Secure Web Database Hosting Implementation on Cloud Instance

Verified

Added on  2023/06/04

|4
|518
|490
Report
AI Summary
Document Page
Running head: WEB DATABASE HOSTING 1
Web Database Hosting
Name
Institution
Course
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WEB DATABASE HOSTING 2
Web database hosting is a process of implementing the database into the cloud to be
accessed through online. When deploying any web service, it is essential to think about how such
services can be secured. The security to the services is vital in limiting the access of the data to
an unauthorized person. The security services encompass tracking the user activity,
authenticating the users, grading the data for the users to see only what is relevant to them and
also equipment deployment (Hickmott, Popkin, & Schnitman, 2018). In this report, I will
describe how to implement the case scenario web database in a cloud instance.
After creating a cloud account through the link https://www.liquidweb.com/, it is vital to
confirm the credentials through the cloud suites control panel to ensure they are the correct
information. The confirmation of the credentials should also be authenticated to the users of the
cloud-based database to track the user's activity as it plays a role in identifying any harmful
practice into the database. After successful creation of the account, I will then rename my
database with an appropriate name. To implement the database into the cloud, I will click on the
website button in the logged in account. The website buttons have the website details such as the
FTP, Database, Aliases, and the Crons. However, due to the demand for a more advanced and
expandable database, the Database option is preferred more suitable. Selecting the option
prompts the creation of the database by entering the name of the web database to be hosted. The
database will use the MSQL database type throughout the whole process. Creating a more secure
password will ensure the final step of hosting.
End to end encryption is one of the best-preferred methods of data security. According to
Fu, Xia, Sun, Liu, & Xie (2018), data encryption translates the data contained in the database
into secret codes which is a more secure way for the cloud information. This ensures any data
stored in the database cannot be accessed by any unauthorized person. Therefore, implementing
Document Page
WEB DATABASE HOSTING 3
any database in the cloud also calls for the best security practices to mitigate any possibility of
attacks.
Document Page
WEB DATABASE HOSTING 4
References
Fu, Z., Xia, L., Sun, X., Liu, A. X., & Xie, G. (2018). Semantic-Aware Searching Over
Encrypted Data for Cloud Computing. IEEE Transactions on Information Forensics and
Security, 13(9), 2359-2371.
Hickmott, A., Popkin, L. A., & Schnitman, Y. (2018). U.S. Patent No. 9,900,155. Washington,
DC: U.S. Patent and Trademark Office.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]