Secure Web Database Hosting Implementation on Cloud Instance

Verified

Added on  2023/06/04

|4
|518
|490
Report
AI Summary
This report outlines the process of implementing a web database in a cloud instance, emphasizing the importance of security measures to protect against unauthorized access. The process begins with creating and authenticating a cloud account, followed by renaming the database for clarity. Implementation involves selecting the database option within the cloud account, choosing MSQL as the database type, and creating a strong password. Data encryption, particularly end-to-end encryption, is highlighted as a crucial security practice to translate data into secret codes, ensuring that sensitive information remains protected. The report references research supporting the use of data encryption for enhanced cloud security, advocating for the adoption of best security practices to mitigate potential attacks on cloud-based databases. Desklib provides access to this document and many more, offering students a wealth of study resources including past papers and solved assignments.
Document Page
Running head: WEB DATABASE HOSTING 1
Web Database Hosting
Name
Institution
Course
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WEB DATABASE HOSTING 2
Web database hosting is a process of implementing the database into the cloud to be
accessed through online. When deploying any web service, it is essential to think about how such
services can be secured. The security to the services is vital in limiting the access of the data to
an unauthorized person. The security services encompass tracking the user activity,
authenticating the users, grading the data for the users to see only what is relevant to them and
also equipment deployment (Hickmott, Popkin, & Schnitman, 2018). In this report, I will
describe how to implement the case scenario web database in a cloud instance.
After creating a cloud account through the link https://www.liquidweb.com/, it is vital to
confirm the credentials through the cloud suites control panel to ensure they are the correct
information. The confirmation of the credentials should also be authenticated to the users of the
cloud-based database to track the user's activity as it plays a role in identifying any harmful
practice into the database. After successful creation of the account, I will then rename my
database with an appropriate name. To implement the database into the cloud, I will click on the
website button in the logged in account. The website buttons have the website details such as the
FTP, Database, Aliases, and the Crons. However, due to the demand for a more advanced and
expandable database, the Database option is preferred more suitable. Selecting the option
prompts the creation of the database by entering the name of the web database to be hosted. The
database will use the MSQL database type throughout the whole process. Creating a more secure
password will ensure the final step of hosting.
End to end encryption is one of the best-preferred methods of data security. According to
Fu, Xia, Sun, Liu, & Xie (2018), data encryption translates the data contained in the database
into secret codes which is a more secure way for the cloud information. This ensures any data
stored in the database cannot be accessed by any unauthorized person. Therefore, implementing
Document Page
WEB DATABASE HOSTING 3
any database in the cloud also calls for the best security practices to mitigate any possibility of
attacks.
Document Page
WEB DATABASE HOSTING 4
References
Fu, Z., Xia, L., Sun, X., Liu, A. X., & Xie, G. (2018). Semantic-Aware Searching Over
Encrypted Data for Cloud Computing. IEEE Transactions on Information Forensics and
Security, 13(9), 2359-2371.
Hickmott, A., Popkin, L. A., & Schnitman, Y. (2018). U.S. Patent No. 9,900,155. Washington,
DC: U.S. Patent and Trademark Office.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]