Docsity 1644 Cloud Computing Assignment 2 Pass
Docsity 1644 Cloud Computing Assignment 2 Pass
assignment 2 - PASS
Data Warehousing
FPT University
36 pag.
Submission Format:
Format:
A report (in PDF format)
You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system.
Submission Students are compulsory to submit the assignment in due date and in a way requested by
the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference properly,
and that understand the guidelines on plagiarism. If you do not, you definitely get failed
LO3 Develop Cloud Computing solutions using service provider’s frameworks and open source tools.
LO4 Analyze the technical challenges for cloud applications and assess their risks
Task 1
Page 1
• A step-by-step instruction
o which shows which functions are implemented
o How to config, deploy and test the services (Web application, Database Server,
Source code management, server logs...) using service provider’s frameworks
and open-source tools.
o Images for the built functions
• A brief discussion about difficulties which one can face during the development
process(optional)
• The source code for the built application
Task 2
The table of contents in your security manual (which should be 500–700 words) should be
as follows:
1. Analysis of the most common problems and security issues of a cloud computing
platform.
2. Discussion on how to overcome these issues.
3. Summary.
Page 2
P7 Analyse the most common M4 Discuss how to overcome D3 Critically discuss how an
problems which arise in a Cloud these security issues when organisation should protect
Computing platform and building a secure cloud their data when they migrate
discuss appropriate solutions to platform. to a cloud solution.
these problems.
P8 Assess the most common
security issues in cloud
environments.
Page 3
Contents
ASSIGNMENT ANSWER: .................................................................................................................................................... 5
INTRODUCTION ................................................................................................................................................................. 5
P5: CONFIGURE A CLOUD COMPUTING PLATFORM WITH A CLOUD SERVICE PROVIDER’S FRAMEWORK. .................. 5
1. NodeJS: .................................................................................................................................................................. 5
1.1. What is NodeJS: ............................................................................................................................................ 5
1.2. How to install NodeJS: .................................................................................................................................. 5
2. MongoDB: ............................................................................................................................................................. 6
2.1. What is MongoDB: ........................................................................................................................................ 6
2.2. Install MongoDB:........................................................................................................................................... 7
2.3. Setup MongoDB Atlas: ................................................................................................................................ 10
2.4. MongoDB Compass: .................................................................................................................................... 11
2.5. Download NoSQL Booster: ......................................................................................................................... 14
3. Heroku: ................................................................................................................................................................ 14
3.1 Definition......................................................................................................................................................... 15
3.2 Download Heroku CLI ..................................................................................................................................... 15
3.3 Create project on Heroku ............................................................................................................................... 17
4. GitHub: ................................................................................................................................................................ 18
4.1. Definition:.................................................................................................................................................... 18
4.2. Install Git: .................................................................................................................................................... 19
P6 IMPLEMENT A CLOUD PLATFORM USING OPEN-SOURCE TOOLS. ........................................................................... 20
1. Create & Setup for ATN project: ......................................................................................................................... 20
2. Connect with MongoDB:..................................................................................................................................... 21
3. CRUD & coding function: .................................................................................................................................... 22
4. Upload on Heroku ............................................................................................................................................... 27
P7 ANALYSE THE MOST COMMON PROBLEMS WHICH ARISE IN A CLOUD COMPUTING PLATFORM AND DISCUSS
APPROPRIATE SOLUTIONS TO THESE PROBLEMS. ......................................................................................................... 28
1. There are many problems which arise in a Cloud Computing platform and discuss appropriate: .................. 28
2. Solution: .............................................................................................................................................................. 31
P8 ASSESS THE MOST COMMON SECURITY ISSUES IN CLOUD ENVIRONMENTS. ........................................................ 32
1. What is Cloud Security ........................................................................................................................................ 32
2. Problem about Cloud Security ............................................................................................................................ 32
3. Conclusion: .......................................................................................................................................................... 35
REFERENCES: ................................................................................................................................................................... 36
Page 4
INTRODUCTION
In this report, I'll introduce a few frameworks from suppliers and walk through the process of deploying a
static website on the Heroku platform. Additionally, I analyze a few frequent vulnerabilities that occur in a
cloud computing platform and suggest suitable fixes to evaluate the most frequent security concerns in a
cloud context.
