NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1. 1. Explain any six benefits of Software as Service in Cloud computing?

Similar documents
Network Security. HIT Shimrit Tzur-David

Cyber Security Workshop Encryption Reference Manual

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Chapter 8. Network Security

CSCE 465 Computer & Network Security

SECURITY IN NETWORKS

Chapter 7: Network security

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Chapter 10. Network Security

Chapter 6 CDMA/802.11i

CRYPTOGRAPHY IN NETWORK SECURITY

IT Networks & Security CERT Luncheon Series: Cryptography

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Lecture 9: Application of Cryptography

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS Computer Security Third topic: Crypto Support Sys

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection

Application Layer (1)

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Network Security. Omer Rana

Savitribai Phule Pune University

What is network security?

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Waspmote Encryption Libraries. Programming guide

The Misuse of RC4 in Microsoft Word and Excel

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

A CLOUD SECURITY APPROACH FOR DATA AT REST USING FPE

Solutions to Problem Set 1

Cipher Techniques on Networks. Amit Konar Math and CS, UMSL

CS 758: Cryptography / Network Security

How To Understand And Understand The History Of Cryptography

Computer and Network Security. Alberto Marchetti Spaccamela

7! Cryptographic Techniques! A Brief Introduction

Network Security Technology Network Management

Chapter 8 Network Security

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890

Applying Cryptography as a Service to Mobile Applications

Computer Security: Principles and Practice

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Computer System Management: Hosting Servers, Miscellaneous

Introduction to Cryptography

Associate Prof. Dr. Victor Onomza Waziri

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Properties of Secure Network Communication

NETWORK ADMINISTRATION AND SECURITY

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

CSCE 465 Computer & Network Security

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Cryptography & Network Security

Introduction to Encryption

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Software Tool for Implementing RSA Algorithm

Secure Sockets Layer

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

The New Approach of Quantum Cryptography in Network Security

encoding compression encryption

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

CS155. Cryptography Overview

Principles of Network Security

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

BMC s Security Strategy for ITSM in the SaaS Environment

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Lecture 9 - Network Security TDTS (ht1)

Symmetric and Public-key Crypto Due April , 11:59PM

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

An Efficient data storage security algorithm using RSA Algorithm

Network Security - ISA 656 Introduction to Cryptography

Lab 7. Answer. Figure 1

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

(C) Global Journal of Engineering Science and Research Management

VALLIAMMAI ENGINEERING COLLEGE

Message Authentication Codes

The application of prime numbers to RSA encryption

Overview of Public-Key Cryptography

Chapter 7 Transport-Level Security

Page 1. Session Overview: Cryptography

Symmetric Key cryptosystem

Security Protocols/Standards

Shor s algorithm and secret sharing

Application Layer (1)

Transcription:

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1 1. Explain any six benefits of Software as Service in Cloud computing? 2. List the different cloud applications available in the market? Briefly explain the scenarios/situations of when to not use clouds. 3 a) Explain the tasks performed by Google applications engine? b) Write a short note on IBM offerings towards Cloud computing? 4.Explain the different operational and economical benefits of using clouds? 5 a) Describe any six design principles of Amazon S3 Cloud computing model? b) What is REST in Web services? List the different benefits of REST. 6 a) What is SaaS in Cloud computing? Explain different categories of SaaS? b) List the prevalent companies and their offerings towards software plus services via Cloud computing? 7. What is the need of virtualization? Define Server virtualization, Application virtualization, Presentation Virtualization. 8. Discuss the various migration issues of the organization towards Clouds? CLOUD COMPUTING ASSIGNMENT-II 1. Explain Cloud computing and Cloud computing delivery models and

services 2. Explain, Cloud storage diversity and vendor lock-in. 3. Give a review on Service level agreements, User experience and software licensing. 4. What are the Challenges of cloud computing?explain Architectural styles of cloud computing. 5. Write a note on Virtualization,. 6. Explain Hardware support for virtualization with example. 7. Explain Optimization of network virtualization 8. What are the strategies of The dark side of virtualization 9. Write a note on Policies and mechanisms for resource management,. 10.Write the methods of Resource management and dynamic scaling. NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE INFORMATION &NETWORKS SECURITY ASSIGNMENT-I 1. Write about any two classical crypto systems

2. Convert the text New Horizon College of Engineering using Playfair cipher. 3. Explain DES in detail 4. Explain RSA with an example with p=11, q=5, e=3 and PT =9. 5. Explain SHA 6. Explain digital signaturing with ElGmal public Key Crypto system 7. Write notes on web security and SSL 8. Explain Deffie Hellman Key Exchange algorithm with one suitable example 9. Create a program that assists in a basic form of cryptography, a substitution cypher. Write a program that will accept a phrase and convert it into code by substituting letters according to a key. 10.Implement RSA algorithm 11.Suppose you are told that the one time pad encryption of the message attack at dawn is 09e1c5f70a65ac51626bc3d25f28 (the plaintext letters are encoded as 8-bit ASCII and the given ciphertext is written in hex). What would be the one time pad encryption of the message attack at dusk under the same OTP

key? 12.Suppose Alice shares a secret block cipher key, kab with Bob, and a different secret block cipher key, kac with Charlie. Describe a method for Alice to encrypt an m-block message such that it can only be decrypted with the cooperation of both Bob and Charlie. The ciphertext should only be a constant size greater than m blocks. You may assume that Bob and Charlie have a preestablished secret channel on which to communicate. Your method should work even if Alice encrypts multiple such messages using these keys. NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE ADVANCED COMPUTER NETWORKS ASSIGNMENT-1 1.What is IPv6? what are its main features. 2.For the network given below show how the distance vector routing algorithm works for the node A 1)obtain the initial distance stored at each node 2)initial routing table at node A 3)Final routing table at node A 4)final distance stored at each node 3.Expain the open shortest path first algorithm (OSPF) in detail. 4.Briefly explain about the BGP characteristics

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE SERVICE ORIENTED ARCHITECTURE ASSIGNMENT 1. Explain the evolution of SOA. 2. What are the perspectives of SOA in various industries considering various companies case studies NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE BIG DATA ANALYTICS ASSIGNMENT-1 1. What is big data.discuss in detail why big data is more important with real time examples. 2. Discuss Bigdata in terms of three dimensions. 3. Discuss the difference between old data analytic tools with modern big data analytic tools. 4. Give the benefit and advantages of Big data. 5. Explain the sources of data stream in detail. 6. Explain sampling data in a stream.