Implementing Database Management System in Cloud Instance
Verified
Added on 2023/06/04
|5
|767
|285
AI Summary
This article discusses the implementation of database management system in cloud instance, specifically recommending DBaaS and using MySQL database. It provides step-by-step instructions for creating tables and managing users, and highlights the importance of ensuring database security in cloud environment.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: DATABASE MANAGEMENT SYSTEM Database Management System Name of Student- Name of University- Author’s Note-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1DATABASE MANAGEMENT SYSTEM ERD for the Football Training session Figure 1:ERD for Football Training Session Implementing database in cloud instance The latest trend of information technology prefers the database implementation in cloud. So, for above ERD, I prefer the cloud database which may be structured or unstructured and resides in a public cloud architecture. There are 2 models of implementing cloud database: Traditional DBaaS (Database as a service) Here, we recommend DBaaS, in which database runs on infrastructure of service provider. It is managed and maintained by service provider. Using MySQL database in cloud offers so many advantages, some are: High performance Scalability Convenience Steps to Implementing database in cloud 1.Creating Instance: The first step is create an instance(Margaret Rouse, 2017). Once the instance created, it can be configured appropriately. 2.Connecting MySQL client using IP Address: The client can be on cloud or running locally. For this step, we need to install mysql client by using following query: Sudo apt-get install mysql-client
2DATABASE MANAGEMENT SYSTEM Client can be connected to instance through SSL or without SSL. Once the connection is established we start creating the database on cloud by using following steps: a.Select the database tab and click on create database b.Specify the name of database as “Football_Team” c.And click on create. Creating tables(Fancher, 2018) Create four tables: Training_reg, Players, Training_session and Training_det CREATE TABLE Players (player__id int, player_name varchar(20), player_dob date, playing_position int,, num_of_training int, primary key(player_id)); CREATE TABLE Training_session (training_session_id int, date t_date,t_time time, venue varchar(20), num_of_players int, primary key(training_session_id)); CREATE TABLE Training_reg(reg__id int primary key, player_id int foreign key fk_pid references Player(player_id),training_session_id int foreign key fk_session references Training_session(session_id)); CREATE TABLE Training_det (reg_id int foreign key fk_rid references Training_reg(reg_id), attended_session int,performance_rating int); Creating and Managing Users Once the database is created, the users can register themselves using Registration or Sign Up option in a web application. Users will provide their details to register themselves, but on backend it must be managed through DBA. The right can be provided by using GRANT and REVOKE statements. The values can be inserted, updated or deleted by using INSERT INTO, UPDATE and DELETE statements. The most important this is database security with reference to a Web application, as all users are connected through one centralized database server. In upcoming section, we are going to discuss database security in cloud instance. Security in cloud database:
3DATABASE MANAGEMENT SYSTEM In cloud environmentthe databaseisveryscalableand occupiedwithmany virtualized resources. Database security is a major challenge, it includes data confidentiality, availability, and integrity on all the systems(Cleveland, 2009).To ensure it, lots of latest security trends available can be considered. Some of them are cryptography, digital signatures, secret key methods and many more. All the activities can be monitored through following techniques: MAC (Mandatory Access Control) LBAC (Lattice based access control) RBAC (Role based access control) It must be ensured, which business process must be deployed on cloud instance(Moyle, 2015). During data transit, the protection is provided to data or not? Database backup and replication must be done using proprietary tool such as SQL Azure. Bibliography Cleveland, T. (2009, November 13).database-security-in-a-cloud-computing-environment.html. Retrievedfromwww.itworld.com: https://www.itworld.com/article/2764788/security/database-security-in-a-cloud- computing-environment.html Fancher,P.(2018,January16).mysql-foreign-key-example.Retrievedfrom www.hostingadvice.com:https://www.hostingadvice.com/how-to/mysql-foreign-key- example/ MargaretRouse,R.S.(2017,February3).cloud-database.Retrievedfrom searchcloudapplications.techtarget.com:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser