, ice crystals, or a combination of the two,
including supercooled droplets (i.e., liquid droplets whose temperatures are below freezing).
The two main type of mid-level clouds are altostratus and altocumulus.
Altostratus clouds are “strato” type clouds (see below) that possess a flat and uniform type texture
in the mid levels. They frequently indicate the approach of a warm front and may thicken and
lower into stratus, then nimbostratus resulting in rain or snow.
Low-level clouds:
Except during cold winter storms when ice crystals (and snow) comprise much of the clouds.
Cirrostratus clouds (above) Cirrocumulus clouds (above) Cirrus clouds (above) Altostratus clouds
(above) Altocumulus clouds (above) Stratus clouds (above) Stratocumulus clouds (above)
50
The lowering denotes a storm's updraft where rapidly rising air causes lower pressure just below
the main updraft, which enhances condensation and cloud formation just under the primary cloud
base.
Wall clouds take on many shapes and sizes. Some exhibit strong upward motion and cyclonic
rotation, leading to tornado formation, while others do not rotate and essentially are harmless.
Shelf Cloud:
A low, horizontal, sometimes wedge-shaped cloud associated with the leading edge of a
thunderstorm’s outflow or gust front and potentially strong winds.
Although often appearing ominous, shelf clouds normally do not produce tornadoes.
Fractus:
Low, ragged stratiform or cumuliform cloud elements that normally are unattached to larger
thunderstorm or cold frontal cloud bases.
Also known as scud, fractus clouds can look ominous, but by themselves are not dangerous.
Mammatus:
Drooping underside (pouch-like appearance) of a cumulonimbus cloud in its latter stage of
development.
Mammatus most often are seen hanging from the anvil of a severe thunderstorm, but do not
produce severe weather. They can accompany non-severe storms as well.
Contrail:
Narrow, elongated cloud formed as jet aircraft exhaust condenses in cold air at high altitudes,
indicative of upper level humidity and wind drift. Fog: Layer of stratus clouds on or near the
ground.
Different types include radiation fog (forms overnight and burns off in the morning) and
advection fog.
ADVANTAGES AND DISADVANTAGES:
Advantage – Cost Reduction
It’s a basic financial principle that profit comes from making more money. Just about
Good servers will run you thousands of dollars just for the hardware.
Servers also need constant cooling to work properly, so brace yourself for some brutal air
conditioning costs.
51
A company can go broke buying software licenses for high-end programs.
Cloud computing solves all of these problems for a business. Cloud-based applications
are usually a fraction of the cost of locally installed software.
Advantage – Security
In spite of some high-profile cloud data breaches, there are numerous arguments for why
cloud computing is more secure than in-house computing.
Data held in the cloud is less subject to employee theft.
It’s easier to steal information when you have physical access to the machine it’s stored on.
The most obvious argument is that cloud providers will make a point to keep security
protocols and software up to date because their business depends on it.
That most cloud providers have full-time staff members who specialize in digital/network
security.
Advantage – Reliability
It is, in short, the nightmare scenario.
Cloud providers survive on redundancy. Your data isn’t just stored on a server. It’s stored
across multiple servers.
Depending on the provider, it might even be stored on servers in multiple locations. Just
in case there’s a catastrophic failure at a given server farm.
This means that no single hardware failure will hamstring your business. It also means
that you can expect superb reliability in terms of accessing your data or services. Most
providers even guarantee 99.99% uptime.
Disadvantage – Security
Security, at one level, is an advantage of cloud computing for the reasons discussed
above. Security is also a disadvantage at a different level.
Keeping your home safe requires actually locking your doors, arming the security
system and keeping the cameras turned on.
The user is the weak link in almost all security systems.
Security is one area where determining cloud computing advantage and disadvantages
depends on the angle from which you look at the issue.
52
Disadvantage – Cloud Service Closes Shop
In a mature industry, you usually deal with one of a handful of known players that offer
time-tested, reliable services.
Cloud computing is a young industry with lots of companies vying for business.
The more important the cloud is to your business, the more devastating a sudden provider
shutdown will prove.
This problem is magnified by the issue of cloud vendor lock-in, where migrating from
one cloud vendor to another is difficult and expensive.
Evaluating web mail services:
Introduction
There are three main categories of communication
tools: web email services,
instant messaging services, and
web conferencing tools.
Groups located anywhere in the world can use these tools to communicate with
other group members
Evaluating Web Mail Services
Traditional email
The type of email program you probably have installed on your PC uses a protocol called
the Post Office Protocol (POP).
53
It’s just like a cloud service; no special software required.
This lets you retrieve and manage your email when you’re out of the office or on the road.
It’s also easier to set up web mail.
All you need to know is your user ID and password, and then you access a page that lets you
view the contents of your inbox,
read and reply to messages,
create new messages, and (in many cases)
store messages in folders.
54
But Gmail offers a few unique features
Gmail doesn’t use folders - you can’t organize your mail into folders, as you can with
the other services.
You can ―tag‖ each message with one or more labels.
You can search and sort your messages by any of their labels.
Gmail groups together related email messages in what Google calls conversations.
A conversation might be an initial message and all the replies (and replies to replies) to
that message;
A conversation might also be all the daily emails from a single source that have a
common subject, such as messages from subscribed-to mailing lists.
Gmail is a free service; all you have to do is sign up for an account.
When you sign up for your Gmail account, you get assigned your email address (in the
form of name@gmail.com) and you get access to the Gmail inbox page.
Yahoo! Mail
Yahoo! Mail (mail.yahoo.com) is a web mail service, provided by the popular Yahoo!
search site.
The basic Yahoo! Mail is free and can be accessed from any PC, using any web
browser.
Yahoo! also offers a paid service called Yahoo! Mail Plus that lets you send larger
messages and offers offline access to your messages via POP email clients.
Yahoo! Mail gives you unlimited storage—which means you can effectively use Yahoo!
Mail as an online backup or file-storage system.
All you have to do is email yourself those files you want to store, and then place those
messages (with attachments) in your designated storage folder.
It also offers traditional folder-based organization.
You get a message pane and a reading pane.
Yahoo! also offers users the SpamGuard spam filter and Norton AntiVirus virus scanner.
55
Windows Live Hotmail
Hotmail was one of the first web-based email services.
But it’s not called “Hotmail” anymore; Microsoft now calls it Windows Live Hotmail.
Hotmail (we’re going to call it by its old, shorter name) can be accessed from any web
browser on any PC anywhere in the world, for free.
Microsoft gives you 5GB of storage,
56
Other Web Mail Services
Gmail, Yahoo! Mail, and Windows Live Hotmail are the three largest web mail services.
Besides these big providers, there are dozens of independent web mail services.
They are:
AOL Mail (mail.aol.com)
BigString (www.bigstring.com)
Excite Mail (mail.excite.com)
FlashMail
(www.flashmail.com) GMX
Mail (www.gmx.com)
Inbox.com (www.inbox.com)
Lycos Mail (mail.lycos.com)
Mail.com (www.mail.com)
Zoho Mail (zoho.mail.com)
1. *Storage Space:* Check how much storage space the service offers for emails and
attachments. Some services offer limited space for free accounts and more for paid plans.
2. *Security:* Look for services that provide strong encryption for data transmission and
storage. They should also have measures in place to protect against phishing and malware.
3. *User Interface:* The interface should be intuitive and easy to navigate. Features like drag-
and-drop, filters, and customizable folders can enhance productivity.
57
4. *Integration:* Consider how well the service integrates with other tools and platforms you
use, such as calendars, task managers, and collaboration software.
5. *Mobile Support:* Ensure that the service has a mobile app or a mobile-friendly website for
easy access on smartphones and tablets.
6. *Reliability:* Check the service's uptime and reliability track record to avoid disruptions in
accessing your emails.
7. *Customer Support:* Evaluate the quality of customer support provided by the service,
including response times and availability of help resources like FAQs and tutorials.
8. *Privacy Policies:* Review the service's privacy policies to understand how they handle your
data, including whether they sell or share it with third parties.
58
TYPES OF INSTANT MESSAGING:
IM applications are often standalone applications, such as WhatsApp. They can also be
embedded applications with multiple purposes.
Instant messaging programs can differ based on the platform they are embedded in. For
example, an instant messaging tool can be embedded into the following:
Social media.
For example, Facebook Messenger has a list of Facebook friends that users can open a chat
with in a pop-up window. On a mobile device, Facebook Messenger is a separate app that
imports contacts from Facebook and displays them as a list.
Video conferencing.
Zoom has a small chat window in the side of the video that can be used to chat with the whole
group or an individual.
Gaming and streaming.
Twitch is a streaming platform where users can stream live video and gameplay, alongside a
chat window where they can interact with other users.
When they are standalone applications, they often incorporate cross-platform features, such as
the following:
voice over IP
SMS
video chat
file sharing
Some embedded programs have these cross-platform features as well. For example, Facebook
Messenger has video chat.
Popular instant messaging software and platforms
While some instant messaging tools are specifically consumer services and other are for
enterprises, crossovers do exist.
Cisco Jabber, based on Jabber
Discord
Facebook Messenger
Google Chat
HCL Sametime
iMessage
59
Line
Microsoft Teams
Pidgin
Slack
Snapchat
Trillian
Viber
WeChat
WhatsApp Messenger
The difference between instant messaging and texting
Both instant messaging and texting involve exchanging digital messages in real time. The
two methods of communication are different, however.
Evaluating web conference tools :
60
Presenter notes, which let the presenter take notes during the course of the conference for future
action.
Annotation, which lets the presenter mark up the document or presentation being shared or
given, typically by drawing or highlighting on the screen.
Whiteboard, which is a blank screen on which the presenter or participants can draw or
highlight objects.
Text-based chat, which lets participants discuss the presentation witheach other in real time.
Audio conferencing, which adds the spoken words of the presenter to a PowerPoint
presentation.
Video conferencing, which puts a picture of the presenter in a corner of the conference webtop,
typically generated via webcam.
Polling, which lets the presenter ask questions of the audience.
Quizzes, which lets participants answer test questions, typically with results tabulated in real
time.
WebEx
Cisco’s WebEx (www.webex.com) is perhaps the most-used web conferencing solution today.
61
IBM’s web conferencing service is dubbed Lotus Sametime (www.ibm.com/ sametime/),
and it comes in several different versions:
Entry,
Standard,
Advanced,
Unyte.
The web conferencing service comes complete with enterprise instant messaging,
multiway chat, VoIP and point-to-point video, and integration with most major desktop
applications. Pricing varies by size of company.
62
Creating groups and social networks:
social groups
A religious group, an ethnic group, your workplace colleague group, your college class, a
sports team, etc. These groups can also be called social group.
For example, being in a crowded supermarket or standing in line at the movie theater does not
make you feel like you belong with the people doing the same thing as you.
A group is also different from a category. If you are in the same category as a person,
you may share similar characteristics—like age, height, or you both wear glasses.
1. *Define Purpose:* Clearly define the purpose and goals of your group or social network. This
could be anything from a professional networking platform to a hobby-based community.
63
2. *Choose a Platform:* Select a platform that aligns with your goals and target audience. This
could be social media platforms like Facebook Groups, LinkedIn, or niche platforms like
Discord for gaming communities, or Slack for professional networks.
3. *Set Up Guidelines:* Establish clear guidelines and rules for your group or network. This
includes rules for behavior, content sharing, moderation policies, etc.
4. *Invite Members:* Invite individuals who are interested in the topic or purpose of your
group. You can use social media, email invitations, or direct outreach.
5. *Encourage Engagement:* Encourage members to engage actively by starting discussions,
sharing content, participating in polls or surveys, and connecting with others.
6. *Moderate and Manage:* Regularly moderate discussions, manage member requests, and
address any issues or conflicts that arise. This helps maintain a positive and productive
environment.
7. *Promote Growth:* Promote your group or network to attract new members. This can be
done through social media marketing, collaborations with influencers, or organic word-of-mouth
growth.
8. *Evaluate and Iterate:* Continuously evaluate the performance of your group or network.
Gather feedback from members, analyze engagement metrics, and iterate on your strategies to
improve over time.
The present study seeks to evaluate the usability and suitability of two online
collaborative learning and productivity platforms, as well as investigate their pedagogical
impact in terms of the students’ perceived learning outcomes within the context of an
ESP (English for specific purposes) course in higher education.
1. *Collaboration Features:* Look for tools that offer real-time collaboration features like
document editing, task management, and communication tools such as chat and video
conferencing.
2. *Integration:* Check if the groupware integrates smoothly with other tools and platforms
your team uses, such as email clients, project management software, or cloud storage services.
64
3. *Security:* Ensure that the groupware provides robust security features, including data
encryption, access controls, and compliance with industry standards like GDPR or HIPAA,
depending on your needs.
4. *Customization:* Evaluate the level of customization the groupware offers, such as branding
options, customizable workflows, and user interface flexibility.
5. *Scalability:* Consider the scalability of the groupware solution, especially if your team is
growing or if you have varying needs across different departments or projects.
6. *User Experience:* Test the user interface and overall user experience to ensure that it is
intuitive, easy to use, and enhances productivity rather than creating unnecessary complexity.
7. *Cost:* Compare the pricing plans and licensing models to determine the cost-effectiveness
of the groupware solution for your organization, considering both short-term and long-term
expenses.
COLLABORATING VIA BLOGS AND WIKIS
Blogs
A blog is a kind of online journal that its author updates frequently with new musings and
information.
In terms of organization, a blog is collection of posts or messages.
Multiple contributions
Blogger
Blogger is Google’s blog- hosting community ,and with more than 8 million individual
blogs, the largest blog hosts on the internetBlogger dashboard is where we can manage
all our blog activity.
We can posts and edit comments.
Wordpress
A web widget is a software widget for the web
A web widget is a software widget for the web. It's a small application with limited functionality that
can be installed and executed within a web page by an end user.
65
Evaluating wikis for collaboration
A wiki is a website which allows its users to add, modify, or delete its content via a web
browser usually using a simplified markup language or a rich-text editor.
Final method for group collaboration is the wiki
Wikipedia is, in essence, a giant online encyclopedia.Articles are written, edited and elaborated
on & by people of all types First wiki was wiki wiki web- the exchage of ideas between the
computer programmers.
PBwikiPBwiki (www.pbwiki.com) offers various levels of wiki hosting
Small wikies are free, larger wikies are priced low as $4 per user per monthWiki creation is easy
and various templates are provided.
Versionate
Versionate( offers hosted wikies designed for group colloboration.Aversionate wiki is business
friendly provides sss-level security.Free(500mb storage), personal(2GB), business(unlimited
,enterprise(unlimited)
Wikihost.org
The wikihost.org site( provides free wiki hosting.Wiki creation is via the GeboBebo engine,
which offers a local database structure, user and right management.
Wikispaces
Wikispaces( claims to host more than 450,000 individual wikis.Standard features include image
and file uploading, widget and media embedding.A variety of hosting plans are available from
basic to private label premium($800/month)
zohowiki
Zohowiki this offers free wiki hosting complete with WYSIWYG editing, versioning of wiki
pages and the ability to publish wiki pages free.Wiki is managed from dashboard page.
66
v
67
ONE MARK:
1. Through which, the backend and front-end are connected with each other?
A. Browser
B. Database
C. Network
D. Both A and B
2. How many types of services are there those are offered by the Cloud Computing to the users?
a. 2
b. 4
c. 3
d. 5
3.Which of the following is one of the backend's built-in components of cloud computing?
a. Security
b. Application
c. Storage
d.Service
4. Which of the following is an example of a PaaS cloud service?
a) Heroku
b) AWS Elastic Beanstalk
c) Windows Azure
d) All of the above
5. Which of the following is an example of an IaaS Cloud service?
a) DigitalOcean
b) Linode
c) Rackspace
d) All of the above
6. Which of the following is the correct statement about cloud types?
a) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
b) A deployment model defines the purpose of the cloud and the nature of how the cloud is local
c) Service model defines the purpose of the cloud and the nature of how the cloud is located
d) All of the mentioned
7. Which architectural layer is used as a backend in cloud computing?
a) cloud
b) soft
c) client
d) all of the mentioned
8. Which of the following architectural standards is working with cloud computing industry?
a) Web-application frameworks
b) Service-oriented architecture
c) Standardized Web services
d) All of the mentioned
68
9. Which of the following is the correct statement?
a) Cloud computing presents new opportunities to users and developers
b) Service Level Agreements (SLAs) is small aspect of cloud computing
c) Cloud computing does not have impact on software licensing
d) All of the mentioned
10. Into which expenditures does Cloud computing shifts capital expenditures?
a) local
b) operating
c) service
d) none of the mentioned
5 - MARK
1. List out some mail services.
2. Write short notes on AOL ,ICQ instant
messangers. 3.List some features of web
conferencing tools
10 - MARK
1.Brief notes on Genesys Meeting
Center 2.What is social network?
3. List some advantages of any social
network. 4.What are all the online groupware
tool
69
UNIT-V
Security in cloud computing is a major concern. Proxy and brokerage services should be
employed to restrict a client from accessing the shared data directly. Data in the cloud should be
stored in encrypted form.
Security Planning
Before deploying a particular resource to the cloud, one should need to analyze several aspects of
the resource, such as:
o A select resource needs to move to the cloud and analyze its sensitivity to risk.
o Consider cloud service models such as IaaS, PaaS,and These models require the
customer to be responsible for Security at different service levels.
o Consider the cloud type, such as public, private, community, or
o Understand the cloud service provider's system regarding data storage and its transfer
into and out of the cloud.
o The risk in cloud deployment mainly depends upon the service models and cloud types.
Security Boundaries
The Cloud Security Alliance (CSA) stack model defines the boundaries between each
service model and shows how different functional units relate.
A particular service model defines the boundary between the service provider's
responsibilities and the customer.
70
Key Points to CSA Model
o IaaS is the most basic level of service, with PaaS and SaaS next two above levels of
services.
o Moving upwards, each service inherits the capabilities and security concerns of the model
beneath.
o IaaS provides the infrastructure, PaaS provides the platform development environment,
and SaaS provides the operating environment.
o IaaS has the lowest integrated functionality and security level, while SaaS has the
highest.
o This model describes the security boundaries at which cloud service providers'
responsibilities end and customers' responsibilities begin.
o Any protection mechanism below the security limit must be built into the system and
maintained by the customer.
Although each service model has a security mechanism, security requirements also depend on
where these services are located, private, public, hybrid, or community cloud.
71
Understanding data security
Since all data is transferred using the Internet, data security in the cloud is a major concern.
Here are the key mechanisms to protect the data.
o access control
o audit trail
o certification
o authority
The service model should include security mechanisms working in all of the above areas.
Since the data stored in the cloud can be accessed from anywhere, we need to have a
mechanism to isolate the data and protect it from the client's direct access.
Broker cloud storage is a way of separating storage in the Access Cloud. In this
approach, two services are created:
1. A broker has full access to the storage but does not have access to the client.
2. A proxy does not have access to storage but has access to both the client and the broker.
3. Working on a Brocade cloud storage access system
4. When the client issues a request to access data:
5. The client data request goes to the external service interface of the proxy.
6. The proxy forwards the request to the broker.
7. The broker requests the data from the cloud storage system.
8. The cloud storage system returns the data to the broker.
9. The broker returns the data to the proxy.
10. Finally, the proxy sends the data to the client.
72
Encoding
73
Cloud security architecture and shared responsibility model
The cloud are not single-player processes.
Most enterprises will keep a large portion of their IT workflow within their data centers,
local networks, and VPNs.
The cloud adds additional players, so the cloud security architecture should be part of a
broader shared responsibility model.
Will divide the components of a cloud application into layers, with the top layer being the
responsibility of the customer and the lower layer being the responsibility of the cloud
provider.
Each separate function or component of the application is mapped to the appropriate
layer depending on who provides it.
The contract form then describes how each party responds.
Introduction:
The cornerstone of modern business operations.
A well-designed cloud architecture framework lays the groundwork for scalable, secure,
and resilient systems.
The essentials of cloud architecture, discuss important considerations, guidelines, and
best practices to help organizations build robust and efficient cloud solutions.
74
IMPORTANT CONSIDERATIONS IN CLOUD ARCHITECTURE:
Scalability and Elasticity: Design systems that can scale dynamically based on workload
demands. Utilize auto-scaling mechanisms and infrastructure-as-code (IaC) tools to achieve
elasticity.
Security and Compliance: Implement robust security measures, including identity and
access management, data encryption, network segmentation, and compliance frameworks, to
protect sensitive data and ensure regulatory compliance.
High Availability and Fault Tolerance: Design architectures with redundancy, fault
isolation, and disaster recovery mechanisms to minimize downtime and ensure system
availability.
Cost Optimization: Optimize cloud costs through resource allocation, right-sizing,
utilization monitoring, and leveraging cloud-native services that offer cost-effective
solutions.
Sustainability: It encourages businesses to design and operate their cloud services in an
environmentally sustainable manner, by minimizing their carbon footprint and reducing
their energy consumption, is a reminder that cloud computing has the potential to not only
improve business efficiency but also contribute to a more sustainable future.
GUIDELINES FOR CLOUD ARCHITECTURE DESIGN:
Modular Design: Embrace microservices architecture and loosely coupled components for
easier scalability, maintenance, and continuous deployment.
Resilience and Failover: Employ fault-tolerant design patterns such as load balancing,
replication, and automated failover to ensure minimal service disruption in the face of
failures.
Automation and Orchestration: Leverage automation tools, workflows, and orchestration
frameworks to streamline provisioning, deployment, configuration, and management of
cloud resources.
Data Management: Implement appropriate data storage and management strategies,
including data replication, backup, archival, and efficient retrieval mechanisms.
Monitoring and Observability: Establish comprehensive monitoring and observability
practices to gain insights into system performance, resource utilization, and potential
bottlenecks.
75
ARCHITECTURE:
Well-Architected Framework: Follow the cloud provider’s well-architected framework,
which provides a set of best practices and design principles for building reliable and
efficient cloud solutions.
Cloud-Native Services: Leverage cloud-native services and serverless computing for
increased productivity, reduced operational overhead, and improved scalability.
Continuous Integration and Deployment (CI/CD): Implement CI/CD pipelines to automate
software delivery, testing, and deployment processes, enabling rapid and reliable releases.
Infrastructure as Code (IaC): Utilize IaC tools like Terraform or CloudFormation to define
and manage infrastructure resources, ensuring consistency, reproducibility, and scalability.
Continuous Security: Embed security practices throughout the development lifecycle.
Implement security testing, vulnerability scanning, and regular updates to keep systems
secure.
ISSUES IN CLOUD COMPUTING
The delivery of computing services from a remote location. Cloud Computing is Internet-
based computing, where shared resources, software, and information are provided to
computers and other devices on demand.
1. Privacy:
The user data can be accessed by the host company with or without permission.
The service provider may access the data that is on the cloud at any point in time.
They could accidentally or deliberately alter or even delete information.
2. Compliance:
There are related to data and hosting.
To comply with regulations (Federal Information Security Management Act, Health
Insurance Portability and Accountability Act, etc.) the user may have to adopt
deployment modes that are expensive.
3. Security:
Cloud-based services involve third-party for storage and security. They may share
users’ information with others. Security presents a real threat to the cloud.
76
4. Sustainability:
Citing the server’s effects on the environmental effects of cloud computing,
In areas where climate favors natural cooling and renewable electricity is
readily available, the countries with favorable conditions.
5. Abuse:
While providing cloud services, it should be ascertained that the client is not
purchasing the services of cloud computing for a nefarious purpose.
6. Higher Cost:
If you want to use cloud services uninterruptedly then you need to have a
powerful network with higher bandwidth than ordinary internet networks.
This is a major problem before small organizations, that restricts them from
diving into cloud technology for their business.
7. Recovery of lost data in contingency:
Before subscribing any cloud service provider goes through all norms and
documentations and check whether their services match your requirements and
sufficient well-maintained resource infrastructure with proper upkeeping.
8. Upkeeping(management) of Cloud:
Maintaining a cloud is a herculin task because a cloud architecture contains a
large resources infrastructure and other challenges and risks as well, user
satisfaction, etc.
9. Lack of resources/skilled expertise:
One of the major issues that companies and enterprises are going through today
is the lack of resources and skilled employees.
10. Pay-per-use service charges:
Cloud computing services are on-demand services a user can extend or
compress the volume of the resource as per needs.
TRUSTED CLOUD COMPUTING
Define trusted cloud computing with suitable examples
The trusted cloud computing platform (TCCP) provides a closed box execution
environment by extending the concept of trusted platform to an entire IaaS
backend.
77
The TCCP guarantees the confidentiality and the integrity of a user’s VM, and
allows a user to determine up front whether or not the IaaS enforces these
properties.
78
In addition, cloud computing is increasingly being used to manage and store huge
amounts of data in database applications that are also co-located with other users’
information.
secure communications for client applications and storage.
79
Integrity —
Ensures that data has not been changed due to an accident or
malice. Firewall services
Communications Security Management
Intrusion detection services
Availability —
Ensures that data is accessible when and where it is needed, and that connectivity is
accessible when needed, allowing authorized users to access the network or
systems.
Fault tolerance for data availability, such as backups and redundant disk systems
Acceptable logins and operating process performances
Reliable and inter-operable security processes and network security mechanism.
MICRO ARCHITECTURES
In the context of cloud computing, microarchitectures refer to the design and organization
of the underlying hardware and software components that make up the cloud infrastructure.
These microarchitectures play a crucial role in determining the performance,
scalability, reliability, and security of cloud services. Here's a detailed explanation:
1. *Physical Infrastructure:* Microarchitectures encompass the physical components of the
cloud infrastructure, including servers, storage devices, networking equipment, and data
centers. These components are designed to work together efficiently to provide computing
resources to cloud users.
2. *Virtualization:* Virtualization is a key aspect of cloud microarchitectures, allowing
physical resources to be abstracted and divided into virtual instances that can be dynamically
allocated to users based on demand. Virtualization technologies such as hypervisors and
containerization enable efficient resource utilization and isolation between different users
and applications.
3. *Scalability:* Cloud microarchitectures are designed to be highly scalable, allowing
resources to be easily added or removed to meet changing demands. This scalability is
achieved through techniques such as horizontal scaling (adding more instances) and vertical
scaling (increasing the resources of existing instances).
80
4. *Resilience:* Microarchitectures in cloud computing prioritize resilience to ensure that
services remain available even in the face of hardware failures, network outages, or other
disruptions. Redundancy, fault tolerance, and disaster recovery mechanisms are built into
the design to minimize downtime and data loss.
5. *Security:* Security is a fundamental aspect of cloud microarchitectures, with mechanisms
in place to protect data, applications, and infrastructure from unauthorized access, malicious
attacks, and data breaches. This includes encryption, access controls, identity management,
network security, and monitoring/logging.
6. *Automation and Orchestration:* Cloud microarchitectures leverage automation and
orchestration tools to streamline management tasks and ensure consistent deployment,
configuration, and monitoring of resources. Infrastructure-as-Code (IaC) principles are
often employed to define and manage cloud infrastructure using code.
7. *Performance Optimization:* Microarchitectures are optimized for performance to deliver
high-speed computation, storage, and networking capabilities to users. This includes optimizing
hardware configurations, software algorithms, and network architectures to minimize latency
and maximize throughput.
Overall, microarchitectures are the building blocks of cloud computing environments,
providing the foundation for delivering scalable, resilient, secure, and high-performance cloud
services to users worldwide.
ARCHITECTURE OF IDENTITY ACCESS MANAGEMENT IN CLOUD COMPUTING
Identity Access Management is used by the root user (administrator) of the
organization. The users represent one person within the organization, and the users can
be grouped in that all the users will have the same privileges to the services.
81
THE ARCHITECTURE OF IDENTITY ACCESS MANAGEMENT
User Management:- It consists of activities for the control and management over the identity
life cycles.
Authentication Management:-
It consists of activities for effectively controlling and managing the processes for determining
which user is trying to access the services and whether those services are relevant to him or not.
Authorization Management:-
It consists of activities for effectively controlling and managing the processes for determining
which services are allowed to access according to the policies made by the administrator of the
organization.
Access Management:-
It is used in response to a request made by the user wanting to access the resources with the
organization.
82
Operational Activities of IAM:
In this process, we onboard the new users on the organization’s system and application and
provide them with necessary access to the services and data.
Credential and Attribute Management:-
Credentials are bound to an individual user and are verified during the authentication process.
Entitlement Management:-
These are also known as authorization policies in which we address the provisioning and de-
provisioning of the privileges provided to the user for accessing the databases, applications, and
systems.
Identity Federation Management:-
In this process, we manage the relationships beyond the internal networks of the organization
that is among the different organizations.
Centralization of Authentication and Authorization:-
It needs to be developed in order to build custom authentication and authorization features into
their application, it also promotes the loose coupling architecture.
Access control is a security technique that regulates who or what can view or use
resources in a computing environment.
It is a fundamental concept in security that minimizes risk to the business or organization.
There are two types of access control:
83
physical and logical. Physical access control limits access to campuses, buildings, rooms
and physical IT assets. Logical access control limits connections to computer networks,
system files and data.
Access control important:
The goal of access control is to minimize the security risk of unauthorized access to
physical and logical systems.
Access control is a fundamental component of security compliance programs that
ensures security technology and access control policies are in place to protect
confidential information, such as customer data.
Most organizations have infrastructure and procedures that limit access to networks,
computer systems, applications, files and sensitive data, such as personally identifiable
information and intellectual property.
Access control systems are complex and can be challenging to manage in dynamic IT
environments that involve on-premises systems and cloud services.
After high-profile breaches, technology vendors have shifted away from single sign-
on systems to unified access management, which offers access controls for on-premises
and cloud environments.
Access control works
Access controls identify an individual or entity, verify the person or application is who or
what it claims to be, and authorizes the access level and set of actions associated with the
username or IP address.
Directory services and protocols, including Lightweight Directory Access Protocol
and Security Assertion Markup Language, provide access controls for authenticating and
authorizing users and entities and enabling them to connect to computer resources, such
as distributed applications and web servers.
84
Types of access control
The main models of access control are the following:
Mandatory access control (MAC).
This is a security model in which access rights are regulated by a central authority based on
multiple levels of security.
Discretionary access control (DAC).
This is an access control method in which owners or administrators of the protected system,
data or resource set the policies defining who or what is authorized to access the resource.
Role-based access control (RBAC).
This is a widely used access control mechanism that restricts access to computer resources
based on individuals or groups with defined business functions -- e.g., executive level,
engineer level 1, etc.
Rule-based access control.
This is a security model in which the system administrator defines the rules that govern
access to resource objects.
Attribute-based access control.
This is a methodology that manages access rights by evaluating a set of rules, policies and
relationships using the attributes of users, systems and environmental conditions.
IMPLEMENTING ACCESS CONTROL
Access control is integrated into an organization's IT environment. It can involve identity
management and access management systems.
These systems provide access control software, a user database and management tools for
access control policies, auditing and enforcement.
85
Challenges of access control
Many of the challenges of access control stem from the highly distributed nature of modern IT.
dynamically managing distributed IT environments;
password fatigue;
compliance visibility through consistent reporting;
centralizing user directories and avoiding application-specific silos; and
data governance and visibility through consistent reporting.
Many traditional access control strategies -- which worked well in static environments
where a company's computing assets were help on premises -- are ineffective in today's
dispersed IT environments.
Modern IT environments consist of multiple cloud-based and hybrid implementations,
Access control software
Many types of access control software and technology exist, and multiple components are
often used together as part of a larger identity and access management (IAM) strategy.
Software tools may be deployed on premises, in the cloud or both. They may focus
primarily on a company's internal access management or outwardly on access
management for customers.
Types of access management software tools include the following:
reporting and monitoring applications
password management tools
provisioning tools
AUTONOMIC SECURITY
Autonomic security in cloud computing is about creating self-managing security systems that can
automatically detect, respond to, and mitigate security threats without the need for human intervention.
Here's a breakdown of its key aspects:
1. *Automation:* Autonomic security relies heavily on automation to continuously monitor the cloud
environment for any signs of security breaches or anomalies. Automated systems can analyze vast
amounts of data in real-time and respond swiftly to potential threats.
2. *Self-Healing:* One of the primary goals of autonomic security is to enable systems to self-heal in the
event of a security incident. This means that the system can automatically isolate compromised
components, apply patches or updates, and restore normal operation without manual intervention.
86
3. *Adaptation:* Autonomic security systems adapt to changing threats and environments. They can
dynamically adjust security policies, configurations, and access controls based on the current risk
posture and threat landscape.
4. *Intelligence:* Machine learning and AI technologies play a crucial role in autonomic security
by providing intelligent threat detection and response capabilities. These systems can learn from past
incidents and patterns to improve their effectiveness over time.
5. *Resilience:* Autonomic security aims to enhance the overall resilience of cloud systems by
proactively identifying and mitigating vulnerabilities before they can be exploited by attackers.
This proactive approach helps prevent downtime and data breaches.
6. *Scalability:* Cloud environments are highly dynamic and scalable, and autonomic security
solutions are designed to scale along with them. Whether the infrastructure grows or shrinks, autonomic
security systems can adapt to meet the changing demands of the environment.
Overall, autonomic security in cloud computing represents a shift towards more self-sufficient and
adaptive security mechanisms that can keep pace with the evolving threat landscape and the complexities
of modern cloud infrastructures.