P5: CONFIGURE A CLOUD COMPUTING PLATFORM WITH A CLOUD SERVICE PROVIDER’S FRAMEWORK.
1. NodeJS:
1.1. What is NodeJS:
Installation of NodeJS and NPM is straightforward using the installer package available at
NodeJS official web site.
Page 5
Now, test NodeJS by printing its version using the following command in Command Prompt:
Simple way to test NodeJS work in your system is to create a JavaScript file which print a
message.
Run the test.js file using Node command > node test.js in command prompt.
2. MongoDB:
2.1. What is MongoDB:
Page 6
Once download is complete open the msi file. Click Next in the start up screen
Page 7
Page 8
Page 9
Page 10
Page 11
Step 4: Follow the installation prompts and customize the installation according to your
need.
Page 12
Step 6: After the above step, all installation process is done. now you can work with your
databases.
Page 13
o Click here to download NoSQL Booster for your preferred operating system.
o Navigate to the Downloads section of your browser and open the downloaded file.
o Follow the instructions on the Installation Wizard and keep on clicking Next.
o Once you have successfully installed NoSQLBooster, open it and click on
the Connect option to create a new connection.
o The Connection Editor will automatically fetch details from the MongoDB service
and once all the appropriate fields have been filled, click on the Save and
Connect button
3. Heroku:
Page 14
Make sure that you check all of them. Now click the “Next” button.
Page 15
Step 4: Installation:
After clicking “Install”, it will start to install Heroku CLI into the destination folder as shown
in the below screenshot:
Page 16
For checking the version of Heroku, Run the following command in the terminal:
So, the Heroku CLI has been installed properly of your system
3.3 Create project on Heroku
Step 1: You need to register for a Heroku account and log in.
Page 17
Fill in your app information in the app creation form then click “Create app”
Once created, you will be redirected to the newly created app management page. This page
will have an interface like the following image:
4. GitHub:
4.1. Definition:
Page 18
Step 4: Run the following commands to configure your Git username and email using the
following commands, replacing Emma's name with your own. These details will be
associated with any commits that you create:
$ git config --global user.name "Emma Paris" $ git config --global user.email
"[email protected]"
Step 5: Optional: Install the Git credential helper on Windows
Bitbucket supports pushing and pulling over HTTP to your remote Git repositories on
Bitbucket. Every time you interact with the remote repository, you must supply a
Page 19
Create folder project and setting environment for project by using npm:
Step 1: using this command for setup file package.json and project with NodeJS: npm init –y
Step 2: install module express for project with command: npm install express –save
Step 3: install ejs module for dynamic website: npm install ejs –save
Step 4: install module mongodb to connect with the NoSQL MongoDB: npm install mongodb –save
Page 20
To connect the project with MongoDB, we must login an account and create new project:
After that, using connection string and connect with project throw class server.js:
Page 21
By using NodeJS for ATN project, I will demo 4 features is: Create, Update, Delete and View.
First class is sever.js have a mission is connect to server host and connect to database. This class
navigation for all function in project.
Page 22
Page 24
Page 25
Before uploading project on Heroku, we must login and create a new app on Heroku website:
When the project was updated on cloud, we can check it by using open app on Heroku:
Page 27
P7 ANALYSE THE MOST COMMON PROBLEMS WHICH ARISE IN A CLOUD COMPUTING PLATFORM AND
DISCUSS APPROPRIATE SOLUTIONS TO THESE PROBLEMS.
1. There are many problems which arise in a Cloud Computing platform and discuss appropriate:
Recently, Flexera conducted its annual State of the Cloud Survey on the latest cloud trends. They
questioned 997 technical professionals across a broad cross-section of organizations about their
adoption of cloud infrastructure. Their findings were insightful, especially regarding current cloud
computing challenges.
To answer the main question of what the challenges for cloud-based computing are, below we have
expanded upon some of their findings and provided additional problems that businesses may need
to address. Let’s start with the ever-pressing subject of cybersecurity.
Page 28
We mentioned the hot debate surrounding data protection in our definitive business intelligence
trends guide. Like many other branches of technology, security is a pressing concern in the world of
cloud-based computing, as you are unable to see the exact location where your data is stored or
being processed. This increases the risks that can arise during the implementation or management
process.
Currently, 93% of leading companies across sectors are highly concerned about experiencing a
significant data breach within their cloud-centric ecosystems.
The next part of our cloud computing risks list involves costs. For the most part, modern computing
can save businesses money. In the cloud, an organization can easily ramp up its processing capabilities
without making large investments in new hardware. Businesses can instead access extra processing
through pay-as-you-go models from public providers. However, the on-demand and scalable nature
of cloud computing services make it sometimes difficult to define and predict quantities and costs.
Luckily there are several ways to keep cloud costs in check, for example, optimizing costs by
conducting better financial analytics and reporting, automating policies for ruling, or keeping the
management reporting practice on the course, so that these issues in computing could be decreased.
Page 29
❖ Lack of resources/expertise
One of the cloud challenges companies and enterprises are facing today is a lack of resources and/or
expertise. Organizations are increasingly placing more workloads in the system while cloud
technologies continue too rapidly advance. Due to these factors, organizations are having a tough
time keeping up with the tools. Also, the need for expertise continues to grow. These challenges can
be minimized through additional training of IT and development staff. A strong CIO championing
cloud adoption also helps. As Cloud Engineer Drew Firment puts it:
“The success of adoption and migrations comes down to your people — and the investments you
make in a talent transformation program. Until you focus on the #1 bottleneck to the flow of cloud
adoption, improvements made anywhere else are an illusion.”
SME (small and medium-sized) organizations may find adding specialists to their IT teams to be
prohibitively costly. Luckily, many common tasks performed by these specialists can be automated.
To this end companies are turning to DevOps tools, like Chef and Puppet, to perform tasks like
monitoring usage patterns of resources and automated backups at predefined time periods. These
tools also help optimize the cloud for cost, governance, and security.
❖ Governance/Control
There are many challenges facing cloud computing and control is in place number 4. Proper IT
governance should ensure IT assets are implemented and used according to agreed-upon policies and
procedures; ensure that these assets are properly controlled and maintained and ensure that these
assets are supporting your organization’s strategy and goals.
In today’s cloud-based world, IT does not always have full control over the provisioning, de-
provisioning, and operations of infrastructure. This has increased the difficulty for IT to provide the
governance, compliance, risks, and data quality management required. To mitigate the various risks
and uncertainties in transitioning to the cloud, IT must adapt its traditional IT control processes to
include the cloud. To this effect, the role of central IT teams in the system has been evolving over the
last few years. Along with business units, central IT is increasingly playing a role in selecting,
brokering, and governing cloud services. On top of this third-party cloud computing/management
providers are progressively providing support and best practices.
Page 30
One of the risks of cloud computing is facing today is compliance. That is an issue for anyone using
backup services or storage. Every time a company moves data from the internal storage to a cloud, it
is faced with being compliant with official regulations and laws. For example, healthcare
organizations in the USA must comply with HIPAA (Health Insurance Portability and Accountability
Act of 1996), public retail companies have to comply with SOX (Sarbanes-Oxley Act of 2002), and PCI
DSS (Payment Card Industry Data Security Standard).
Challenges facing cloud computing haven’t just been concentrated in one, single cloud.
The state of multi-cloud has grown exponentially in recent years. Companies are shifting or combining
public and private clouds and as mentioned earlier, tech giants like Alibaba and Amazon are leading
the way.
The survey by Flexera mentioned above shows that 89% of enterprises have a multi-cloud strategy.
Enterprises with a hybrid strategy (combining public and private clouds) reach 80%, while
organizations with a strategy of multiple public clouds or multiple private clouds grew slightly but
stay under 10%.
2. Solution:
We have created ways to protect and address the problem with the present cloud paradigm. It is the
most effective contribution to reducing potential risks associated with using the service,
notwithstanding its lack of thoroughness.
In terms of security:
We employ a private cloud system that is managed and monitored in accordance with stringent
security protocols to ensure the highest level of security. To strengthen information security, extra
layers of defense and security services will be added.
Data loss issue: To restore data in the event of an error, we will build a backup system that is
continuously updated and works in tandem with the cloud system.
