Database Management System Report: Cloud Implementation and Security

Verified

Added on  2023/06/04

|5
|767
|285
Report
AI Summary
This report delves into the practical aspects of database management systems (DBMS), specifically focusing on the implementation of a cloud-based database for a football training session. It begins by presenting an Entity-Relationship Diagram (ERD) to model the data structure, followed by a discussion on the advantages of cloud database implementation, including high performance and scalability. The report then outlines the steps involved in creating a cloud database instance using MySQL, establishing connections, and creating tables such as Players, Training_session, Training_reg, and Training_det. Furthermore, it addresses user management, including registration and access control using GRANT and REVOKE statements, while emphasizing the importance of database security in a cloud environment. The report concludes by exploring security measures like cryptography, digital signatures, and access control methods (MAC, LBAC, RBAC) to ensure data confidentiality, availability, and integrity.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: DATABASE MANAGEMENT SYSTEM
Database Management System
Name of Student-
Name of University-
Author’s Note-
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DATABASE MANAGEMENT SYSTEM
ERD for the Football Training session
Figure 1: ERD for Football Training Session
Implementing database in cloud instance
The latest trend of information technology prefers the database implementation in cloud. So, for
above ERD, I prefer the cloud database which may be structured or unstructured and resides in a
public cloud architecture. There are 2 models of implementing cloud database:
Traditional
DBaaS (Database as a service)
Here, we recommend DBaaS, in which database runs on infrastructure of service provider. It is
managed and maintained by service provider. Using MySQL database in cloud offers so many
advantages, some are:
High performance
Scalability
Convenience
Steps to Implementing database in cloud
1. Creating Instance: The first step is create an instance (Margaret Rouse, 2017). Once the
instance created, it can be configured appropriately.
2. Connecting MySQL client using IP Address: The client can be on cloud or running
locally. For this step, we need to install mysql client by using following query:
Sudo apt-get install mysql-client
Document Page
2DATABASE MANAGEMENT SYSTEM
Client can be connected to instance through SSL or without SSL. Once the connection is
established we start creating the database on cloud by using following steps:
a. Select the database tab and click on create database
b. Specify the name of database as “Football_Team”
c. And click on create.
Creating tables (Fancher, 2018)
Create four tables: Training_reg, Players, Training_session and Training_det
CREATE TABLE Players (player__id int, player_name varchar(20), player_dob date,
playing_position int,, num_of_training int, primary key(player_id));
CREATE TABLE Training_session (training_session_id int, date t_date,t_time time, venue
varchar(20), num_of_players int, primary key(training_session_id));
CREATE TABLE Training_reg(reg__id int primary key, player_id int foreign key fk_pid
references Player(player_id),training_session_id int foreign key fk_session references
Training_session(session_id));
CREATE TABLE Training_det (reg_id int foreign key fk_rid references Training_reg(reg_id),
attended_session int,performance_rating int);
Creating and Managing Users
Once the database is created, the users can register themselves using Registration or Sign Up
option in a web application. Users will provide their details to register themselves, but on
backend it must be managed through DBA. The right can be provided by using GRANT and
REVOKE statements.
The values can be inserted, updated or deleted by using INSERT INTO, UPDATE and DELETE
statements.
The most important this is database security with reference to a Web application, as all users are
connected through one centralized database server. In upcoming section, we are going to discuss
database security in cloud instance.
Security in cloud database:
Document Page
3DATABASE MANAGEMENT SYSTEM
In cloud environment the database is very scalable and occupied with many virtualized
resources. Database security is a major challenge, it includes data confidentiality, availability,
and integrity on all the systems (Cleveland, 2009). To ensure it, lots of latest security trends
available can be considered. Some of them are cryptography, digital signatures, secret key
methods and many more. All the activities can be monitored through following techniques:
MAC (Mandatory Access Control)
LBAC (Lattice based access control)
RBAC (Role based access control)
It must be ensured, which business process must be deployed on cloud instance (Moyle, 2015).
During data transit, the protection is provided to data or not? Database backup and replication
must be done using proprietary tool such as SQL Azure.
Bibliography
Cleveland, T. (2009, November 13). database-security-in-a-cloud-computing-environment.html.
Retrieved from www.itworld.com:
https://www.itworld.com/article/2764788/security/database-security-in-a-cloud-
computing-environment.html
Fancher, P. (2018, January 16). mysql-foreign-key-example. Retrieved from
www.hostingadvice.com: https://www.hostingadvice.com/how-to/mysql-foreign-key-
example/
Margaret Rouse, R. S. (2017, February 3). cloud-database. Retrieved from
searchcloudapplications.techtarget.com:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4DATABASE MANAGEMENT SYSTEM
https://searchcloudapplications.techtarget.com/definition/cloud-database
Moyle, E. (2015, September 13). Three-steps-to-secure-cloud-database-services-in-the-
enterprise. Retrieved from searchcloudsecurity.techtarget.com:
https://searchcloudsecurity.techtarget.com/tip/Three-steps-to-secure-cloud-database-
services-in-the-enterprise
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]