87
ONE MARKS:
1. Which of the following describes a message-passing taxonomy for a component-based
architecture that provides services to clients upon demand?
a) SOA
b) EBS
c) GEC
d) All of the mentioned
Answer: a
2. Point out the correct statement.
a) Service Oriented Architecture (SOA) describes a standard method for requesting services
from distributed components and managing the results
b) SOA provides the translation and management layer in an architecture that removes the
barrier for a client obtaining desired services
c) With SOA, clients and components can be written in different languages and can use
multiple messaging protocols
d) All of the mentioned
Answer: d
3. Which of the following is a repeatable task within a business process?
a) service
b) bus
c) methods
d) all of the mentioned
Answer: a
4. Which of the following module of SOA is shown in the following figure?
a) Description
b) Messaging
c) Business Process
d) QOS
Answer: d
5. Point out the wrong statement.
a) SOA provides the standards that transport the messages and makes the infrastructure
to support it possible
b) SOA provides access to reusable Web services over an SMTP network
c) SOA offers access to ready-made, modular, highly optimized, and widely shareable
components that can minimize developer and infrastructure costs
d) None of the mentioned
Answer: b
6. Which of the following is used to define the service component that performs the service?
a) WSDL
b) SCDL
c) XML
d) None of the mentioned
Answer: B
88
7. Which of the following is commonly used to describe the service interface, how to
bind information, and the nature of the component’s service or endpoint?
a) WSDL
b) SCDL
c) XML
d) None of the mentioned
Answer: a
8. Which of the following provides commands for defining logic using conditional statements?
a) XML
b) WS-BPEL
c) JSON
d) None of the mentioned
Answer: b
9. Which of the following is used as middleware layer in the following figure?
a) XML
b) ESB
c) UDDI
d) None of the mentioned
Answer: b
10. Which of the following figure is associated with Description Module in SOA stack?
a)
b)
c)
d) None of the mentioned
Answer: d
11) Cloud computing architecture is a combination of?
a. service-oriented architecture and grid computing
b. Utility computing and event-driven architecture.
c. Service-oriented architecture and event-driven architecture.
d. Virtualization and event-driven architecture.
Answer: C
89
12) In how many parts we can broadly divide the architecture of the Cloud?
a. 4
b. 3
c. 2
d. 5
Answer: C
13) Which one of the following refers to the user's part of the Cloud Computing system?
a. back End
b. Management
c. Infrastructure
d. Front End
Answer: D
14) Which one of the following can be considered as the example of the Front-end?
a. Web Browser
b. Google Compute Engine
c. Cisco Metapod
d. Amazon Web Services
Answer: A
15) By whom is the backend commonly used?
a. Client
b. User
c. Stockholders
d. service provider
Answer: D
16) Through which, the backend and front-end are connected with each other?
a. Browser
b. Database
c. Network
d. Both A and B
Answer: C
17) How many types of services are there those are offered by the Cloud Computing to the
users?
a. 2
b. 4
c. 3
d. 5
Answer: C
90
18) The Foce.com and windows Azure are examples of which of the following?
a. IaaS
b. PaaS
c. SaaS
d. Both A and B
Answer: B
19) Which of the following is one of the backend's built-in components of cloud computing?
a. Security
b. Application
c. Storage
d. Service
Answer: A
20) Which of the following provides the Graphic User Interface (GUI) for interaction with the
cloud?
a. Client
b. Client Infrastructure
c. Application
d. Server
Answer: B
21.Which of the following service provider provides the least amount of built in security?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
Answer: c
22.Point out the correct statement.
a) Different types of cloud computing service models provide different levels of security
services
b) Adapting your on-premises systems to a cloud model requires that you determine what security
mechanisms are required and mapping those to controls that exist in your chosen cloud service
provider
c) Data should be transferred and stored in an encrypted format for security purpose
d) All of the mentioned
Answer: d
23.Which of the following services that need to be negotiated in Service Level
Agreements?
a) Logging
b) Auditing
c) Regulatory compliance
d) All of the mentioned
Answer: d
91
24.The following flowchart is intended to evaluate in any cloud.
a) risk
b) errors
c) inconsistencies
d) none of the mentioned
Answer: a
25.Point out the wrong statement.
a) You can use proxy and brokerage services to separate clients from direct access to shared
cloud storage
b) Any distributed application has a much greater attack surface than an application that is closely
held on a Local Area Network
c) Cloud computing doesn’t have vulnerabilities associated with Internet applications
d) All of the mentioned
Answer: c
26.Which of the following area of cloud computing is uniquely troublesome?
a) Auditing
b) Data integrity
c) e-Discovery for legal compliance
d) All of the mentioned
Answer: d
27.Which of the following is the operational domain of CSA?
a) Scalability
b) Portability and interoperability
c) Flexibility
d) None of the mentioned
Answer: b
28.Which of the following is considered an essential element in cloud computing by CSA?
a) Multi-tenancy
b) Identity and access management
c) Virtualization
d) All of the mentioned
Answer: a
29.Which of the following is used for Web performance management and load testing?
a) VMware Hyperic
b) Webmetrics
c) Univa UD
d) Tapinsystems
Answer: b
30.Which of the following is application and infrastructure management software for hybrid multi-
clouds?
a) VMware Hyperic
b) Webmetrics
c) Univa UD
d) Tapinsystems
Answer: c
92
5 – MARK
1. Write short notes on Architectural Considerations
2. Explain General Issues of Security architecture.
3. Give a note on Micro
architectures 10 - MARK
93