Google News
Cloud Computing Interview Questions
Cloud computing refers to an honest space of knowledge technology (IT) that touches on the following areas: We can begin with a basic assumption: you don’t want a degree or a computing or pc engineering degree to search out cloud computing.
The aforesaid points highlight the advantages of exploiting cloud technology and so the following discussion can define the potential cons of Cloud Computing.
Vulnerability to attacks : Storing information within the cloud might cause serious challenges {of information of knowledge} thievery since within the cloud each data of a corporation is online. Security breach are some things that even the only organizations have suffered from and it’s a potential risk inside the cloud conjointly .though advanced security measures are deployed on the cloud, still storing confidential information inside the cloud are usually a risky affair.
Network property dependency : Cloud Computing is entirely enthusiastic about the net. This direct tie-up with the net means that an organization should have reliable and consistent web service conjointly as a fast affiliation and information measure to reap the advantages
Downtime : the period of time is taken into consideration along with the foremost vital potential downsides of exploitation Cloud Computing. The cloud suppliers might typically face technical outages which might happen to owe to varied reasons, like loss of power, low web property, information centres going out of service for maintenance, etc. which could cause a brief-lived period of time inside the cloud service.
Vendor lock-in : once in need to migrate from one cloud platform to a distinct, an organization would possibly face some serious challenges thanks to the variations between seller platforms. Hosting and running the applications of this cloud platform on another platform might cause support problems, configuration complexities, and additional expenses.
The corporate information might boot be left liable to security attacks due to compromises that can are created throughout migrations.
Limited management : Cloud customers might face restricted control over their deployments. Cloud services run on remote servers that are utterly closely held and managed by service suppliers, which makes it arduous for businesses to possess the extent of management.
* Security : Actually, data is stored in the cloud, so security may be an issue for some users. However, cloud computing is not more secure than in-house deployment.
* Latency issue : Since data and applications are stored in the cloud at a variable distance from the end-user, there is a possibility that there may be greater latency when interacting with the application compared to local deployment. Therefore, the SaaS model is not suitable for applications whose demand response time is in milliseconds.
* Total Dependency on the Internet : Without an internet connection, most SaaS applications are not usable.
* Switching between SaaS vendors is difficult : Switching SaaS vendors involves the difficult and slow task of transferring the very large data files over the internet and then converting and importing them into another SaaS also.
* Shared Infrastructure.
* IaaS gives shared users to share the same physical infrastructure.
* Web Access to the resources.
* IaaS allows IT users to access resources over the internet.
* On demand as per usage model.
* Iaas providers provide services only as client’s pay as you go model.
* Business model focus.
* Iaas Providers give business core organization focus rather than IT infra.
* Update versions of Software.
* There is scalability of services provided as there is no worrisome of software upgrade and troubleshoot the issues related to IT infrastructure.
* Security
* Security is the main concern in IaaS as it is not 100percent sure.
* Maintenance and up gradation
* Although IaaS providers maintain the software but not for all.
* Interoperability issues
* It is difficult to migrate Virtual Machine form one IaaS provider to another, so customers experience problem related to vendor lock.
* Main Iaas Cloud Service providers are Amazon Web Services, Microsoft Azure, and Google Cloud Platform etc.
Vendor lock-in : Development according to the particular vendor can be easy but migration to another cloud provider can be a problem.
Data privacy : Corporate data, whether can be important or not, will always be private. It should always be an insecure environment.
Synchronization of system applications : We have integrated many applications with local and on the cloud, so there is the problem of increased complexity when mixing local data with cloud data.
Most PaaS cloud providers are Salesforce, Windows Azure, and Google App Engine etc.
IaaS layer is to blame for user authentication in cloud computing. IaaS layer is to blame for user authentication in cloud computing. IaaS could be a user based mostly system that’s to blame for authentication services like accessing, managing, and watching.
It’s the distribution of workloads across multiple computing resources. It reduces prices related to management systems and will increase the handiness of resources. It has an advantage over different load equalization in that it will transfer masses to servers globally as hostile distributing it across native servers. In the event of an area server outage, cloud equalization delivers users to the nearest regional server
Cloud storage device mechanisms provide common levels of data storage, such as :
Files : These are collections of data that are grouped into files that are located in folders.

Blocks : A block is the smallest unit of data that is individually accessible. It is the lowest level of storage and the closest to the hardware.

Datasets : Data sets organized into a table-based, delimited, or record format.

Objects : Data and the associated metadata with it are organized as web-based resources.

Each of the above data storage levels is associated with a certain type of technical interface. This interface corresponds to a particular type of cloud storage device and the cloud storage service used to expose its API.