0% found this document useful (0 votes)
92 views

QB PDF

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views

QB PDF

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

CS6703 GRID AND CLOUD COMPUTING

QUESTION BANK

UNIT I :
PART A
INTRODUCTION

1. State High Performance Computing (HPC)?


HPC: use of parallel processing to execute large programs quickly; often equated
to supercomputers, typically applied to systems generating teraflops (1012) or more. Emphasis:
raw speed performance and accuracy
2. State High Throughput Computing (HTC)?
HTC: running a job that takes days to complete, or an application that must produce a
high number of completed operations per unit of time. Performance measured in flops per month
or year, as opposed to per second.eg high-flux computing is in Internet searches and web
services, Emphasis: batch processing speed, cost, energy savings, security, and reliability.
3. Define Moore’s law?
Moore’s law indicates that processor speed doubles every 18 months.

4. What are computational grids?


A computational grid is hardware and software infrastructure that provides dependable,
consistent, pervasive and inexpensive access to high-end computational capabilities.

5. What is meant by grid infrastructure?


Grid infrastructure is a complex combination of a number of capabilities and resources
identified for the specific problem and environment being addressed. It forms the core
foundations for successful grid applications.

6. What are the derivatives of grid computing?


There are 8 derivatives of grid computing. They are as follows:
a) Compute grid
b) Data grid
c) Science grid
d) Access grid
e) Knowledge grid
f) Cluster grid
g) Terra grid
h) Commodity grid

7. What are the grid computing applications?


Application partitioning that involves breaking the problem into discrete pieces.
Discovery and scheduling of tasks and workflow. Data communications distributing the problem
data where and when it is required.
8. Define Cluster computing:
Cluster is local to the domain and constructed to solve inadequate computing power. It is
related to the pooling of computational resources to provide more computing power by parallel
execution of the workload.

9. Define SOA.
Service oriented architecture is intended to define loosely coupled and interoperable
services applications, and to define process for integrating these interoperable components. In
SOA, the system is decomposed into a collection of network-connected components.
Applications and resources within a SOA shouldn’t be built as a tightly coupled monolithic
model. Rather; these applications are composed dynamically from the deployed and available
services in the network.

10. What are the business areas needs in Grid computing?


· Life Sciences
· Financial services
· Higher Education
· Engineering Services
· Government
· Collaborative games

11. Write the any three Grid Applications.


• Schedulers
• Resource Broker
• Load Balancing

12. What are the two most important technologies for building semantic webs?
XML
Resource Description Framework(RDF)

13. What is meant by Virtual Machines?


Virtual machines (VMs) offer novel solutions to underutilized resources, application
inflexibility, and software manageability, and security concerns in existing physical machines.

14. What are the business benefits in Grid Computing?


· Acceleration of implementation time frames in order to intersect with the anticipated business
end results.
· Improved productivity and collaboration of virtual organizations and respective computing
and data resources.
· Allowing widely dispersed departments and business to create virtual organizations to share
data and resources.

15. What are the areas are difficult to implement in Grid Computing Infrastructure?
A Grid computing infrastructure component must address several potentially complicated
areas in many stages of the implementation. These areas are
· Security
· Resource management
· Information services
· Data management

16. Give the different layers of grid architecture.


· Fabric Layer: Interface to local resources
· Connectivity Layer: Manages Communications
· Collective Layer: Coordinating Multiple Resources
· Application Layer: User-Defined Application.

17.What do you mean by Grid Services?


Grid services are stateful Web services. The service itself maintains some state
information and it exposes a set of standard interfaces to enable interactions with its client.

18. Define Hype Cycle


This cycle shows the expectations for the technology at five different
stages. The expectations rise sharply from the trigger period to a high peak of inflated
expectations.Through a short period of disillusionment, the expectation may drop to a valley and
then increase steadily over a long enlightenment period to a plateau of productivity. The number
of years for an emerging technology to reach a certain stage is marked by special symbols.

19. Difference between CPU and GPU ?


A Graphics Processing Unit (GPU) is a special purpose processor, optimized or
calculations commonly (and repeatedly) required for Computer Graphics, particularly SIMD
operations.
A Central Processing Unit (CPU) is a general purpose processor - it can in principle do
any computation, but not necessarily in an optimal fashion for any given computation. One can
do graphics processing on a CPU - but it likely will not produce the result anywhere nearly as
fast as a properly programmed GPU.

20.what is meant by NAS and SAN ?

A storage area network (SAN) connects servers to network storage such as disk arrays.
Network attached storage (NAS) connects client hosts directly to the disk arrays.
PART B

1. Identify and explain in detail about evolutionary trend of computer technology. (6)
2. Explain the three paradigms in detail.(7)
3. Summarize in detail about the degrees of parallelism.
4. Discuss the application of high performance and high throughput system.
5. Demonstrate in detail about internet of things and cyber physical systems.
6. Examine the memory ,storage and wide area networking technology in network based
system.
7. Define and examine in detail about the multi core CPUs and multithreading technologies.
(13)
8. Analyze in detail about the GPU programming model.(13)
9. Explain the architecture of virtual machine and brief about the operations.
10. Generalize the ideas of i) cluster of cooperative computers. ii) service oriented
architecture.
11. Describe in detail the Peer to peer network families.
12. Express in detail about cloud computing architecture over the internet?
13. Explain the layered architecture of SOA for web services.
14. Compare the features of grid versus cloud.
15. Demonstrate in detail about trends towards distributed systems.
16. Illustrate in detail about parallel and distributed programming models.

UNIT II
PART A

1. What are the major goals of OGSA?


 Identify the use cases that can drive the OGSA platform components.
 Identify and define the core OGSA platform components.
 Define hosting and platform specific bindings.
 Define resource models and resource profiles with interoperable solutions.

2. What are the more specific goals of OGSA?


 Facilitating distributed resource management across heterogeneous platforms
 Providing seamless quantity of service delivery.
 Providing common infrastructure building blocks to avoid “Stove pipe solutions towers”.
 Open and published interfaces and messages.

3. What are the main purposes of use case defined by OGSA?


 To identify and define core OGSA platform functionalities.
 To define core platform components based on the functionality requirements.
 To define the high level requirements on those core components and identify their
interrelationship.

4. List out the categories of OGSA services?


 Infrastructure Services
 Execution Management Services
 Data Management Services
 Resource Management Services
 Security Services
 Information Services
 Self-Management Services
5.what are the benefits of OGSI standard ?
 Increased effective computing capacity.
 Interoperability of resources.
 Speed of application development.

6.What are The objectives of OGSA ?


 Manage resources across distributed heterogeneous platforms.
 Support QoS-oriented Service Level Agreements (SLAs).
 It is critical that the grid provide robust services such as authorization, access control, and
delegation.
 Provide a common base for autonomic management.
 Define open, published interfaces and protocols for the interoperability of diverse
resources. OGSA is an open standard managed by a standards body.

7. what are two fundamental requirements for describing Web services based on the
OGSI?
The ability to describe interface inheritance—a basic concept with most of the distributed
object systems.The ability to describe additional information elements with the interface
definitions.

8.what is a Grid Service Instance


A grid service instance is a (potentially transient) service that conforms to a set of
conventions, expressed as WSDL interfaces, extensions, and behaviors, for such purposes as
lifetime management, discovery of characteristics,and notification.

9.what is grid service description?


A grid service description describes how a client interacts with service instances.This
description is independent of any particular instance. Within a WSDL document, the grid service
description is embodied in the most derived portType of the
instance, along with its associated portTypes,bindings, messages, and types definitions.

10.name the few use cases of OGSA?


 National fusion collaboration
 IT infrastructure and management
 Commercial data centers
 Service-based distributed query processing
 Severe storm prediction
 Online media and entertainment

11. what are the Basic Functionality Requirements of OGSA/Grids?