Internet issues: To reduce crashes or disruptions while in use, we shall deploy a costly internet
system. Additionally, we will act as soon as there are issues with the internet connection.
Page 31
Cloud Security is an acronym for Cloud Computing Security, meaning cloud computing security. This
is a service concept that is no stranger to business organizations around the world, talking about a
comprehensive solution to information technology problems in the cloud. The growth of cloud
computing services is a common trend, and businesses are starting to move and store large volumes
of data and organizational applications to the cloud to make it easy to work from anywhere when
there is no access to the cloud. at the office… Accompanying the development, there are always
threats to data security. Therefore, the need for Cloud Security is even more important, if any
organization is loose in this service, not paying attention to it, it will lose many of its great benefits
and certainly face the risk of collapse. poured very quickly.
Cloud Security solution is a solution to provide for a system that does not work at the office server
but works on the Cloud Server. If a stranger attacks the Server on the Cloud, it will lose that system
(the system is unusable at this time) and to avoid that, each business needs to protect the system on
the Cloud to ensure that the computer environment is safe. whole.
All organizations that rely on cloud platforms need enhanced security that still allows team members,
customers, and other stakeholders to access their applications and online data from a wide range of
locations. With the adoption of cloud applications and storage growing each year, businesses need
Page 32
As a cybersecurity professional, it’s important to be aware of the security threats, issues, and
challenges your customer’s or employer’s cloud infrastructure faces. Some of the most common ones
include:
According to Trend Micro’s (2021) analysis of data from the Amazon Web Services (AWS) and
Microsoft Azure cloud platforms, between 65 and 70% of all cloud security issues arise from security
misconfigurations. There are multiple reasons why misconfigurations can occur in a cloud network’s
security system.
First, cloud infrastructure is optimized for accessibility and data sharing, making it difficult for
cybersecurity professionals to ensure that only authorized parties can access data. An excellent
example of this is link-based data sharing, wherein anyone with a link can gain access to data.
Second, using a cloud service means that organizations don’t have complete visibility into or control
of their infrastructure, instead relying on the security arrangement of the cloud service provider
(CSP). This dependence on CSPs for security highlights the importance of choosing a quality CSP.
Page 33
DoS attacks can cause a machine or a network to crash, making it no longer accessible to users.
Malicious attackers can either send information to the target that causes it to shut down or flood it
with traffic to overwhelm it and cause a crash.
A downed network can be held for ransom and cause revenue losses, and it can also harm a
company’s authority and customer relations. Cloud security experts need in-depth knowledge of how
to implement DoS attack protection and remediation strategies.
Defending a partially or fully migrated network against cyberattacks of all types poses unique
challenges for cybersecurity professionals. Cybercriminals often target cloud-based networks
because they are generally accessible from the public internet. Since multiple companies will often
use the same CSP, attackers can repeat a successful cyberattack on one target to gain access to many
more. Additionally, cloud-based infrastructures are frequently not secured properly, a fact that many
malicious hackers are aware of and know how to exploit.
Losing valuable data through human error, natural disasters that destroy physical servers, or
malicious attacks that aim to destroy data can be disastrous for any company. Moving business-
critical data to the cloud can increase these security concerns, since organizations won’t be able to
access the affected servers on site. Functional and tested disaster recovery and backup processes
need to be in place to counter this risk. Security solutions will need to be built into every network
layer to protect against data loss from cyberattacks.
One of the main attractions of cloud networks is their accessibility from anywhere, which allows
teams and customers to connect regardless of their location. Unfortunately, many of the technologies
with which users interact, like application programming interfaces (APIs), are vulnerable to attacks if
cloud security is not correctly configured and optimized. Since these vulnerabilities give hackers an
Page 34
One of the cornerstones of any effective network or computer security system is how quickly threat
notifications and alerts can be sent to website or security personnel. Cloud-based systems are no
different. Instant notifications and alerts enable proactive threat mitigation, which can prevent
successful hacks and minimize damages.
3. Conclusion:
In my conclusion, I outlined the various frameworks employed by service providers and provided a
thorough description of how to upload a static website to the Heroku platform. I also look at a few
typical problems that come up in cloud computing platforms and discuss useful strategies for
ranking the most prevalent security problems in cloud systems.
Page 35
Page 36