Documente Academic
Documente Profesional
Documente Cultură
CLOUD COMPUTING‐CSC3206
Umar Yahya
PhD CS & MSc. CNM (UBD, Brunei), BSc.TE & HDCIT (IUT, Bangladesh)
Room 9 / Motion Analysis Research Lab (MARL)
Email: umar.academics@gmail.com Phone: 0700836936
About the Course unit
Contact Hours / Assessment
o Contact Hours= 60 Hours
o Course work / Continuous Assessment=30%
o Final Examination=70%
Primary Texts/ Resources
1) Cloud computing : principles and paradigms (2011), Rajkumar Buyya, James
Broberg, Andrzej Goscinski (Eds).
2) Cloud Computing: Web‐Based Applications That Change the Way You Work and
Collaborate Online (2009) Book by Michael Miller
3) Architecting the Cloud: Design Decisions for Cloud Computing Service Models
by Michael J. Kavis
4) Cloud Computing: Theory and Practice By Dan C. Marinescu(Chapter 8 & 9)
5) Cloud Computing Concepts, Technology and Architecture (2013) Book by
Ricardo Puttini, Thomas Erl, and Zaigham Mahmood
Resource Sharing Platform: https://csc3206.wordpress.com
13/03/2019 UmarYahya2019‐IUIUKC 2
1
13/03/2019
AWSOME Day Conference 2019
1. (Free) Registration Link: https://aws.amazon.com/events/awsome‐
day/emea‐awsome‐day‐online‐2019/
2. Time: 26th/March/2019: British Summer Time‐10am to 2pm (i.e
12pm to 4pm)
3. Agenda
a) Opening Keynote
b) Module 1: AWS Cloud Concepts
c) Module 2: AWS Core Services
d) Module 3: AWS Security
e) Module 4: AWS Architecting
f) Module 5: AWS Pricing and Support
g) Closing Remarks
4. Attend the entire session and receive a certificate of attendance
emailed to you a week after the event.
13/03/2019 UmarYahya2019‐IUIUKC 3
Reading Assignment (Assignment No:2)
[Submission on 20th/March/2019 by Mid‐day]
Should be handwritten
13/03/2019 UmarYahya2019‐IUIUKC 4
2
13/03/2019
Storage Systems
Q.1:
Analyze the reasons for the introduction of storage
area networks (SANs) and their properties
13/03/2019 UmarYahya2019‐IUIUKC 5
Storage Systems …
Q.3:
Analyze the advantages of memory‐based
checkpointing.
Qn.4:
Discuss the security of distributed file systems
including those from Sun NFS, IBM AIX, and RFS.
13/03/2019 UmarYahya2019‐IUIUKC 6
3
13/03/2019
Storage Systems …
Q.5:
The designers of the Google File System (GFS) have
reexamined the traditional choices for a File
System. Discuss the four observations regarding
these choices that have guided the design of GFS.
Qn.6:
Discuss the use of locking in BigTable.
13/03/2019 UmarYahya2019‐IUIUKC 7
Cloud Security
Q.1:
(a) Identify the main security threats for the
SaaS cloud delivery model on a public cloud. (b)
Discuss the different aspects of these threats on
a public cloud vis‐à‐vis the threats posed to
similar services provided by a traditional service‐
oriented architecture running on a private
infrastructure.
13/03/2019 UmarYahya2019‐IUIUKC 8
4
13/03/2019
Cloud Security…
Q.2:
Analyze how the six attack surfaces discussed in
Section 9.1 and illustrated in Figure 9.1 apply to
the SaaS, PaaS, and IaaS cloud delivery models.
13/03/2019 UmarYahya2019‐IUIUKC 9
Cloud Security…
Q.3:
Analyze the implications of the lack of trusted
paths in commodity operating systems and give
one or more examples showing the effects of
this deficiency. Analyze the implications of the
two‐level security model of commodity
operating systems.
13/03/2019 UmarYahya2019‐IUIUKC 10
5
13/03/2019
Cloud Security…
Q.4:
Compare the benefits and the potential
problems due to virtualization on public, private,
and hybrid clouds.
13/03/2019 UmarYahya2019‐IUIUKC 11
Cloud Security…
Q.5:
Analyze Amazon’s privacy policies and design a
service‐level agreement you would sign if you
were to process confidential data using AWS.
13/03/2019 UmarYahya2019‐IUIUKC 12
6
13/03/2019
END
13/03/2019 UmarYahya2019‐IUIUKC 13