 Discovery and brokering.
 Metering and accounting.
 Data sharing.
 Deployment
 Virtual organizations (VOs).
 Monitoring.
 Policy.

12.what are the Grids security requirements ?


 Multiple security infrastructures.
 Perimeter security solutions
 Authentication, Authorization, and Accounting.
 Encryption.
 Application and Network-Level Firewalls..
 Certification.

13.name the few Resource Management Requirements?


 Provisioning.
 Resource virtualization.
 Transport management
 Access
 Management and monitoring
 Load balancing

14.what are the System Properties Requirements?


 Fault tolerance
 Disaster recovery.
 Strong monitoring
 Legacy application management.

15. what are the Four Grid Families Identified in the Great Global Grid (GGG)?
 Computational Grids or Data Grids
 Information Grids or Knowledge Grids
 Business Grids
 P2P/Volunteer Grids

16.mention the few Grid Data Access Models?


 Monadic model.
 Hierarchical model.
 Federation model.
 Hybrid model.

17. Name some representational use cases from OGSA architecture working group?
 Commercial Data Center (Commercial grid)
 National Fusion Collaboratory (Science grid)
 Online Media and Entertainment (Commercial grid)

18. What are the layers available in OGSA architectural organizations?


 Native platform services and transport mechanisms.
 OGSA hosting environment.
 OGSA transport and security.
 OGSA infrastructure (OGSI).
 OGSA basic services (meta-OS and domain services)

19. What are the OGSA basic services?


 Common Management Model (CMM)
 Service domains
 Distributed data access and replication.
 Policy, security
 Provisioning and resource management.

20.what is meant by CPU scavenging.


The concept of creating a “grid” from the unused resources in a network of computers is known
as CPU scavenging.

PART B

1. With a neat sketch, discuss the OGSA framework.


2. Write a detailed note on OGSA security models.
3. Explain the data intensive grid service models with suitable diagrams.
4. Analyze the set of services for the building blocks of OGSA based grid.
5. Explain the services provided by OGSA architecture.
6. Describe in detail about the practical view of OGSA and OGSI
7. Examine the client side programming patterns for grid services.
8. Demonstrate in detail about the conceptual hosting environment for grid service.
9. Discriminate how the Client Uses the Grid Service Handles and References.
10. Evaluate the relationship of grid service to Distributed Object Systems.
11. Explain how migration of grid services is handled.
12. Describe in detail about the various OGSA services.

UNIT III :
PART A

1. What is public cloud?


A public cloud is built over the Internet and can be accessed by any user who has
paid for the service. Public clouds are owned by service providers and are accessible through a
subscription. Many public clouds are available, including Google App Engine (GAE),Amazon
Web Services (AWS), Microsoft Azure, IBM Blue Cloud, and Salesforce.com’s Force.com.

2. What is private cloud?


A private cloud is built within the domain of an intranet owned by a single
organization.Therefore, it is client owned and managed, and its access is limited to the owning
clients and their partners.

3. Define cloud provider and cloud broker?


Cloud Provider: Is a company that offers some component of cloud computing typically
infrastructure as a service, software as a Service or Platform as a Service. It is something referred
as CSP.
Cloud Broker: It is a third party individual or business that act as an intermediary between the
purchase of cloud computing service and sellers of that service.

4. highlights six design objectives for cloud computing


· Shifting computing from desktops to data centers
· Service provisioning and cloud economics
· Scalability in performance
· Data privacy protection
· High quality of cloud services
· New standards and interfaces

5. What are the essential characteristics of cloud computing?


On-demand self services, Broad network access, Resource pooling, Rapid
elasticity, Measured service.

6. What are the advantages of cloud computing?


Cost efficient, almost unlimited storage, backup and recovery, automatic software
integration, easy access to information, quick development.

7. What are the disadvantages of cloud computing?


Technical issues, security in the cloud, prone to attack.

