Cloud Computing - Assignment 2 - Greenwich FPT
Cloud Computing - Assignment 2 - Greenwich FPT
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand
that making a false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 D2
❒ Summative Feedback: ❒ Resubmission Feedback:
Below are the steps to implement and use AWS that I apply in this project. Follow my steps below:
At the XShell virtual machine, execute the following commands to update your entire database file. Once connected
you can use the root account or create a new user account with an equivalent administrative role. In this project, I
will act as root.
sudo su - root
show databases;
//Then open your database.sql file and copy it here. After executing the commands, execute the show tables
command to see if the data has been fully imported.
show tables;
Below are the steps to implement and use GITHUB that I apply in this project. Follow my steps below:
And Result
3. Heroku (PaaS)
The Heroku Platform, now from Salesforce, is a platform-as-a-service based on a managed container system, with
integrated data services and ecosystem for deploying modern apps. It takes an app-centric approach for software
delivery, integrated with developer tools and workflows. It’s three main tools are: Heroku Developer Experience
(DX), Heroku Operational Experience (OpEx), and Heroku Runtime.
Developers deploy directly from tools like Git, GitHub or Continuous Integration (CI) systems without the need to
manage infrastructure. The web-based Heroku Dashboard makes it possible to manage applications online and gain
visibility into performance.
OpEx helps developers troubleshoot and remediate issues and customize the ops experience to identify and address
trends in application health. Heroku provides a set of tools to alert teams if something goes wrong, or to
automatically scale web dynos if the response time for web requests exceeds a specified threshold.
Heroku Runtime
Heroku runs apps inside dynos—smart containers on a fully managed runtime environment. Developers deploy their
code written in Node, Ruby, Java, PHP, Python, Go, Scala, or Clojure to a build system which produces an app that's
ready for execution. The system and language stacks are then monitored, patched, and upgraded. The runtime
keeps apps running without manual intervention.
Below are the steps to implement and use Heroku that I apply in this project. Follow my steps below:
- Registration
- Log in
- Create products
1. Homepage
2. Product
3. Signup
4. Login
- Username: qcongtuan
- Password: 123@123a
- Full name: Quach Cong Tuan
- Phone Number: 0991979999
- Email: [email protected]
- Address: BTEC FPT
- City: Hanoi
6. Demo Function Login
I will login the account information I just created with username: qcongtuan and password 123@123a
I will add the product with the information as shown in the image and the result will be like the image below:
III. Analyze the most common problems which arise in a Cloud Computing platform
and appropriate solutions to these problems.
The term "cloud computing" refers to an idea that has been around for quite some time. The provision of computing
services from a distance. Cloud computing is Internet-based computing in which computers and other devices can
access pooled resources, software, and information on demand.
It seems like "the cloud" is being discussed everywhere these days. This nebulous concept appears to embrace
nearly everything we are. While "the cloud" is merely a metaphor for the internet, cloud computing is the current
buzzword. It improves data storage, security, flexibility, and employee cooperation, as well as changing the workflow
of small and large businesses to assist them in making better decisions while lowering expenses.
It's evident that cloud computing is a trend that's only going to get bigger. We forecasted the relevance and
deployment of the cloud in organizations like Alibaba, Amazon, Google, and Microsoft in our business intelligence
trends piece.
1. Privacy
The user data can be accessed by the host company with or without permission. The service provider may access
the data that is on the cloud at any point in time. They could accidentally or deliberately alter or even delete
information.
Solution:
2. Security
Cloud-based services involve third-party for storage and security. Can one assume that a cloud-based company will
protect and secure one’s data if one is using their services at a very low or for free? They may share users’
information with others. Security presents a real threat to the cloud.
Solution:
- Use security policies and service providers that offer the best in design security
- Data encrypt.
- Use tight security protection protocols for cloud solutions (SSL).
- Train IT staff on how to handle security issues with an appropriate solution.
- Establish corporate policies and culture on data security development and assurance.
3. Abuse
While providing cloud services, it should be ascertained that the client is not purchasing the services of cloud
computing for a nefarious purpose. In 2009, a banking Trojan illegally used the popular Amazon service as a
command-and-control channel that issued software updates and malicious instructions to PCs that were infected
by the malware So the hosting companies and the servers should have proper measures to address these issues.
Solution:
Enterprises/ATN Company must monitor those who have access to the cloud and set up mitigations for any threats
or risks. Data loss prevention and disaster recovery plans can aide in the recovery process if abuse of cloud services
should occur.
4. Higher Cost
If you want to use cloud services uninterruptedly then you need to have a powerful network with higher bandwidth
than ordinary internet networks, and also if your organization is broad and large so ordinary cloud service
subscription won’t suit your organization. Otherwise, you might face hassle in utilizing an ordinary cloud service
while working on complex projects and applications. This is a major problem before small organizations, that
restricts them from diving into cloud technology for their business.
Here are some common cost models used in the cloud and the most economical solutions:
- Pay-As-You-Go
- Prepaid/Fixed Subscriptions
- Reserved Instances
- Spot Instances
- Calculating Cloud Costs such as capital costs, operational costs and indirect business costs
- Make a specific schedule and specific strategy.
- …
Solution:
Cloud computing is no exception, as many of these systems and technologies have flaws. The network connecting
cloud systems, for example, must be secure. In addition, the cloud computing virtualization approach poses a
number of security concerns. The mapping of a virtual machine to a physical computer, for example, must be done
safely. Encryption of data and the enforcement of suitable data sharing policies are both aspects of data security.
Cloud Computing's Security Challenges:
1. Data security
There is a risk of data misuse when numerous organizations share resources. To avoid risk, data repositories, as well
as data that is stored, transported, or processed, must be secured. Data security is one of the most pressing concerns
in cloud computing. It is critical to offer authentication, authorization, and access control for data stored in the cloud
to improve cloud computing security. The following are the three primary areas of data security:
Cloud data security is the combination of technology solutions, policies, and procedures that you implement to
protect cloud-based applications and systems, along with the associated data and user access.
The core principles of information security and data governance—data confidentiality, integrity, and availability
(known as the CIA triad)—also apply to the cloud:
Visibility: The lack of visibility results in ineffective access control, increasing both your risks and costs.
Federated access: This eliminates manual maintenance of separate identities by leveraging your Active
Directory or other system of record.
Monitoring: We need a way to determine if the access to cloud data is authorized and appropriate.
In addition to governance, here are some other recommended data security safeguards for cloud computing:
2. Authentication Attack
An authentication attack is also a type of assault when it comes to the cloud. During the authentication process,
hackers attempt to obtain the user's credentials and personal information. If they succeed, the hackers will gain
access to personal information owned by users, sensitive information stored by corporations, and other information.
3.3. Solutions
Solution to avoid XSS and SQL attacks:
Make sure form fields aren't prepared with the Hyper Text Markup Language (HTML).
Validate the accuracy of all fields, strings, variables, and cookies.
Set the cookie expiry time to a limited length of time if you must save superfluous data in cookies.
Encryption should be used for all data interactions between clients and servers.
Do not use the Remember Me option when authenticating on websites.
V. The issues and constraints one can face during the development process
When doing the process of uploading a website to the server, I encountered many difficulties when there were too
many errors. Maybe these errors are very common errors like Application Error or Forbidden. These bugs have made
it difficult for programmers like me to edit and update. Below I will list some errors that programmers are likely to
encounter like me.
1. Application Error
When I’m opening your application and an "Application Error" message is displayed.
Resolution
"Application Error" or similar is always caused by your own application code. Routing errors will normally only
surface themselves within the logs of your application.
To track this kind of issue down you should look at your logs:
In most cases, you will be able to see the cause of the error there. To learn more about logging, please see our
Logging article on DevCenter.
If you can't see the source of the error straight away, try restarting your app from another terminal window or via
the Heroku Dashboard:
$ heroku restart
There are some errors which only occur when the app is rebooting so you will need to restart the app to see these
log messages appear.
2. Forbidden (403)
I deployed a PHP application and when I hit the url, I get the following error:
“Forbidden
And then I searched a lot of sites like "Stackoverflow" for a way to fix this, and luckily for me, I was able to find a
way to fix this very easily, I needed to create a new one. new file named .htaccess - this will help me get access to
the site.
VI. These Ways You Can Improve Cloud Security
MFA is one of the simplest yet most effective security measures for preventing unauthorized access to your cloud
services. In fact, most security experts will warn you that failing to deploy MFA as part of your infrastructure as a
service (IAAS) design is now regarded careless. Take a look at our data sheet to find out everything you need to
know about MFA.
These unusual behaviors could suggest a system breach, so detecting them early can stop hackers in their tracks
and allow you to address security issues before they cause havoc.
Because each employee is likely to have access to a variety of cloud applications and platforms, you'll need a
systemized deprovisioning procedure to ensure that each departing employee's access rights are removed.
GOOGLE CLOUD PLATFORM, 2021. How does backup and data recovery work in the Cloud?. [Online]
Available at: https://gcloud.devoteam.com/blog/how-does-backup-and-data-recovery-work-in-the-cloud/
[Accessed 16 April 2022].