Secure Web Database Hosting Implementation on Cloud Instance
VerifiedAdded on 2023/06/04
|4
|518
|490
Report
AI Summary
This report outlines the process of implementing a web database in a cloud instance, emphasizing the importance of security measures to protect against unauthorized access. The process begins with creating and authenticating a cloud account, followed by renaming the database for clarity. Imple...

Running head: WEB DATABASE HOSTING 1
Web Database Hosting
Name
Institution
Course
Date
Web Database Hosting
Name
Institution
Course
Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

WEB DATABASE HOSTING 2
Web database hosting is a process of implementing the database into the cloud to be
accessed through online. When deploying any web service, it is essential to think about how such
services can be secured. The security to the services is vital in limiting the access of the data to
an unauthorized person. The security services encompass tracking the user activity,
authenticating the users, grading the data for the users to see only what is relevant to them and
also equipment deployment (Hickmott, Popkin, & Schnitman, 2018). In this report, I will
describe how to implement the case scenario web database in a cloud instance.
After creating a cloud account through the link https://www.liquidweb.com/, it is vital to
confirm the credentials through the cloud suites control panel to ensure they are the correct
information. The confirmation of the credentials should also be authenticated to the users of the
cloud-based database to track the user's activity as it plays a role in identifying any harmful
practice into the database. After successful creation of the account, I will then rename my
database with an appropriate name. To implement the database into the cloud, I will click on the
website button in the logged in account. The website buttons have the website details such as the
FTP, Database, Aliases, and the Crons. However, due to the demand for a more advanced and
expandable database, the Database option is preferred more suitable. Selecting the option
prompts the creation of the database by entering the name of the web database to be hosted. The
database will use the MSQL database type throughout the whole process. Creating a more secure
password will ensure the final step of hosting.
End to end encryption is one of the best-preferred methods of data security. According to
Fu, Xia, Sun, Liu, & Xie (2018), data encryption translates the data contained in the database
into secret codes which is a more secure way for the cloud information. This ensures any data
stored in the database cannot be accessed by any unauthorized person. Therefore, implementing
Web database hosting is a process of implementing the database into the cloud to be
accessed through online. When deploying any web service, it is essential to think about how such
services can be secured. The security to the services is vital in limiting the access of the data to
an unauthorized person. The security services encompass tracking the user activity,
authenticating the users, grading the data for the users to see only what is relevant to them and
also equipment deployment (Hickmott, Popkin, & Schnitman, 2018). In this report, I will
describe how to implement the case scenario web database in a cloud instance.
After creating a cloud account through the link https://www.liquidweb.com/, it is vital to
confirm the credentials through the cloud suites control panel to ensure they are the correct
information. The confirmation of the credentials should also be authenticated to the users of the
cloud-based database to track the user's activity as it plays a role in identifying any harmful
practice into the database. After successful creation of the account, I will then rename my
database with an appropriate name. To implement the database into the cloud, I will click on the
website button in the logged in account. The website buttons have the website details such as the
FTP, Database, Aliases, and the Crons. However, due to the demand for a more advanced and
expandable database, the Database option is preferred more suitable. Selecting the option
prompts the creation of the database by entering the name of the web database to be hosted. The
database will use the MSQL database type throughout the whole process. Creating a more secure
password will ensure the final step of hosting.
End to end encryption is one of the best-preferred methods of data security. According to
Fu, Xia, Sun, Liu, & Xie (2018), data encryption translates the data contained in the database
into secret codes which is a more secure way for the cloud information. This ensures any data
stored in the database cannot be accessed by any unauthorized person. Therefore, implementing

WEB DATABASE HOSTING 3
any database in the cloud also calls for the best security practices to mitigate any possibility of
attacks.
any database in the cloud also calls for the best security practices to mitigate any possibility of
attacks.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

WEB DATABASE HOSTING 4
References
Fu, Z., Xia, L., Sun, X., Liu, A. X., & Xie, G. (2018). Semantic-Aware Searching Over
Encrypted Data for Cloud Computing. IEEE Transactions on Information Forensics and
Security, 13(9), 2359-2371.
Hickmott, A., Popkin, L. A., & Schnitman, Y. (2018). U.S. Patent No. 9,900,155. Washington,
DC: U.S. Patent and Trademark Office.
References
Fu, Z., Xia, L., Sun, X., Liu, A. X., & Xie, G. (2018). Semantic-Aware Searching Over
Encrypted Data for Cloud Computing. IEEE Transactions on Information Forensics and
Security, 13(9), 2359-2371.
Hickmott, A., Popkin, L. A., & Schnitman, Y. (2018). U.S. Patent No. 9,900,155. Washington,
DC: U.S. Patent and Trademark Office.
1 out of 4
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.