8. What is meant by virtualization ?


Virtualization is a computer architecture technology by which multiple virtual
machines (VMs) are multiplexed in the same hardware machine. The purpose of a VM is to
enhance resource sharing by many users and improve computer performance in terms of resource
utilization and application flexibility.

9. What are the levels of virtualization ?


· Hardware Virtualization
· Virtual Machine
· Storage Virtualization
· Desktop Virtualization
· Network Virtualization

10. What are the classes of VM architecture


the hypervisor architecture are para-virtualization, and host-based
virtualization.The hypervisor is also known as the VMM (Virtual Machine Monitor).

11. What is meant by XEN hypervisor


Xen is an open source hypervisor program developed by CambridgeUniversity.
Xen is a micro-kernel hypervisor, which separates the policy from the mechanism. The Xen
hypervisor implements all the mechanisms, leaving the policy to be handled by Domain 0.

12. What is meant by Full Hypervisor ?


noncritical instructions run on the hardware directly while critical instructions are
discovered and replaced with traps into the VMM to be emulated by software. Both the
hypervisor and VMM approaches are considered full virtualization.

13. What is meant by Para-virtualization ?


Para-virtualization needs to modify the guest operating systems. A para-
virtualized VM provides special APIs requiring substantial OS modifications in user
applications.Performance degradation is a critical issue of a virtualized system.

14. What are the categories of instructions?


privileged instructions, control-sensitive instructions, and behavior-sensitive
instructions.

15. What are the properties of Cloud Computing?


There are six key properties of cloud computing:
Cloud computing is
• user-centric
• task-centric
• powerful
• accessible
• intelligent
• programmable

16. Differentiate Physical versus Virtual Clusters ?


Virtual clusters are built with VMs installed at distributed servers from one or
more physical clusters. The VMs in a virtual cluster are interconnected logically by a virtual
network across several physical networks. Each virtual cluster is formed with physical machines
or a VM hosted by multiple physical clusters.

17. What are are four steps to deploy a group of VMs onto a target cluster?
Preparing the disk image, configuring the VMs, choosing the destination nodes,
and executing the VM deployment command on every host.

18. State the states of VM ?


· An inactive state is defined by the virtualization platform, under which the VM is not
enabled.
· An active state refers to a VM that has been instantiated at the virtualization platform
to perform a real task.
· A paused state corresponds to a VM that has been instantiated but disabled to process
a task or paused in a waiting state.
· A VM enters the suspended state if its machine file and virtual resources are stored
back to the disk.

19. What are the side effects of server virtualization ?


• Consolidation enhances hardware utilization
• This approach enables more agile provisioning and deployment of resources.
• The total cost of ownership is reduced.
• This approach improves availability and business continuity.
· It becomes easier to transfer a VM from one server to another, because virtual
servers are unaware of the underlying hardware.

20. What are the advantages of “Software As A Service” (SaaS)?


The advantages of “Software As a Service” are as under-
Time-to-value: Saas based application performance management can be deployed in a
small fraction of time i.e. the time until you read this article.
Cheap cost-Licenses, Maintenance, Administration, Hardware.
Its easy to use.
Its highly scalable.

UNIT III

PART B

1. List the cloud deployment models and give a detailed note about them.
2. Analyze the uses of i) Infrastructure as a service. ii) Platform as a service. iii)
Software as a service.
3. Describe service and deployment models of a cloud computing environment with
illustrations. How do they fit in NIST cloud architecture?
4. List the advantages and disadvantages of OS extension in virtualization.
5. Identify the support of virtualization Linux platform.
6. Summarize the support of middleware and library for virtualization
7. Describe the vCUDA architecture for virtualization of general purpose GPUs.
8. Give the importance of cloud computing and elaborate the different types of
services offered by it.
9. Illustrate in detail about the compiler support for para virtualization architecture.
10. Examine in detail about hardware support for virtualization and CPU
virtualization.
11. Point out the importance of memory virtualization.
12. Explain in detail about the need of IO virtualization.
13. What is virtualisation ? Describe para and full virtualisation architectures.
Compare and contrast them.
14. Differentiate physical clusters versus virtual clusters.
15. Discuss fast deployment, effective scheduling and high performance virtual
storage in detail.
16. Illustrate the migration steps and performance effects involved in live VM.
17. Explain the migration of memory ,files and network resources in detail.

UNIT IV
PART A

1. What is The Globus Toolkit Architecture (GT4)


The Globus Toolkit, started in 1995 with funding from DARPA, is an open
middleware library for the grid computing communities. The toolkit addresses common
problems and issues related to grid resource discovery,management, communication, security,
fault detection, and portability. The library includes a rich set of service implementations.

2. What is GT4 library?


The high-level services and tools, such as MPI, Condor-G, and Nirod/G, are
developed by third parties for generalpurpose distributed computing applications. The local
services, such as LSF, TCP, Linux, and Condor, are at the bottom level and are fundamental
tools supplied by other developers.

3. What is meant by Globus Container ?


The Globus Container provides a basic runtime environment for hosting the web
services needed to execute grid jobs.

4. What are the Functional Modules in Globus GT4 Library ?


Global Resource Allocation Manager
Communication
Grid Security Infrastructure
Monitory and Discovery Service
Health and Status
Global Access of Secondary Storage
Grid File Transfer

5. What is meant by input splitting ?


For the framework to be able to distribute pieces of the job to multiple machines,
it needs to fragment the input into individual pieces, which can in turn be provided as input to the
individual distributed tasks. Each fragment of input is called an input split.

6. What are the five categories of Globus Toolkit 4 ?


• Common runtime components
• Security
• Data management
• Information services
• Execution management

7. What are the are the available input formats?


• KeyValueTextInputFormat
• TextInputFormant
• NLineInputFormat
• MultiFileInputFormat
• SequenceFIleInputFormat

8. What is meant by HDFS ?


Hadoop comes with a distributed filesystem called HDFS, which stands for Hadoop
Distributed Filesystem. HDFS is a filesystem designed for storing very large files with streaming
data access patterns, running on clusters of commodity hardware.

9. What is meant by Block


A disk has a block size, which is the minimum amount of data that it can read or
write.Filesystems for a single disk build on this by dealing with data in blocks, which are an
integral multiple of the disk block size. Filesystem blocks are typically a few kilobytes
in size, while disk blocks are normally 512 bytes. HDFS, too, has the concept of a block, but it is
a much larger unit—64 MB by default.

10. Differentiate Namenodes and Datanodes


An HDFS cluster has two types of node operating in a master-worker pattern:
a namenode (the master) and a number of datanodes (workers). The namenode manages the
filesystem namespace. It maintains the filesystem tree and the metadata for all the files and
directories in the tree. This information is stored persistently on the local disk in the form of two
files: the namespace image and the edit log. The namenode also knows the datanodes on which
all the blocks for a given file are located.

11. List the various Hadoop filesystems ?


Local,HDFS, HFTP, HSFTP, WebHDFS.

12. What is meant by FUSE?


Filesystem in Userspace (FUSE) allows filesystems that are implemented in user
space to be integrated as a Unix filesystem. Hadoop’s Fuse-DFS contrib module allows any
Hadoop filesystem (but typically HDFS) to be mounted as a standard filesystem.

13. What is Hadoop File system ?


Hadoop is written in Java, and all Hadoop filesystem interactions are mediated
through the Java API. The filesystem shell, for example, is a Java application that uses the Java
FileSystem class to provide filesystem operations.

14. How to Reading Data from a Hadoop URL


One of the simplest ways to read a file from a Hadoop filesystem is by using a
java.net.URL object to open a stream to read the data from. The general idiom is:
InputStream in = null;
try {
in = new URL("hdfs://host/path").openStream();
// process in} finally {
IOUtils.closeStream(in);
}

15. How to write data in Hadoop?


The FileSystem class has a number of methods for creating a file. The simplest is
the method that takes a Path object for the file to be created and returns an output stream to write
to:
public FSDataOutputStream create(Path f) throws IOException

16. How are Deleting Datas are Deleted in Hadoop ?


Use the delete() method on FileSystem to permanently remove files or directories:
public boolean delete(Path f, boolean recursive) throws IOException.If f is a file or an empty
directory, then the value of recursive is ignored.

18. What are two types of nodes that control the job execution process?
A jobtracker and a number of tasktrackers controls the job execution process. The
jobtracker coordinates all the jobs run on the system by scheduling tasks to run on tasktrackers.
Tasktrackers run tasks and send progress reports to the jobtracker, which keeps a record of the
overall progress of each job. If a task fails, the jobtracker can reschedule it on a different
tasktracker.

UNIT IV

PART B

1. Describe the relative strength and limitation of open source grid middleware
packages.
2. List the features in condor kernel and condor G for grid computing.
3. Describe sun grid engine middleware package in detail.
4. Summarize the grid standards and APIs.
5. Discuss on grid software support and middleware package.
6. Draw and explain the Globus tool kit architecture.
7. Explain the concepts involved in resource management using GRAM.
8. Classify the GT4 tools used by data management.
9. Evaluate the interaction in the functional module client globus job work flow.
10. Summarize the functional components in CGSP library.
11. Generalize the functional components of china grid support platform library.
12. Design the functional building blocks in the CGSP library that represents the job
executional flow.
13. Creating 8 What is GT4 ? Describe in detail the components of GT4 with a
suitable diagram.
14. Discuss Mapreduce with suitable diagrams.
15. Classify the various ways in input splitting of map reduce.
16. Show how will you prevent input splitting in map reduce.
17. Illustrate dataflow in HDFS during file read/write operation with suitable
diagrams.
18. Examine the basic file system operation in hadoop.
19. Tabulate the hadoop file system in detail.
20. Discuss in detail about the command line interface in java.
21. Give a detailed note on Hadoop framework.
UNIT V
PART A

1. What are the challenges to establish the trust among grid sites ?
The first challenge is integration with existing systems and technologies.
The second challenge is interoperability with different “hosting environments.”
The third challenge is to construct trust relationships among interacting hosting
environments.

2. What are the various trust models ?


A Generalized Trust Model
Reputation-Based Trust Model
A Fuzzy-Trust Model

3. What are the various authorities categories?


attribute authorities, policy authorities, and identity authorities.

4. What are the various authentication methods in Grid?


The major authentication methods in the grid include passwords, PKI, and
Kerberos. The password is the simplest method to identify users, but the most vulnerable one to
use.The PKI is the most popular method supported by GSI. To implement PKI, we use a trusted
third party, called the certificate authority (CA).

5. What are the Three Authorization Models


• The subject-push model
• The resource-pulling model
• The authorization agent model
7. What does the GSI authentication certificate include.
(1) a subject name, which identifies the person or object that the certificate represents;
(2) the public key belonging to the subject;
(3) the identity of a CA that has signed the certificate to certify that the public key and the
identity both belong to the subject;
(4) the digital signature of the named CA. X.509 provides each entity with a unique
identifier.

8. What are the necessary security features of Cloud?


Dynamic web services with full support from secure web technologies
• Established trust between users and providers through SLAs and reputation systems
• Effective user identity management and data-access management
• Single sign-on and single sign-off to reduce security enforcement overhead
• Auditing and copyright compliance through proactive enforcement
• Shifting of control of data operations from the client environment to cloud providers .
• Protection of sensitive and regulated information in a shared environment.

9. Name a few cloud component that needs security?


• Protection of servers from malicious software attacks such as worms, viruses, and
malware.
• Protection of hypervisors or VM monitors from software-based attacks and
Vulnerabilities.
• Protection of VMs and monitors from service disruption and DoS attacks
• Protection of data and information from theft, corruption, and natural disasters
• Providing authenticated and authorized access to critical data and services.

