Question

In: Computer Science

Describe the following cloud computing concepts:    Connectivity issues (as a business concern) Virtualization High availability Containerization...

Describe the following cloud computing concepts:   

  • Connectivity issues (as a business concern)

  • Virtualization

  • High availability

  • Containerization

Describe the following cloud computing principles as it relates to cloud security:   

  • Malicious service agent  

  • Trusted attacker

  • Traffic eavesdropping

  • Overlapping trust boundaries

Solutions

Expert Solution

Ans: - Cloud Computing has become the most popular trend in industries as it provides on- demand availability for different resources online on the internet. We can store our data and also provide services to different clients using the cloud computing. It is now the fastest growing technology which is helping the companies and organizations to make their tasks easy.

Connectivity issues (as a business concern): - Connectivity issue can be due to network failure of any organization. Their own network system should be capable of handling the different cloud computing resources. Company may not have good network infrastructure that can cause the connectivity issue in network while using cloud services.

Company’s tools and application software not supporting the cloud-based services can also create the connectivity issue that can cause decrease in the growth of a company.

Cloud monitoring can be used to solve the connectivity issues in the network.

Virtualization: - Virtualization is the concept of creating the virtual devices and resources that can be shared among the multiple users. Creating a virtual operating system, server and storage devices etc. VM Ware and Virtual box are the real-life example of virtualization in which we can access windows, Linux, MacOS and other operating systems virtually on a single device.

High Availability: - High availability is the quality feature of the cloud computing which allows the users the access different components of the cloud services even some components get failed to respond. Cloud services should provide high uptime for their services even if the load on the server is difficult to handle. The high availability cloud services ensure more than 99% of uptime for their resources.

Containerization: - Containerization is a very powerful concept in cloud computing. In this method, the different software applications are delivered into small bundles that includes code with all of its packages and dependencies. So that numerous applications can be easily used with small storage and resources needed.

Docker is the example of the Containerization in cloud computing.

Malicious Service Agent: - It a threat for the cloud computing because it can disguise the traffic of the network in the cloud. Malicious service agents can get unauthorized access to the data which is being transmitted in the cloud and then corrupt that data or information. This agent may exist in the network as a service agent for the cloud services but it can maliciously corrupt the data with some code or logic.

Trusted attacker: - Trusted attacker pretend to be a trusted cloud consumer of cloud services and tries to share the cloud resources in that environment. They try to get access to the cloud credentials legally by becoming a trusted consumer. They can perform different attack on cloud services like denial of services, email spamming, phishing and accessing login credentials to attack on the cloud system.

Traffic Eavesdropping

Traffic eavesdropping is also a threat to the cloud security. When there is the transmission of data over the cloud by the consumer to the cloud service provider then malicious service agent try to get access to that data by becoming a trusted agent who needs that data for legit and useful purposes.

This attack cannot be easily identified as there is concept of confidentiality in cloud between the consumer and cloud service provide. So, malicious agent can take advantage of it to get access over the data.

Overlapping Trust Boundaries: -

When there are shared cloud computing resources between different cloud consumer and resources are being used by these consumers then the cloud service providers have to made some kind of trust boundaries. So, these trust boundaries between consumer and the service provider have overlapping trust boundaries. But if any malicious consumer tries to get access to the confidential information from the cloud then it can be a threat to the cloud service providers and also to the customers.


Related Solutions

How would you describe virtualization? What role does virtualization play in a cloud computing platform? Under...
How would you describe virtualization? What role does virtualization play in a cloud computing platform? Under what circumstances would you recommend a cloud platform over Virtualbox?
How does virtualization relate to Cloud Computing? max 200 words.
How does virtualization relate to Cloud Computing? max 200 words.
What is cloud computing from a "* as a Service" perspective? How does virtualization work on...
What is cloud computing from a "* as a Service" perspective? How does virtualization work on say, VirtualBox? What role does virtualization play on the cloud platform? What are some differences between using a Cat6 cable and Wi-Fi for say, watching Netflix? What security implications can you think of between the two approaches? Use layers to explain. What are the advantages of IPv6 over IPv4? Why is security often considered to be a major advantage in IPv6? What is cloud...
5. Virtualization and cloud computing are rapidly expanding into the enterprise as viable solutions. Discuss the...
5. Virtualization and cloud computing are rapidly expanding into the enterprise as viable solutions. Discuss the connections between these two technologies and the security implications of a virtual network infrastructure in the cloud vs. a physical network infrastructure onsite.
•Describe abstract nature of cloud computing. •Describe evolutionary factors of computing that led to the cloud....
•Describe abstract nature of cloud computing. •Describe evolutionary factors of computing that led to the cloud. •Describe virtualization at both the desktop and the server level. •Describe and identify common cloud types, which include software as a service, platform as a service, and infrastructure as a service. •Describe the benefits and disadvantages of cloud computing.
The availability of cloud computing, accessing computing resources as needed through the internet, has made access...
The availability of cloud computing, accessing computing resources as needed through the internet, has made access to stored data more achievable in a mobile environment. Cloud computing resources provided by third-party vendors also make it much more affordable to store and manage your data. Using your textbook and/or internet searches research cloud computing. Using complete sentences include the following information in your document. What is cloud computing? Name three cloud storage resources available. What are the advantages of saving files...
Do you use virtualization and/or cloud computing at home or at work? If so, how? Which...
Do you use virtualization and/or cloud computing at home or at work? If so, how? Which applications do you use? Do you like them/hate them? Do you have any recommendations for us? If you have limited experience working with cloud computing/virtualization, do some research on different services available. Which do you think you might consider using in the future?
Describe the cloud storage levels depicted. Describe the following cloud computing principles:   SLA Monitor Hypervisor Resource...
Describe the cloud storage levels depicted. Describe the following cloud computing principles:   SLA Monitor Hypervisor Resource cluster Include a link to a company selling one of these resources.
Describe the following cloud computing principles:   Organizational boundaries (to include the trust boundary) Cloud delivery models...
Describe the following cloud computing principles:   Organizational boundaries (to include the trust boundary) Cloud delivery models (Iaas, PaaS, SaaS) Multi-tenant and resource pooling
Some authors make the assertion that there are no new security issues with cloud computing at...
Some authors make the assertion that there are no new security issues with cloud computing at a network-, host-, or application-level. They maintain that cloud computing may exacerbate existing issues, but that cloud computing does not present new security issues. Do you agree with that assertion? Explain security issues with cloud computing. Include how they differ from privacy issues. How are organizations and CSPs overcoming those issue? Use examples and references to support your answer. Provide at least one reference...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT