cloud_computing_qna
cloud_computing_qna
1. Explain the concept of privacy and privacy impact assessment in cloud security.
Privacy in cloud security refers to protecting user data stored, processed, or transmitted via cloud
services.
It addresses data access, control, ownership, and compliance with privacy laws like GDPR and
identifying, analyzing, and mitigating privacy risks in cloud systems. It involves understanding
The architecture of Windows Azure consists of several layers including the Fabric Controller,
Azure Resource Manager (ARM), Data Centers, and Networking. It supports IaaS, PaaS, and
Azure also provides services for computing, storage, networking, and AI capabilities.
Amazon Web Services (AWS) is a cloud platform offering Infrastructure as a Service (IaaS),
It provides over 200 services categorized into compute (EC2, Lambda), storage (S3, EBS),
databases (RDS, DynamoDB), networking (VPC, Route 53), and machine learning (SageMaker,
Rekognition).
Cloud computing enables social networks to handle large-scale data, support real-time interactions,
personalized recommendations.
Cloud providers offer auto-scaling, storage, and AI/ML services that make social networking
Cloud computing enables media companies to store, manage, and distribute large amounts of
It allows for live streaming, video-on-demand (VoD) services, content delivery via CDNs, and
Media companies benefit from cost savings, scalability, and faster global content delivery.
Cloud computing improves Customer Relationship Management (CRM) and Enterprise Resource
real-time data, and collaboration tools. Cloud CRM and ERP reduce IT costs, enable remote
access, provide data analytics, and support integration with third-party tools.
Cloud computing in healthcare supports data storage, patient record management, and predictive
analytics.
It enables the processing of large healthcare datasets for research, supports telemedicine, and
A Virtual Machine Monitor (VMM) or hypervisor manages virtual machines on a physical host.
VM-based threats include VM escape (where a malicious VM interacts with the host),
hyperjacking (taking control of the hypervisor), and inter-VM attacks (where one VM attacks
another).
Virtual machine security involves protecting the hypervisor, guest OS, and applications.
Key measures include isolating VMs, using encryption, managing patches, and implementing
access control.
A diagram would typically show a physical host, hypervisor, multiple VMs, and the associated
Cloud security risks include data breaches, insider threats, data loss, misconfigurations, and
insecure APIs.
Other risks involve account hijacking, insufficient identity management, and lack of regulatory
compliance.
11. Explain the concept of privacy and privacy impact assessment in cloud security.
Privacy in cloud security ensures data protection and compliance with privacy laws. Privacy Impact
proposes mitigation strategies, and ensures privacy compliance. It involves mapping data
12. With a neat diagram, give the architecture of Google App Engine.
Google App Engine (GAE) architecture includes Load Balancers, Front-end Servers, Application
It offers a PaaS environment where developers deploy apps that automatically scale based on
Cloud platforms offer on-demand compute power and storage, allowing researchers to process
large datasets for gene sequencing, disease prediction, and personalized medicine.
Cloud computing facilitates geoscience research by enabling the analysis of satellite images,
It supports remote sensing, environmental modeling, and disaster prediction. Cloud platforms