10. Differentiate Active and Passive attacks


passive attacks steal sensitive data or passwords.
Active attacks manipulate kernel data structures which will cause major damage to cloud
servers.

11. What is cloud security ?


Cloud security is attributed to user confidentiality, data integrity, access control,
firewalls, IDSes, defense capability against viruses or worm attacks, reputation
systems,copyright protection, data lock-in, APIs, data-center security policies, trust
negotiation,and security auditing services.

12. What are the risks of storing data in the Cloud?


• Reliability
• Security
• User error
• Access problems

13. What are the Security Issues in the Cloud


In theory, minimizing any of the issues would help:
a. Loss of Control
b. Lack of trust
c. Multi-tenancy

14. What are Physical and Cyber Security Protection at Cloud/Data Centers ?
Secure data centers and computer buildings
Use redundant utilities at multiple sites
Trust delegation and negotiation
Worm containment and DDoS defense
Reputation system for data centers
Fine-grained file access control
Copyright protection and piracy prevention
Privacy protection

15. what are the security Challenges in VMs


Buffer overflows, DoS attacks, spyware, malware, rootkits, Trojan horses, and
worms. In a cloud environment, newer attacks may result from hypervisor malware, guest
hopping and hijacking, or VM rootkits, the man-in-the-middle attack for VM migrations.

16. what are the Aspects of Data Security ?


Security for
 Data in transit
 Data at rest
 Processing of data including multitenancy
 Data Lineage
 Data Provenance
 Data remnance

17. State Security at the Network Level.


Ensuring data confidentiality and integrity of the organizations data in transit to
and from the public cloud provider
Ensuring proper access control (Authentication, Authorization, Auditing) to resources in
the public cloud
Ensuring availability of the Internet facing resources of the public cloud used by the
organization
Replacing the established network zones and tiers with domains

18. State Security at the Host Level.


Host security at PaaS and SaaS Level
1. Both the PaaS and SaaS hide the host operating system from end users
2. Host security responsibilities in SaaS and PaaS are transferred to CSP
Host security at IaaS Level
3. Virtualization software security
i. Hypervisor security
ii. Threats: Blue Pill attack on the hypervisor
4. Customer guest OS or virtual server security
i. Attacks to the guest OS: e.g., stealing keys used to access and manage the
hosts

19. State Security at the Application Level.


Application security at the SaaS level
1. SaaS Providers are responsible for providing application security
Application security at the PaaS level
2. Security of the PaaS Platform
3. Security of the customer applications deployed on a PaaS platform
Application security at the IaaS Level
4. Customer applications treated a black box
5. IaaS is not responsible for application level security

20. How are the Reputation Systems are classified ?


the reputation systems are classified as centralized or distributed depending on how they
are implemented.
In a centralized system, a single central authority is responsible for managing the
reputation system, while the distributed model involves multiple control centers working
collectively.
Reputation-based trust management and techniques for securing P2P and social networks
could be merged to defend data centers and cloud platforms against attacks from the open
network.

PART B

1. Examine in detail about trust model for grid security enforcement.


2. Define Authentication and Summarize on three authorization models of GSI.
3. Discuss on the trust delegation operations using proxy credentials in GSI.
4. Explain grid security infrastructure.
5. Demonstrate the infrastructure security: Network level in cloud.
6. Classify the Key privacy issues in the cloud.
7. Analyze the infrastructure security of cloud at host level.
8. Explain in detail about virtual server security of cloud.
9. What is the purpose of IAM ? Describe its functional architecture with an
illustration.
10. Compose in detail about the aspects of data security.
11. Generalize on data security mitigation.
12. Evaluate the concepts involved in provider data and its security.
13. Express in detail about the need of IAM. ii) Give the challenges in IAM.
14. Summarize on the basic concepts and definitions of IAM.
15. Evaluate and explain the practices of IAM Architecture.
16. Describe in detail about the IAM Standards and Protocols for Cloud Services.

You might also like